Computer network security for the radiology enterprise.
Eng, J
2001-08-01
As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.
Information Systems at Enterprise. Design of Secure Network of Enterprise
NASA Astrophysics Data System (ADS)
Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.
2018-05-01
No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
Security Aspects of an Enterprise-Wide Network Architecture.
ERIC Educational Resources Information Center
Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan
1999-01-01
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Big data, little security: Addressing security issues in your platform
NASA Astrophysics Data System (ADS)
Macklin, Thomas; Mathews, Joseph
2017-05-01
This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.
High Assurance Models for Secure Systems
ERIC Educational Resources Information Center
Almohri, Hussain M. J.
2013-01-01
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
Motion/imagery secure cloud enterprise architecture analysis
NASA Astrophysics Data System (ADS)
DeLay, John L.
2012-06-01
Cloud computing with storage virtualization and new service-oriented architectures brings a new perspective to the aspect of a distributed motion imagery and persistent surveillance enterprise. Our existing research is focused mainly on content management, distributed analytics, WAN distributed cloud networking performance issues of cloud based technologies. The potential of leveraging cloud based technologies for hosting motion imagery, imagery and analytics workflows for DOD and security applications is relatively unexplored. This paper will examine technologies for managing, storing, processing and disseminating motion imagery and imagery within a distributed network environment. Finally, we propose areas for future research in the area of distributed cloud content management enterprises.
A security architecture for health information networks.
Kailar, Rajashekar; Muralidhar, Vinod
2007-10-11
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.
A Security Architecture for Health Information Networks
Kailar, Rajashekar
2007-01-01
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862
Speaker Verification Using SVM
2010-11-01
application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic
Auditing Albaha University Network Security using in-house Developed Penetration Tool
NASA Astrophysics Data System (ADS)
Alzahrani, M. E.
2018-03-01
Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
Security Issues for Mobile Medical Imaging: A Primer.
Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George
2015-10-01
The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.
Network gateway security method for enterprise Grid: a literature review
NASA Astrophysics Data System (ADS)
Sujarwo, A.; Tan, J.
2017-03-01
The computational Grid has brought big computational resources closer to scientists. It enables people to do a large computational job anytime and anywhere without any physical border anymore. However, the massive and spread of computer participants either as user or computational provider arise problems in security. The challenge is on how the security system, especially the one which filters data in the gateway could works in flexibility depends on the registered Grid participants. This paper surveys what people have done to approach this challenge, in order to find the better and new method for enterprise Grid. The findings of this paper is the dynamically controlled enterprise firewall to secure the Grid resources from unwanted connections with a new firewall controlling method and components.
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
A Strategic Approach to Network Defense: Framing the Cloud
2011-03-10
accepted network defensive principles, to reduce risks associated with emerging virtualization capabilities and scalability of cloud computing . This expanded...defensive framework can assist enterprise networking and cloud computing architects to better design more secure systems.
Research on the information security system in electrical gis system in mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
2017-05-01
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2015-01-01
This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.
2009-05-27
technology network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional...A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .65 As part of its integration...information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network
Automating Network Node Behavior Characterization by Mining Communication Patterns
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Chikkagoudar, Satish; Arthur-Durett, Kristine M.
Enterprise networks of scale are complex, dynamic computing environments that respond to evolv- ing business objectives and requirements. Characteriz- ing system behaviors in these environments is essential for network management and cyber security operations. Characterization of system’s communication is typical and is supported using network flow information (NetFlow). Related work has characterized behavior using theoretical graph metrics; results are often difficult to interpret by enterprise staff. We propose a different approach, where flow information is mapped to sets of tags that contextualize the data in terms of network principals and enterprise concepts. Frequent patterns are then extracted and are expressedmore » as behaviors. Behaviors can be com- pared, identifying systems expressing similar behaviors. We evaluate the approach using flow information collected by a third party.« less
2010-03-19
network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional Fusion Center...of reports; the I&A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .73 As part of its...comprehensive information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
...) Not to exceed 3000 positions that require unique cyber security skills and knowledge to perform cyber..., distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture...
Policy reconciliation for access control in dynamic cross-enterprise collaborations
NASA Astrophysics Data System (ADS)
Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.
2018-03-01
In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.
Situational Awareness of Network System Roles (SANSR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huffer, Kelly M; Reed, Joel W
In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. Wemore » will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.« less
Practical cryptographic strategies in the post-quantum era
NASA Astrophysics Data System (ADS)
Kabanov, I. S.; Yunusov, R. R.; Kurochkin, Y. V.; Fedorov, A. K.
2018-02-01
Quantum key distribution technologies promise information-theoretic security and are currently being deployed in com-mercial applications. We review new frontiers in information security technologies in communications and distributed storage applications with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography. We analyze the cur-rent state-of-the-art, critical characteristics, development trends, and limitations of these techniques for application in enterprise information protection systems. An approach concerning the selection of practical encryption technologies for enterprises with branched communication networks is discussed.
Integrated situational awareness for cyber attack detection, analysis, and mitigation
NASA Astrophysics Data System (ADS)
Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng
2012-06-01
Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.
Trusted computation through biologically inspired processes
NASA Astrophysics Data System (ADS)
Anderson, Gustave W.
2013-05-01
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends the state-of-the-art in enterprise anti-exploitation technologies by providing collective immunity through backup and cross-checking, proactive health monitoring and adaptive/autonomic threat response, and network resource diversity.
CHIPS. Volume 27, Number 2, April-June 2009
2009-07-01
unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Navy Network Enterprise 9 CARS Task Force Shortens Original Timeline – Reducing the number of Navy legacy networks to improve security and save...NETWARCOM and edited from the original article published in the Winter 2008-2009 edition of Info Domain. “A plan of action and milestones (POA&M) for
Physical security and IT convergence: Managing the cyber-related risks.
McCreight, Tim; Leece, Doug
The convergence of physical security devices into the corporate network is increasing, due to the perceived economic benefits and efficiencies gained from using one enterprise network. Bringing these two networks together is not without risk. Physical devices like closed circuit television cameras (CCTV), card access readers, and heating, ventilation and air conditioning controllers (HVAC) are typically not secured to the standards we expect for corporate computer networks. These devices can pose significant risks to the corporate network by creating new avenues to exploit vulnerabilities in less-than-secure implementations of physical systems. The ASIS Information Technology Security Council (ITSC) developed a white paper describing steps organisations can take to reduce the risks this convergence can pose, and presented these concepts at the 2015 ASIS/ISC2 Congress in Anaheim, California.
Integration of hybrid wireless networks in cloud services oriented enterprise information systems
NASA Astrophysics Data System (ADS)
Li, Shancang; Xu, Lida; Wang, Xinheng; Wang, Jue
2012-05-01
This article presents a hybrid wireless network integration scheme in cloud services-based enterprise information systems (EISs). With the emerging hybrid wireless networks and cloud computing technologies, it is necessary to develop a scheme that can seamlessly integrate these new technologies into existing EISs. By combining the hybrid wireless networks and computing in EIS, a new framework is proposed, which includes frontend layer, middle layer and backend layers connected to IP EISs. Based on a collaborative architecture, cloud services management framework and process diagram are presented. As a key feature, the proposed approach integrates access control functionalities within the hybrid framework that provide users with filtered views on available cloud services based on cloud service access requirements and user security credentials. In future work, we will implement the proposed framework over SwanMesh platform by integrating the UPnP standard into an enterprise information system.
Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kelic, Andjelka; Campbell, Philip L
The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.
NASA Astrophysics Data System (ADS)
Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele
2018-04-01
Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.
Design and research on the platform of network manufacture product electronic trading
NASA Astrophysics Data System (ADS)
Zhou, Zude; Liu, Quan; Jiang, Xuemei
2003-09-01
With the rapid globalization of market and business, E-trading affects every manufacture enterprise. However, the security of network manufacturing products of transmission on Internet is very important. In this paper we discussed the protocol of fair exchange and platform for network manufacture products E-trading based on fair exchange protocol and digital watermarking techniques. The platform realized reliable and copyright protection.
2014-12-01
Area Code) (937) 528-8142 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39-18 1 MITCHELL, LOLITA V CIV USAF AFMC AFRL/RYOX To...MITCHELL, LOLITA V CIV USAF AFMC AFRL/RYOX Subject: FW: Final Report Change - Search and Rescue Security Assessment From: J M Schlesselman [mailto:joe
CHIPS. Volume 29, Issue 1, January - March 2011
2011-03-01
services, like electricity, heating or cable television. Bank/Finance Fraud: • They may create counterfeit checks using their victim’s name or...consolidating disparate, stove- piped networks into a single, modern, cost-effective enterprise network with a high level of service that meets...Holland, NGEN program manager. “If NMCI is not the most secure network in the world, it is certainly close. There is no shortfall flexibility
Hybrid methods for cybersecurity analysis :
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Warren Leon,; Dunlavy, Daniel M.
2014-01-01
Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less
Cryptography for a High-Assurance Web-Based Enterprise
2013-10-01
2. Other Cryptographic services - Java provides many cryptographic services through the Java Cryptography Architecture (JCA) framework. The...id=2125 [7]. Miller, Sandra Kay, Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, [8]. José R.C
Enterprise Considerations for Ports and Protocols
2016-10-21
selected communications. These protocols are restricted to specific ports or addresses in the receiving web service. HTTPS is familiarly restricted...in use by the web services and applications that are connected to the network are required for interoperability and security. Policies specify the...network or reside at the end-points (i.e., web services or clients). ____________________________ Manuscript received June 1, 2016; revised July
SPECIAL PURPOSE IT DERAILED: UNINTENDED CONSEQUENCES OF UNIVERSAL IT LAWS AND POLICIES
2017-10-26
Information Services Division ........................ 3 Figure 2: iNET Instrumentation Telemetry Ground Station...consolidate local Information Technology (IT) networks into an enterprise architecture to reduce costs and to increase security. Leadership coined this...IT network was established to link Air Force and contractor sites to seamlessly share program information . So when Air Force IT leadership tried to
A Real-Time Decision Support System for Voltage Collapse Avoidance in Power Supply Networks
NASA Astrophysics Data System (ADS)
Chang, Chen-Sung
This paper presents a real-time decision support system (RDSS) based on artificial intelligence (AI) for voltage collapse avoidance (VCA) in power supply networks. The RDSS scheme employs a fuzzy hyperrectangular composite neural network (FHRCNN) to carry out voltage risk identification (VRI). In the event that a threat to the security of the power supply network is detected, an evolutionary programming (EP)-based algorithm is triggered to determine the operational settings required to restore the power supply network to a secure condition. The effectiveness of the RDSS methodology is demonstrated through its application to the American Electric Power Provider System (AEP, 30-bus system) under various heavy load conditions and contingency scenarios. In general, the numerical results confirm the ability of the RDSS scheme to minimize the risk of voltage collapse in power supply networks. In other words, RDSS provides Power Provider Enterprises (PPEs) with a viable tool for performing on-line voltage risk assessment and power system security enhancement functions.
Information security of power enterprises of North-Arctic region
NASA Astrophysics Data System (ADS)
Sushko, O. P.
2018-05-01
The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Withdrawal of Eligible Book-entry Enterprise... FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.16 Withdrawal of Eligible Book-entry Enterprise Securities for conversion to definitive form. (a) Eligible Book-entry Enterprise Securities may be withdrawn...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Withdrawal of Eligible Book-entry Enterprise... FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.16 Withdrawal of Eligible Book-entry Enterprise Securities for conversion to definitive form. (a) Eligible Book-entry Enterprise Securities may be withdrawn...
Vulnerability survival analysis: a novel approach to vulnerability management
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; Sullivan, John; Cybenko, George
2017-05-01
Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.
Governing for Enterprise Security
2005-06-01
1 2 W hat Is Governing for Enterprise Security? ................................................ 5 3 W hat Are the Risks ...oversight and coordination 2. Areas of responsibility 3. Risk measurement 4. Monitoring and testing 5 . Reporting 6. Acceptable residual risk These...and O pportunities? ............................................... 10 3.1 Enterprise Risk and Enterprise Security Risk
Offensive Cybersecurity in the NIST Cybersecurity Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bulyk, Mykhaylo; Evans, Dr. Nathaniel
Government and corporate computer systems are attacked, networks are penetrated by hackers, and enterprises are protected by demilitarized zones. Language that until recently was used to describe security and warfare in military settings has now become common-place in cybersecurity discussions. The concepts of pre-emptive attack, counterattack and offensive defense fit the linguistic cultural thread of security in cyberspace, at least in part due to the taxonomy adopted by cybersecurity as a discipline.
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Homer; Ashok Varikuti; Xinming Ou
Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less
2000-08-01
identify changes to the risk levels of business network functions based on proposed modifications. Expert can model networks as well (see special...network from departmental systems to enterprise-wide environments. ACX is scaled with the use of a Policy Model Database(PMDB). The PMDB is a management...This Entry February 8, 2000 Description BlackICE Defender is a host-based intrusion detector designed for use on home or small business systems. It
2004-06-01
Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect
Network configuration management : paving the way to network agility.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maestas, Joseph H.
2007-08-01
Sandia networks consist of nearly nine hundred routers and switches and nearly one million lines of command code, and each line ideally contributes to the capabilities of the network to convey information from one location to another. Sandia's Cyber Infrastructure Development and Deployment organizations recognize that it is therefore essential to standardize network configurations and enforce conformance to industry best business practices and documented internal configuration standards to provide a network that is agile, adaptable, and highly available. This is especially important in times of constrained budgets as members of the workforce are called upon to improve efficiency, effectiveness, andmore » customer focus. Best business practices recommend using the standardized configurations in the enforcement process so that when root cause analysis results in recommended configuration changes, subsequent configuration auditing will improve compliance to the standard. Ultimately, this minimizes mean time to repair, maintains the network security posture, improves network availability, and enables efficient transition to new technologies. Network standardization brings improved network agility, which in turn enables enterprise agility, because the network touches all facets of corporate business. Improved network agility improves the business enterprise as a whole.« less
Integrating QoS and security functions in an IP-VPN gateway
NASA Astrophysics Data System (ADS)
Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy
2001-10-01
IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
MPLS Unleashed: Remedy Using IPSEC over MPLS VPN
NASA Astrophysics Data System (ADS)
Shirazi, Syed Noor-Ul-Hassan; Asim, Muhammad; Irfan, Muhammad; Ikram, Nassar
As a result of globalization, companies are striving to reach out to their customers, suppliers and partners thus extending their enterprise to provide access to critical information and offer their services upon whom their business is dependent. The bedrock of far reaching enterprise is IP network. Researchers have developed core network technology like MPLS with promising features of flexibility, scalability and security to enable enterprises to extend their businesses and transact successfully. As a result, MPLS is widely used in supporting applications like data, voice and video on the internet. It has been highly competitive from its predecessors Frame relay and ATM in terms of providing supports services. Notwithstanding its attributes, there are vulnerabilities and risks associated with MPLS. Recent papers and research reports have highlighted such issues. This paper represents a further contribution in identifying MPLS vulnerabilities and risks. In addition to discussing conventional approach of mitigating those risks, the paper also proposes IPSEC over MPLS VPN and its benefit over conventional approach.
The ESID Online Database network.
Guzman, D; Veit, D; Knerr, V; Kindle, G; Gathmann, B; Eades-Perner, A M; Grimbacher, B
2007-03-01
Primary immunodeficiencies (PIDs) belong to the group of rare diseases. The European Society for Immunodeficiencies (ESID), is establishing an innovative European patient and research database network for continuous long-term documentation of patients, in order to improve the diagnosis, classification, prognosis and therapy of PIDs. The ESID Online Database is a web-based system aimed at data storage, data entry, reporting and the import of pre-existing data sources in an enterprise business-to-business integration (B2B). The online database is based on Java 2 Enterprise System (J2EE) with high-standard security features, which comply with data protection laws and the demands of a modern research platform. The ESID Online Database is accessible via the official website (http://www.esid.org/). Supplementary data are available at Bioinformatics online.
An Agile Enterprise Regulation Architecture for Health Information Security Management
Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie
2010-01-01
Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748
An agile enterprise regulation architecture for health information security management.
Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie
2010-09-01
Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.
A security mediator for health care information.
Wiederhold, G.; Bilello, M.; Sarathy, V.; Qian, X.
1996-01-01
The TIHI (Trusted Interoperation of Healthcare Information) project addresses a security issue that arises when some information is being shared among collaborating enterprises, although not all enterprise information is sharable. It assumes that protection exists to prevent intrusion by adversaries through secure transmission and firewalls. The TIHI system design provides a gateway, owned by the enterprise security officer, to mediate queries and responses. The latter are typically transmitted via the Internet. The enterprise policy is determined by rules provided to the mediator. We show examples of typical rules. The problem and our solution, although developed in a healthcare context, is equally valid among collaborating enterprises. PMID:8947640
Performance optimization of internet firewalls
NASA Astrophysics Data System (ADS)
Chiueh, Tzi-cker; Ballman, Allen
1997-01-01
Internet firewalls control the data traffic in and out of an enterprise network by checking network packets against a set of rules that embodies an organization's security policy. Because rule checking is computationally more expensive than routing-table look-up, it could become a potential bottleneck for scaling up the performance of IP routers, which typically implement firewall functions in software. in this paper, we analyzed the performance problems associated with firewalls, particularly packet filters, propose a good connection cache to amortize the costly security check over the packets in a connection, and report the preliminary performance results of a trace-driven simulation that show the average packet check time can be reduced by a factor of 2.5 at the least.
78 FR 32696 - Jupiter Enterprises, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Jupiter Enterprises, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Jupiter Enterprises, Inc. because it has not...
Data Protection-Aware Design for Cloud Services
NASA Astrophysics Data System (ADS)
Creese, Sadie; Hopkins, Paul; Pearson, Siani; Shen, Yun
The Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. This paper seeks to begin the process of designing data protection controls into clouds from the outset so as to avoid the costs associated with bolting on security as an afterthought. Our approach is firstly to consider cloud maturity from an enterprise level perspective, describing a novel capability maturity model. We use this model to explore privacy controls within an enterprise cloud deployment, and explore where there may be opportunities to design in data protection controls as exploitation of the Cloud matures. We demonstrate how we might enable such controls via the use of design patterns. Finally, we consider how Service Level Agreements (SLAs) might be used to ensure that third party suppliers act in support of such controls.
Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Josserand, Terry Michael; Young, Leone; Chamberlin, Edwin Phillip
The Nuclear Security Enterprise, managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the Nuclear Security Enterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon data yields four summary observations thatmore » estimators and analysts of the Nuclear Security Enterprise will find useful.« less
Designing and application of SAN extension interface based on CWDM
NASA Astrophysics Data System (ADS)
Qin, Leihua; Yu, Shengsheng; Zhou, Jingli
2005-11-01
As Fibre Channel (FC) becomes the protocol of choice within corporate data centers, enterprises are increasingly deploying SANs in their data central. In order to mitigate the risk of losing data and improve the availability of data, more and more enterprises are increasingly adopting storage extension technologies to replicate their business critical data to a secondary site. Transmitting this information over distance requires a carrier grade environment with zero data loss, scalable throughput, low jitter, high security and ability to travel long distance. To address this business requirements, there are three basic architectures for storage extension, they are Storage over Internet Protocol, Storage over Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) and Storage over Dense Wavelength Division Multiplexing (DWDM). Each approach varies in functionality, complexity, cost, scalability, security, availability , predictable behavior (bandwidth, jitter, latency) and multiple carrier limitations. Compared with these connectiviy technologies,Coarse Wavelength Division Multiplexing (CWDM) is a Simplified, Low Cost and High Performance connectivity solutions for enterprises to deploy their storage extension. In this paper, we design a storage extension connectivity over CWDM and test it's electrical characteristic and random read and write performance of disk array through the CWDM connectivity, testing result show us that the performance of the connectivity over CWDM is acceptable. Furthermore, we propose three kinds of network architecture of SAN extension based on CWDM interface. Finally the credit-Based flow control mechanism of FC, and the relationship between credits and extension distance is analyzed.
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
Approach to estimation of level of information security at enterprise based on genetic algorithm
NASA Astrophysics Data System (ADS)
V, Stepanov L.; V, Parinov A.; P, Korotkikh L.; S, Koltsov A.
2018-05-01
In the article, the way of formalization of different types of threats of information security and vulnerabilities of an information system of the enterprise and establishment is considered. In a type of complexity of ensuring information security of application of any new organized system, the concept and decisions in the sphere of information security are expedient. One of such approaches is the method of a genetic algorithm. For the enterprises of any fields of activity, the question of complex estimation of the level of security of information systems taking into account the quantitative and qualitative factors characterizing components of information security is relevant.
2011-05-26
Phillip Stallcup with Agilent Technologies in Huntsville, Ala., talks with NASA employees Leslie Ladner (l) and Kelly Sullivan about spectrum analyzers and other test equipment during the Stennis Technology Expo on May 26. The expo was hosted by NASA Solutions for Enterprise-Wide Procurement and featured various exhibitors demonstrating the latest in a range of technologies, such as training equipment, secure data storage, video networks, distance learning and data management.
Using Swarming Agents for Scalable Security in Large Network Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crouse, Michael; White, Jacob L.; Fulp, Errin W.
2011-09-23
The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less
Develop a solution for protecting and securing enterprise networks from malicious attacks
NASA Astrophysics Data System (ADS)
Kamuru, Harshitha; Nijim, Mais
2014-05-01
In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.
NASA Astrophysics Data System (ADS)
Li, Qing; Wang, Ze-yuan; Cao, Zhi-chao; Du, Rui-yang; Luo, Hao
2015-08-01
With the process of globalisation and the development of management models and information technology, enterprise cooperation and collaboration has developed from intra-enterprise integration, outsourcing and inter-enterprise integration, and supply chain management, to virtual enterprises and enterprise networks. Some midfielder enterprises begin to serve for different supply chains. Therefore, they combine related supply chains into a complex enterprise network. The main challenges for enterprise network's integration and collaboration are business process and data fragmentation beyond organisational boundaries. This paper reviews the requirements of enterprise network's integration and collaboration, as well as the development of new information technologies. Based on service-oriented architecture (SOA), collaboration modelling and collaboration agents are introduced to solve problems of collaborative management for service convergence under the condition of process and data fragmentation. A model-driven methodology is developed to design and deploy the integrating framework. An industrial experiment is designed and implemented to illustrate the usage of developed technologies in this paper.
Cross-Layer Damage Assessment for Cyber Situational Awareness
NASA Astrophysics Data System (ADS)
Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason
Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.
Finite Energy and Bounded Attacks on Control System Sensor Signals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less
Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises
ERIC Educational Resources Information Center
Shah, Ashish
2017-01-01
Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-08
..., Hewlett Packard Enterprise Business Unit, EG HP Storage, Enterprise Storage, Servers and Networking Storage, APP Management, Research and Development Group, Andover, Massachusetts; Notice of Investigation... Enterprise Business Unit, EG HP Storage, Enterprise Storage, Servers and Networking Storage Division, APP...
12 CFR Appendix C to Part 1720 - Policy Guidance; Safety and Soundness Standards for Information
Code of Federal Regulations, 2011 CFR
2011-01-01
... implementation and reviewing reports from management. 2. Assess Risk. Each Enterprise shall: a. Identify... control risks. 3. Manage and Control Risk. Each Enterprise shall: a. Design its information security... security program. The frequency and nature of such tests should be determined by the Enterprise's risk...
2011-12-01
private company , homeland security and disaster response affects most organizations and networks of people at specific periods of their existence...Preparedness and Assistance Trust Fund, due to controversy over a $2.00 assessment on homeowners’ insurance policies and a $4.00 assessment on commercial...fuel management strategies while taking into consideration rules for traffic safety, insurance and liability factors, right-of-ways and land
2015-02-01
not normally blocked by enterprise firewalls . • Some malware exploited zero-day vulnerabilities as well as attempted to exploit vulnerabilities for...servers, receiving updates, and exfiltrating data. Firewalls are routinely configured to block incoming connections while malware within a target...implemented with layers of technical security controls (e.g., ICS-aware firewalls ) to control network traffic and prevent the spread of malware . Intrusion
2016-03-01
analysis CANES Consolidated Afloat Network and Enterprise Services CIA confidentiality, integrity, availability COOP continuity of operations DMZ...exercises, and increased readiness at sea as CANES is deployed to the Fleet. G. METHODS This work reviews published literature on BC, disaster recovery (DR...mitigation efforts [33]. 5. Consolidated Afloat Networks and Enterprise Services Consolidated Afloat Networks and Enterprise Services ( CANES ) is not
2012-09-01
and Rescue (US&R) teams be used more effectively and efficiently in the Homeland Security Enterprise ( HSE )? 1. Are there other strategies that would...allow the FEMA US&R resources to be more adaptable in the HSE ? 2. What other disciplines could be integrated with the FEMA US&R task forces to...consideration of the questions: 1. Can the FEMA US&R teams be used more effectively in the Homeland Security Enterprise ( HSE )? 2. Are there other
Building a Practical Framework for Enterprise-Wide Security Management
2004-04-28
management. They have found that current efforts to manage security vulnerabilities and security risks only take an enterprise so far, with results...analyzed reports to determine the cause of the increase. Slide 5 © 2004 by Carnegie Mellon University Version 1.0 Secure IT 2004 - page 5 Attack...Nearly 1 in 5 of those surveyed reported that none of their IT staff have any formal security training. [A survey of 896 Computing Technology
7 CFR 4290.825 - Purchasing securities from an underwriter or other third party.
Code of Federal Regulations, 2010 CFR
2010-01-01
... BUSINESS INVESTMENT COMPANY (âRBICâ) PROGRAM Financing of Enterprises by RBICs Structuring Rbic Financing of Eligible Enterprises-Types of Financings § 4290.825 Purchasing securities from an underwriter or...
7 CFR 4290.880 - Assets acquired in liquidation of Portfolio securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INVESTMENT COMPANY (âRBICâ) PROGRAM Financing of Enterprises by RBICs Structuring Rbic Financing of Eligible Enterprises-Types of Financings § 4290.880 Assets acquired in liquidation of Portfolio securities. (a) General...
7 CFR 4290.845 - Maximum rate of amortization on Loans and Debt Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INVESTMENT COMPANY (âRBICâ) PROGRAM Financing of Enterprises by RBICs Structuring Rbic Financing of Eligible Enterprises-Types of Financings § 4290.845 Maximum rate of amortization on Loans and Debt Securities. The...
Enterprise Networking Web Sites and Organizational Communication in Australia
ERIC Educational Resources Information Center
Zhang, Allee M.; Zhu, Yunxia; Hildebrandt, Herbert
2009-01-01
This article aims to report initial findings about networking in organizational settings in Australia through the use of enterprise social software. According to Gray and Honick (2008), enterprise social software (also known as Enterprise 2.0) is a term describing social software used in businesses and enterprises. It includes such tools as…
The Essence and Phases of the Comprehensive System of Ensuring the Economic Security of Enterprise
ERIC Educational Resources Information Center
Ianioglo, Alina; Polajeva, Tatjana
2017-01-01
In present conditions of instability of the environment, entrepreneurs assume the most of the business risks. In this regard, problems of ensuring the economic security become particularly important. The comprehensive system of ensuring the economic security of enterprise was worked out and the results are presented in the article. This system is…
Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks
NASA Astrophysics Data System (ADS)
DeCusatis, Casimer M.; Priest, David G.
2000-12-01
Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.
Threat Based Risk Assessment for Enterprise Networks
2016-02-15
served as the program chair of the Research in Attacks, Intrusions , and Defenses workshop; the Neural Information Processing Systems (NIPS) annual...Threat- Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires...include aids for the hearing impaired, speech recognition, pattern classification, neural networks , and cybersecurity. He has taught three courses
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
NASA Astrophysics Data System (ADS)
Kapulin, D. V.; Chemidov, I. V.; Kazantsev, M. A.
2017-01-01
In the paper, the aspects of design, development and implementation of the automated control system for warehousing under the manufacturing process of the radio-electronic enterprise JSC «Radiosvyaz» are discussed. The architecture of the automated control system for warehousing proposed in the paper consists of a server which is connected to the physically separated information networks: the network with a database server, which stores information about the orders for picking, and the network with the automated storage and retrieval system. This principle allows implementing the requirements for differentiation of access, ensuring the information safety and security requirements. Also, the efficiency of the developed automated solutions in terms of optimizing the warehouse’s logistic characteristics is researched.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali
2008-01-01
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with the goal of improved enterprise and business risk management. Economic uncertainty, intensively collaborative work styles, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation of a balanced approach. The Cyberspace Security Econometrics System (CSES) provides a measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder,more » CSES reflects the variance that may exist among the stakes one attaches to meeting each requirement. This paper summarizes the basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural underpinnings.« less
Assessing a decade of public health preparedness: progress on the precipice?
Gursky, Elin A; Bice, Gregory
2012-03-01
September 11 and the subsequent anthrax attacks marked the beginning of significant investment by the federal government to develop a national public health emergency response capability. Recognizing the importance of the public health sector's contribution to the burgeoning homeland security enterprise, this investment was intended to convey a "dual benefit" by strengthening the overall public health infrastructure while building preparedness capabilities. In many instances, federal funds were used successfully for preparedness activities. For example, electronic health information networks, a Strategic National Stockpile, and increased interagency cooperation have all contributed to creating a more robust and prepared enterprise. Additionally, the knowledge of rarely seen or forgotten pathogens has been regenerated through newly established public health learning consortia, which, too, have strengthened relationships between the practice and academic communities. Balancing traditional public health roles with new preparedness responsibilities heightened public health's visibility, but it also presented significant complexities, including expanded lines of reporting and unremitting inflows of new guidance documents. Currently, a rapidly diminishing public health infrastructure at the state and local levels as a result of federal budget cuts and a poor economy serve as significant barriers to sustaining these nascent federal public health preparedness efforts. Sustaining these improvements will require enhanced coordination, collaboration, and planning across the homeland security enterprise; an infusion of innovation and leadership; and sustained transformative investment for governmental public health.
Cyberspace Security Econometrics System (CSES)
DOE Office of Scientific and Technical Information (OSTI.GOV)
2012-07-27
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variancemore » that may exist among the stakes one attaches to meeting each requirement.« less
2017-01-18
1 AN/VRC 118 Mid-Tier Networking Vehicular Radio and Joint Enterprise Network Manager Early Fielding Report This report provides my assessment of...the AN/VRC-118 Mid-Tier Networking Vehicular Radio (MNVR) and the Joint Enterprise Network Manager (JENM) in support of the Army’s fielding of low...September 2016 ADM does not address the JENM, which must be fielded with MNVR to allow soldiers to configure and manage the software- defined radio
7 CFR 4290.850 - Restrictions on redemption of Equity Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... BUSINESS-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE RURAL BUSINESS INVESTMENT COMPANY (âRBICâ) PROGRAM Financing of Enterprises by RBICs Structuring Rbic Financing of Eligible Enterprises-Types of Financings § 4290.850 Restrictions on redemption of Equity Securities. (a) Restriction on...
ERIC Educational Resources Information Center
Muthoni Thuo, Caroline
2011-01-01
This paper examines the levels of household food security and the influence of enterprise diversification on household food security among small-scale sugarcane farmers in Muhoroni division, Nyando District, Kenya. A cross-sectional research design was used in this study. The population consisted of small-scale sugarcane farmers who grow sugarcane…
2016-12-01
HSE BoK. Rule One —Allow cultural change over time. Using the Mastering Group and the Creating column (six points), the objective would be, “ Design ...is designed to address these topics. This introduction is followed by a literature review to establish some background on the demands for information...relies on key components of large group dynamics. The first is playful creation or a “loose, playful atmosphere and fun at work” that makes wikis
2003-03-01
is a 20-ft (6.1-m) mast supporting a cell phone antenna and a solar panel. Contained with in the enclosure is a Forest Technology Systems data...logger, a deep cycle battery, a voltage regulator, a cell phone modem, and a Motorola cell phone . The stream level, turbidity, and soil moisture sensors...DOIM) Security Protocols at Fort Hood, computers connected to the Fort Hood network cannot utilize cell phone communication to retrieve the data
[Innovative teleradiology network: concept and experience report].
Kämmerer, M; Bethge, O T; Antoch, G
2014-04-01
(DICOM E-MAIL provides a standardized way for exchanging DICOM objects (Digital Imaging and Communications in Medicine) and further relevant patient data for the treatment context reliably and securely via encrypted e-mails. The current version of the DICOM E-MAIL standard recommendations of the"Deutsche Röntgengesellschaft" (DRG, German Röntgen Society) defines for the first time options for setting up a special directory service for the provision and distribution of communication data of all participants in a network. By using such"telephone books", networks of any size can be operated independent of the provider. Compared to a Cross-Enterprise Document Sharing (XDS) scenario, the required infrastructure is considerably less complex and quicker to realize. Critical success factors are, in addition to the technology and an effective support, that the participants themselves contribute to the further development of the network and in this way, the network approach can be practiced.
12 CFR 1250.2 - Procedural requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requirements. (a) Procedures. An Enterprise shall implement procedures reasonably designed to ensure for any loan that is secured by improved real estate or a mobile home located in an area that has been... amended and purchased by the Enterprise, the building or mobile home and any personal property securing...
Security model for picture archiving and communication systems.
Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K
2000-05-01
The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.
Stability of ecological industry chain: an entropy model approach.
Wang, Qingsong; Qiu, Shishou; Yuan, Xueliang; Zuo, Jian; Cao, Dayong; Hong, Jinglan; Zhang, Jian; Dong, Yong; Zheng, Ying
2016-07-01
A novel methodology is proposed in this study to examine the stability of ecological industry chain network based on entropy theory. This methodology is developed according to the associated dissipative structure characteristics, i.e., complexity, openness, and nonlinear. As defined in the methodology, network organization is the object while the main focus is the identification of core enterprises and core industry chains. It is proposed that the chain network should be established around the core enterprise while supplementation to the core industry chain helps to improve system stability, which is verified quantitatively. Relational entropy model can be used to identify core enterprise and core eco-industry chain. It could determine the core of the network organization and core eco-industry chain through the link form and direction of node enterprises. Similarly, the conductive mechanism of different node enterprises can be examined quantitatively despite the absence of key data. Structural entropy model can be employed to solve the problem of order degree for network organization. Results showed that the stability of the entire system could be enhanced by the supplemented chain around the core enterprise in eco-industry chain network organization. As a result, the sustainability of the entire system could be further improved.
Landman, Adam; Emani, Srinivas; Carlile, Narath; Rosenthal, David I; Semakov, Simon; Pallin, Daniel J; Poon, Eric G
2015-01-02
Photographs are important tools to record, track, and communicate clinical findings. Mobile devices with high-resolution cameras are now ubiquitous, giving clinicians the opportunity to capture and share images from the bedside. However, secure and efficient ways to manage and share digital images are lacking. The aim of this study is to describe the implementation of a secure application for capturing and storing clinical images in the electronic health record (EHR), and to describe initial user experiences. We developed CliniCam, a secure Apple iOS (iPhone, iPad) application that allows for user authentication, patient selection, image capture, image annotation, and storage of images as a Portable Document Format (PDF) file in the EHR. We leveraged our organization's enterprise service-oriented architecture to transmit the image file from CliniCam to our enterprise clinical data repository. There is no permanent storage of protected health information on the mobile device. CliniCam also required connection to our organization's secure WiFi network. Resident physicians from emergency medicine, internal medicine, and dermatology used CliniCam in clinical practice for one month. They were then asked to complete a survey on their experience. We analyzed the survey results using descriptive statistics. Twenty-eight physicians participated and 19/28 (68%) completed the survey. Of the respondents who used CliniCam, 89% found it useful or very useful for clinical practice and easy to use, and wanted to continue using the app. Respondents provided constructive feedback on location of the photos in the EHR, preferring to have photos embedded in (or linked to) clinical notes instead of storing them as separate PDFs within the EHR. Some users experienced difficulty with WiFi connectivity which was addressed by enhancing CliniCam to check for connectivity on launch. CliniCam was implemented successfully and found to be easy to use and useful for clinical practice. CliniCam is now available to all clinical users in our hospital, providing a secure and efficient way to capture clinical images and to insert them into the EHR. Future clinical image apps should more closely link clinical images and clinical documentation and consider enabling secure transmission over public WiFi or cellular networks.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of QPC Lasers, Inc., Sweet Success Enterprises, Inc., Trinsic, Inc., Veridicom International, Inc., Windswept Environmental Group... securities of QPC Lasers, Inc. because it has not filed any periodic reports since the period ended June 30...
Coercion for Hire: A Theory of Indirect Coercion
2014-06-01
Studies, 2006). 177 Hamzeh, In the Path of Hizbullah, 63. 178 Hezbollah: Financing Terror through Criminal Enterprise. Homeland Security and...1992. 102 Hezbollah: Financing Terror through Criminal Enterprise. Homeland Security and Governmental Affairs, United States Senate sess., May 25...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited COERCION FOR HIRE
A Study on Market-based Strategic Procurement Planning in Convergent Supply Networks
NASA Astrophysics Data System (ADS)
Opadiji, Jayeola Femi; Kaihara, Toshiya
We present a market-based decentralized approach which uses a market-oriented programming algorithm to obtain Pareto-optimal allocation of resources traded among agents which represent enterprise units in a supply network. The proposed method divides the network into a series of Walrsian markets in order to obtain procurement budgets for enterprises in the network. An interaction protocol based on market value propagation is constructed to coordinate the flow of resources across the network layers. The method mitigates the effect of product complementarity in convergent network by allowing for enterprises to hold private valuations of resources in the markets.
Secure and interoperable communication infrastructures for PPDR organisations
NASA Astrophysics Data System (ADS)
Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David
2016-05-01
The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.
NASA Astrophysics Data System (ADS)
Bao, Yanli; Hua, Hefeng
2017-03-01
Network capability is the enterprise's capability to set up, manage, maintain and use a variety of relations between enterprises, and to obtain resources for improving competitiveness. Tourism in China is in a transformation period from sightseeing to leisure and vacation. Scenic spots as well as tourist enterprises can learn from some other enterprises in the process of resource development, and build up its own network relations in order to get resources for their survival and development. Through the effective management of network relations, the performance of resource development will be improved. By analyzing literature on network capability and the case analysis of Wuxi Huishan Ancient Town, the role of network capacity in the tourism resource development is explored and resource development path is built from the perspective of network capability. Finally, the tourism resource development process model based on network capacity is proposed. This model mainly includes setting up network vision, resource identification, resource acquisition, resource utilization and tourism project development. In these steps, network construction, network management and improving network center status are key points.
Comparing Notes: Collaborative Networks, Breeding Environments, and Organized Crime
NASA Astrophysics Data System (ADS)
Hernández, Alejandro
Collaborative network theory can be useful in refining current understanding of criminal networks and aid in understanding their evolution. Drug trafficking organizations that operate in the region directly north of Colombia’s Valle del Cauca department and the “collection agencies” that operate in the Colombian city of Cali have abandoned hierarchical organizational structures and have become networked-based entities. Through the exposition of Camarinha-Matos and Afsarmanesh’s business networking ideas, this chapter examines the similarities and differences between the application of collaborative networks in licit enterprises, such as small and medium enterprises in Europe, and how the networks might be used by illicit criminal enterprises in Colombia.
Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.
He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna
2017-09-06
With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.
Storing and using health data in a virtual private cloud.
Regola, Nathan; Chawla, Nitesh V
2013-03-13
Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical methods to the data and will also enable a wide variety of new applications that will be meaningful to patients and medical professionals. Researchers are often granted access to health care data to assist in the data mining process, but HIPAA regulations mandate comprehensive safeguards to protect the data. Often universities (and presumably other research organizations) have an enterprise information technology infrastructure and a research infrastructure. Unfortunately, both of these infrastructures are generally not appropriate for sensitive research data such as HIPAA, as they require special accommodations on the part of the enterprise information technology (or increased security on the part of the research computing environment). Cloud computing, which is a concept that allows organizations to build complex infrastructures on leased resources, is rapidly evolving to the point that it is possible to build sophisticated network architectures with advanced security capabilities. We present a prototype infrastructure in Amazon's Virtual Private Cloud to allow researchers and practitioners to utilize the data in a HIPAA-compliant environment.
Tailoring PKI for the battlespace
NASA Astrophysics Data System (ADS)
Covey, Carlin R.
2003-07-01
A Public Key Infrastructure (PKI) can provide useful communication protections for friendly forces in the battlespace. The PKI would be used in conjunction with communication facilities that are accorded physical and Type-1 cryptographic protections. The latter protections would safeguard the confidentiality and (optionally) the integrity of communications between enclaves of users, whereas the PKI protections would furnish identification, authentication, authorization and privacy services for individual users. However, Commercial-Off-the-Shelf (COTS) and most Government-Off-the-Shelf (GOTS) PKI solutions are not ideally tailored for the battlespace environment. Most PKI solutions assume a relatively static, high-bandwidth communication network, whereas communication links in the battlespace will be dynamically reconfigured and bandwidth-limited. Most enterprise-wide PKI systems assume that users will enroll and disenroll at an orderly pace, whereas the battlespace PKI "enterprise" will grow and shrink abruptly as units are deployed or withdrawn from the battlespace. COTS and GOTS PKIs are seldom required to incorporate temporary "enterprise mergers", whereas the battlespace "enterprise" will need to incorporate temporary coalitions of forces drawn from various nations. This paper addresses both well-known and novel techniques for tailoring PKI for the battlespace environment. These techniques include the design of the security architecture, the selection of appropriate options within PKI standards, and some new PKI protocols that offer significant advantages in the battlespace.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Abercrombie, Robert K; Mili, Ali
2009-01-01
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. This paper proposes a Cyberspace Security Econometrics System (CSES) that provides a measure (i.e., a quantitative indication) of reliability, performance and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. Formore » a given stakeholder, CSES reflects the variance that may exist among the stakes she/he attaches to meeting each requirement. This paper introduces the basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings.« less
Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T
2014-01-01
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSESmore » accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.« less
Improving organisational resilience through enterprise security risk management.
Petruzzi, John; Loyear, Rachelle
Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... Development Corp., and Arcland Energy Corp.; Order of Suspension of Trading October 20, 2011. It appears to... current and accurate information concerning the securities of American Enterprise Development Corp... securities of Arcland Energy Corp. because it has not filed any periodic reports since the period ended April...
Benefits of Enterprise Ontology for the Development of ICT-Based Value Networks
NASA Astrophysics Data System (ADS)
Albani, Antonia; Dietz, Jan L. G.
The competitiveness of value networks is highly dependent on the cooperation between business partners and the interoperability of their information systems. Innovations in information and communication technology (ICT), primarily the emergence of the Internet, offer possibilities to increase the interoperability of information systems and therefore enable inter-enterprise cooperation. For the design of inter-enterprise information systems, the concept of business component appears to be very promising. However, the identification of business components is strongly dependent on the appropriateness and the quality of the underlying business domain model. The ontological model of an enterprise - or an enterprise network - as presented in this article, is a high-quality and very adequate business domain model. It provides all essential information that is necessary for the design of the supporting information systems, and at a level of abstraction that makes it also understandable for business people. The application of enterprise ontology for the identification of business components is clarified. To exemplify our approach, a practical case is taken from the domain of strategic supply network development. By doing this, a widespread problem of the practical application of inter-enterprise information systems is being addressed.
Selection of the Best Security Controls for Rapid Development of Enterprise-Level Cyber Security
2017-03-01
time, money , and people, which in most cases are very restricted. To rapidly build up “the first line of defense,” enterprises should select the most...any other development effort, cyber capability development requires resources of time, money , and people, which in most cases are very restricted...that provide the most security per unit of time, money , or human capital investment. A. CYBER: THE FIFTH DOMAIN OF WARFARE Leon E. Panetta, the U.S
CMA Member Survey: Network Management Systems Showing Little Improvement.
ERIC Educational Resources Information Center
Lusa, John M.
1998-01-01
Discusses results of a survey of 112 network and telecom managers--members of the Communications Managers Association (CMA)--to identify problems relating to the operation of large enterprise networks. Results are presented in a table under categories of: respondent profile; network management systems; carrier management; enterprise management;…
The Reality Of The Homeland Security Enterprise Information Sharing Environment
2017-12-01
THE HOMELAND SECURITY ENTERPRISE INFORMATION SHARING ENVIRONMENT by Michael E. Brown December 2017 Thesis Advisors: Erik Dahl Robert...collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources...gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this burden estimate or
NASA Astrophysics Data System (ADS)
Möller, Thomas; Bellin, Knut; Creutzburg, Reiner
2015-03-01
The aim of this paper is to show the recent progress in the design and prototypical development of a software suite Copra Breeder* for semi-automatic generation of test methodologies and security checklists for IT vulnerability assessment in small and medium-sized enterprises.
Proactive Security Testing and Fuzzing
NASA Astrophysics Data System (ADS)
Takanen, Ari
Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.
NASA Astrophysics Data System (ADS)
Farroha, Bassam; Farroha, Deborah
2012-05-01
Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.
Positioning the library at the epicenter of the networked biomedical enterprise.
Stead, W W
1998-01-01
The changing economic environment in which our biomedical enterprises operate presents unparalleled opportunities to the profession of medical librarianship. Evidence-based medicine, patient empowerment, asynchronous learning networks, and research colaboratories each involve a new type of shared information, or access to information in new ways or by different people. These tasks are ones with which librarianship is directly involved. Librarians are therefore placed perfectly to provide new products and services. To position the library at the epicenter of the networked biomedical enterprise we must meet three challenges: We must align the library's business strategy with that of the larger enterprise. We must provide services in ways that will scale-up to enable new business strategies. We must measure the effectiveness of services in ways that document their role in supporting the enterprise.
NASA Astrophysics Data System (ADS)
Yang, Yan; Shao, Yunfei; Tang, Xiaowo
Based on mass related literature on enterprise network, the key influence factors are reduced to Trust, Control, Relationship and Interaction. Meanwhile, the specific contradiction matrices, judgment matrices and strategy collections based on TRIZ are constructed which make the connotation of contradiction matrices in TRIZ extended. Finally they are applied to the construction of the collaborative model on enterprise network based on Multi Agent System (MAS).
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... Public Comments Regarding Small and Medium Enterprises' Understanding of and Compliance With the Export Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Notice of Inquiry. SUMMARY... the public regarding small and medium enterprises' (SMEs) understanding of and compliance with export...
Interoperability in healthcare: major challenges in the creation of the enterprise environment
NASA Astrophysics Data System (ADS)
Lindsköld, L.; Wintell, M.; Lundberg, N.
2009-02-01
There is today a lack of interoperability in healthcare although the need for it is obvious. A new healthcare enterprise environment has been deployed for secure healthcare interoperability in the Western Region in Sweden (WRS). This paper is an empirical overview of the new enterprise environment supporting regional shared and transparent radiology domain information in the WRS. The enterprise environment compromises 17 radiology departments, 1,5 million inhabitants, using different RIS and PACS in a joint work-oriented network and additional cardiology, dentistry and clinical physiology departments. More than 160 terabytes of information are stored in the enterprise repository. Interoperability is developed according to the IHE mission, i.e. applying standards such as Digital Imaging and Communication in Medicine (DICOM) and Health Level 7 (HL7) to address specific clinical communication needs and support optimal patient care. The entire enterprise environment is implemented and used daily in WRS. The central prerequisites in the development of the enterprise environment in western region of Sweden were: 1) information harmonization, 2) reuse of standardized messages e.g. HL7 v2.x and v3.x, 3) development of a holistic information domain including both text and images, and 4) to create a continuous and dynamic update functionality. The central challenges in this project were: 1) the many different vendors acting in the region and the negotiations with them to apply communication roles/profiles such as HL7 (CDA, CCR), DICOM, and XML, 2) the question of whom owns the data, and 3) incomplete technical standards. This study concludes that to create a workflow that runs within an enterprise environment there are a number of central prerequisites and challenges that needs to be in place. This calls for negotiations on an international, national and regional level with standardization organizations, vendors, health management and health personnel.
Concurrent enterprise: a conceptual framework for enterprise supply-chain network activities
NASA Astrophysics Data System (ADS)
Addo-Tenkorang, Richard; Helo, Petri T.; Kantola, Jussi
2017-04-01
Supply-chain management (SCM) in manufacturing industries has evolved significantly over the years. Recently, a lot more relevant research has picked up on the development of integrated solutions. Thus, seeking a collaborative optimisation of geographical, just-in-time (JIT), quality (customer demand/satisfaction) and return-on-investment (profits), aspects of organisational management and planning through 'best practice' business-process management - concepts and application; employing system tools such as certain applications/aspects of enterprise resource planning (ERP) - SCM systems information technology (IT) enablers to enhance enterprise integrated product development/concurrent engineering principles. This article assumed three main organisation theory applications in positioning its assumptions. Thus, proposing a feasible industry-specific framework not currently included within the SCOR model's level four (4) implementation level, as well as other existing SCM integration reference models such as in the MIT process handbook's - Process Interchange Format (PIF), the TOVE project, etc. which could also be replicated in other SCs. However, the wider focus of this paper's contribution will be concentrated on a complimentary proposed framework to the SCC's SCOR reference model. Quantitative empirical closed-ended questionnaires in addition to the main data collected from a qualitative empirical real-life industrial-based pilot case study were used: To propose a conceptual concurrent enterprise framework for SCM network activities. This research adopts a design structure matrix simulation approach analysis to propose an optimal enterprise SCM-networked value-adding, customised master data-management platform/portal for efficient SCM network information exchange and an effective supply-chain (SC) network systems-design teams' structure. Furthermore, social network theory analysis will be employed in a triangulation approach with statistical correlation analysis to assess the scale/level of frequency, importance, level of collaborative-ness, mutual trust as well as roles and responsibility among the enterprise SCM network for systems product development (PD) design teams' technical communication network as well as extensive literature reviews.
NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium
Thomas D'Agostino
2017-12-09
Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.
System architecture of communication infrastructures for PPDR organisations
NASA Astrophysics Data System (ADS)
Müller, Wilmuth
2017-04-01
The growing number of events affecting public safety and security (PS and S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on organizations responsible for PS and S. In order to respond timely and in an adequate manner to such events Public Protection and Disaster Relief (PPDR) organizations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies do not provide broadband capability, which is a major limitation in supporting new services hence new information flows and currently they have no successor. There is also no known standard that addresses interoperability of these technologies. The paper at hands provides an approach to tackle the above mentioned aspects by defining an Enterprise Architecture (EA) of PPDR organizations and a System Architecture of next generation PPDR communication networks for a variety of applications and services on broadband networks, including the ability of inter-system, inter-agency and cross-border operations. The Open Safety and Security Architecture Framework (OSSAF) provides a framework and approach to coordinate the perspectives of different types of stakeholders within a PS and S organization. It aims at bridging the silos in the chain of commands and on leveraging interoperability between PPDR organizations. The framework incorporates concepts of several mature enterprise architecture frameworks including the NATO Architecture Framework (NAF). However, OSSAF is not providing details on how NAF should be used for describing the OSSAF perspectives and views. In this contribution a mapping of the NAF elements to the OSSAF views is provided. Based on this mapping, an EA of PPDR organizations with a focus on communication infrastructure related capabilities is presented. Following the capability modeling, a system architecture for secure and interoperable communication infrastructures for PPDR organizations is presented. This architecture was implemented within a project sponsored by the European Union and successfully demonstrated in a live validation exercise in June 2016.
Storing and Using Health Data in a Virtual Private Cloud
Regola, Nathan
2013-01-01
Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical methods to the data and will also enable a wide variety of new applications that will be meaningful to patients and medical professionals. Researchers are often granted access to health care data to assist in the data mining process, but HIPAA regulations mandate comprehensive safeguards to protect the data. Often universities (and presumably other research organizations) have an enterprise information technology infrastructure and a research infrastructure. Unfortunately, both of these infrastructures are generally not appropriate for sensitive research data such as HIPAA, as they require special accommodations on the part of the enterprise information technology (or increased security on the part of the research computing environment). Cloud computing, which is a concept that allows organizations to build complex infrastructures on leased resources, is rapidly evolving to the point that it is possible to build sophisticated network architectures with advanced security capabilities. We present a prototype infrastructure in Amazon’s Virtual Private Cloud to allow researchers and practitioners to utilize the data in a HIPAA-compliant environment. PMID:23485880
Maritime Security on the Horn of Africa: Threading the Needle at a Seam of Responsibility
2007-11-06
Chamber of Commerce International Maritime Bureau. “Weekly Piracy Report 13-28 OCT 2007”. http://www.icc-ccs.org/prc/piracyreport.php (accessed 30 October 2007) 2 quarter of 2007 jumped by 37% when compared to the second quarter of 2006.2 The smuggling of refugees across the Gulf of Aden from Somalia to Yemen is also approaching record levels and reflects growing instability in the region. Piracy and human smuggling are motivated by profit and are predominantly criminal enterprises. Although both pirate and terrorist networks exist in
12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...
12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...
12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...
12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...
12 CFR 1700.2 - Organization of the Office of Federal Housing Enterprise Oversight.
Code of Federal Regulations, 2010 CFR
2010-01-01
... regulatory issues, securities and corporate law principles, and administrative and general legal matters... developments in Enterprise activities, housing finance and financial regulation. The Office also prepares data...
No Failure of Imagination: Examining Foundational Flaws in America’s Homeland Security Enterprise
2011-09-01
Casualty Actuarial Society Enterprise Risk Management Committee (2003) has adopted the following definition of ERM in May 2003: ERM is the...refused to go to an air- raid shelter due to the mathematical improbability of a bomb killing him out of all the people in Moscow. He changed his mind... Actuarial Society. Casualty Actuarial Society Enterprise Risk Management Committee. (2003). Technical Report. Overview of enterprise risk management
Cloud Computing and Virtual Desktop Infrastructures in Afloat Environments
2012-06-01
Institute of Standards and Technology NPS Naval Postgraduate School OCONUS Outside of the Continental United States ONE- NET OCONUS Navy Enterprise... framework of technology that allows all interested systems, inside and outside of an organization, to expose and access well-defined services, and...was established to manage the Navy’s three largest enterprise networks; the OCONUS Navy Enterprise 22 Network (ONE- NET ), the Navy-Marine Corps
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
NASA Astrophysics Data System (ADS)
Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.
NASA Astrophysics Data System (ADS)
Gorlov, A. P.; Averchenkov, V. I.; Rytov, M. Yu; Eryomenko, V. T.
2017-01-01
The article is concerned with mathematical simulation of protection level assessment of complex organizational and technical systems of industrial enterprises by creating automated system, which main functions are: information security (IS) audit, forming of the enterprise threats model, recommendations concerning creation of the information protection system, a set of organizational-administrative documentation.
[The health system of Argentina].
Belló, Mariana; Becerril-Montekio, Victor M
2011-01-01
This paper describes the health system of Argentina.This system has three sectors: public, social security and private.The public sector includes the national and provincial ministries as well as the network of public hospitals and primary health care units which provide care to the poor and uninsured population. This sector is financed with taxes and payments made by social security beneficiaries that use public health care facilities. The social security sector or Obras Sociales (OS) covers all workers of the formal economy and their families. Most OS operate through contracts with private providers and are financed with payroll contributions of employers and employees. Finally, the private sector includes all those private providers offering services to individuals, OS beneficiaries and all those with private health insurance.This sector also includes private insurance agencies called Prepaid Medicine Enterprises, financed mostly through premiums paid by families and/or employers.This paper also discusses some of the recent innovations implemented in Argentina, including the program Remediar.
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments
2014-01-01
systems and enterprise services during mission operation can enable greater situational awareness and empowerment for the tactical user . For example...April 01, 2007. [17] Robbins, D., Unmanned Aircraft Operational Integration using MITRE’s Cursor on Target, The Edge, Volume 10, Number 2, MITRE...appropriate level of security protection and quality of service (QoS) for the tactical users is one possibility. Such an approach is not cost ef
ERIC Educational Resources Information Center
Tell, Joakim; Halila, Fawzi
2001-01-01
Small businesses implementing ISO 14001 standards worked with a university to develop a learning network. The network served as a source of inspiration and reflection as well as a sounding board. It enabled small enterprises to act collectively, compensating for individual lack of resources. (SK)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.
Governing for Enterprise Security (Briefing Charts)
2005-01-01
governance/stakeholder.html © 2005 by Carnegie Mellon University page 16 Adequate Security and Operational Risk “Appropriate business security is that which...Sherwood 03] Sherwood, John; Clark; Andrew; Lynas, David. “Systems and Business Security Architecture.” SABSA Limited, 17 September 2003. Available at
Extraction of business relationships in supply networks using statistical learning theory.
Zuo, Yi; Kajikawa, Yuya; Mori, Junichiro
2016-06-01
Supply chain management represents one of the most important scientific streams of operations research. The supply of energy, materials, products, and services involves millions of transactions conducted among national and local business enterprises. To deliver efficient and effective support for supply chain design and management, structural analyses and predictive models of customer-supplier relationships are expected to clarify current enterprise business conditions and to help enterprises identify innovative business partners for future success. This article presents the outcomes of a recent structural investigation concerning a supply network in the central area of Japan. We investigated the effectiveness of statistical learning theory to express the individual differences of a supply chain of enterprises within a certain business community using social network analysis. In the experiments, we employ support vector machine to train a customer-supplier relationship model on one of the main communities extracted from a supply network in the central area of Japan. The prediction results reveal an F-value of approximately 70% when the model is built by using network-based features, and an F-value of approximately 77% when the model is built by using attribute-based features. When we build the model based on both, F-values are improved to approximately 82%. The results of this research can help to dispel the implicit design space concerning customer-supplier relationships, which can be explored and refined from detailed topological information provided by network structures rather than from traditional and attribute-related enterprise profiles. We also investigate and discuss differences in the predictive accuracy of the model for different sizes of enterprises and types of business communities.
NASA Astrophysics Data System (ADS)
Mohr, Ulrich
2001-11-01
For efficient business continuance and backup of mission- critical data an inter-site storage network is required. Where traditional telecommunications costs are prohibitive for all but the largest organizations, there is an opportunity for regional carries to deliver an innovative storage service. This session reveals how a combination of optical networking and protocol-aware SAN gateways can provide an extended storage networking platform with the lowest cost of ownership and the highest possible degree of reliability, security and availability. Companies of every size, with mainframe and open-systems environments, can afford to use this integrated service. Three mayor applications are explained; channel extension, Network Attached Storage (NAS), Storage Area Networks (SAN) and how optical networks address the specific requirements. One advantage of DWDM is the ability for protocols such as ESCON, Fibre Channel, ATM and Gigabit Ethernet, to be transported natively and simultaneously across a single fiber pair, and the ability to multiplex many individual fiber pairs over a single pair, thereby reducing fiber cost and recovering fiber pairs already in use. An optical storage network enables a new class of service providers, Storage Service Providers (SSP) aiming to deliver value to the enterprise by managing storage, backup, replication and restoration as an outsourced service.
Inferring social status and rich club effects in enterprise communication networks.
Dong, Yuxiao; Tang, Jie; Chawla, Nitesh V; Lou, Tiancheng; Yang, Yang; Wang, Bai
2015-01-01
Social status, defined as the relative rank or position that an individual holds in a social hierarchy, is known to be among the most important motivating forces in social behaviors. In this paper, we consider the notion of status from the perspective of a position or title held by a person in an enterprise. We study the intersection of social status and social networks in an enterprise. We study whether enterprise communication logs can help reveal how social interactions and individual status manifest themselves in social networks. To that end, we use two enterprise datasets with three communication channels--voice call, short message, and email--to demonstrate the social-behavioral differences among individuals with different status. We have several interesting findings and based on these findings we also develop a model to predict social status. On the individual level, high-status individuals are more likely to be spanned as structural holes by linking to people in parts of the enterprise networks that are otherwise not well connected to one another. On the community level, the principle of homophily, social balance and clique theory generally indicate a "rich club" maintained by high-status individuals, in the sense that this community is much more connected, balanced and dense. Our model can predict social status of individuals with 93% accuracy.
Patterns of contact within the New Zealand poultry industry.
Lockhart, C Y; Stevenson, M A; Rawdon, T G; Gerber, N; French, N P
2010-07-01
Members of the Poultry Industry Association and the Egg Producers Federation of New Zealand (n=420) were sent a questionnaire asking them to describe the type and frequency of on- and off-enterprise movements relating to feed, live birds and hatching eggs, table eggs and poultry product, and manure and waste litter. Social network analyses were used to describe patterns of contact among poultry enterprises and their associates for these four movement types. The response rate to the survey was 58% (244 out of 420). Network structures for enterprise-to-enterprise movements of feed, live birds and hatching eggs, and table egg and poultry product were characterised by 'hub and spoke' type structures with small-world characteristics. Small worlds were created by network hubs (e.g. feed suppliers and hatcheries) providing goods and services to larger numbers of client farms. In addition to hubs acting as the predominant source of material moving onto farms we identified enterprises acting as bridges between identified small worlds. The presence of these bridges is a concern, since their presence has the potential to facilitate the spread of hazards (e.g. feed contaminants, infectious agents carried within feed) more readily throughout the population. An ability to predict enterprises with these network characteristics on the basis of factors such as shed capacity, enterprise type, geographic location would be useful for developing risk-based approaches to disease prevention, surveillance, detection, response and control activities. Copyright (c) 2010 Elsevier B.V. All rights reserved.
Scalable Management of Enterprise and Data-Center Networks
2011-09-01
To the best of our knowledge , there is no systematic and efficient solution for handling overlapping wildcard rules in network-wide flow- management ...and D. Maltz, “Unraveling the complexity of network management ,” in NSDI, 2009. [4] P. Mahadevan, P. Sharma, S. Banerjee, and P. Ranganathan , “A...Scalable Management of Enterprise and Data-Center Networks Minlan Yu A Dissertation Presented to the Faculty of Princeton University in Candidacy for
Transforming LandWarNet: Implementing the Enterprise Strategy
2010-08-01
Prescribed by ANSI Std Z39-18 2 HHH HHH 3 Over the past decade, the United States’ global defense posture has...when they need it, in any environment. n HHH A Soldier’s Story HHH 4 LandWarNet is the Army’s solution to this enterprise network requirement...Architecture HHH LandWarNet HHH 5 To form a truly unified enterprise network, demarcated only by classification enclaves, the Army must change its
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
Defense in Depth: Foundation for Secure and Resilient IT Enterprises
2006-09-01
Gabbard , D., & May, C. (2003). Outsourcing Managed Security Service. http://www.sei.cmu.edu/publications/documents/sims/sim012.html. 296 CMU/SEI...security_matters/2001/2q01/security-2q01.htm. [Allen 03] Allen, J., Gabbard , D., & May, C. Outsourcing Managed Security Service (CMU/SEI-SIM-012
Symmetric Key Services Markup Language (SKSML)
NASA Astrophysics Data System (ADS)
Noor, Arshad
Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.
Top 6 Wireless Challenges: How Schools Are Improving Their Mobile Infrastructure
ERIC Educational Resources Information Center
Schaffhauser, Dian
2012-01-01
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
DOE Office of Scientific and Technical Information (OSTI.GOV)
1996-05-01
The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following are the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors andmore » visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an adjustment history of changes on selected fields« less
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Banking and Financial Services.
This document presents testimony from the June 1998 hearing on the Children's Development Act (H.R. 3637) held before the Subcommittee on Capital Markets, Securities and Government Sponsored Enterprises. H.R. 3637 encourages the lending of resources to child care facilities by allowing a bank or lender access to a federal reinsurance program that…
Inferring Social Status and Rich Club Effects in Enterprise Communication Networks
Dong, Yuxiao; Tang, Jie; Chawla, Nitesh V.; Lou, Tiancheng; Yang, Yang; Wang, Bai
2015-01-01
Social status, defined as the relative rank or position that an individual holds in a social hierarchy, is known to be among the most important motivating forces in social behaviors. In this paper, we consider the notion of status from the perspective of a position or title held by a person in an enterprise. We study the intersection of social status and social networks in an enterprise. We study whether enterprise communication logs can help reveal how social interactions and individual status manifest themselves in social networks. To that end, we use two enterprise datasets with three communication channels — voice call, short message, and email — to demonstrate the social-behavioral differences among individuals with different status. We have several interesting findings and based on these findings we also develop a model to predict social status. On the individual level, high-status individuals are more likely to be spanned as structural holes by linking to people in parts of the enterprise networks that are otherwise not well connected to one another. On the community level, the principle of homophily, social balance and clique theory generally indicate a “rich club” maintained by high-status individuals, in the sense that this community is much more connected, balanced and dense. Our model can predict social status of individuals with 93% accuracy. PMID:25822343
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230 and 270 [Release No. 33-9503; IC-30845...; Applications Regarding Joint Enterprises or Arrangements and Certain Profit-Sharing Plans AGENCY: Securities and Exchange Commission. ACTION: Final rule; technical amendments. SUMMARY: The Securities and...
Qualitative Analysis of Commercial Social Network Profiles
NASA Astrophysics Data System (ADS)
Melendez, Lester; Wolfson, Ouri; Adjouadi, Malek; Rishe, Naphtali
Social-networking sites have become an integral part of many users' daily internet routine. Commercial enterprises have been quick to recognize this and are subsequently creating profiles for many of their products and services. Commercial enterprises use social network profiles to target and interact with potential customers as well as to provide a gateway for users of the product or service to interact with each other. Many commercial enterprises use the statistics from their product or service's social network profile to tout the popularity and success of the product or service being showcased. They will use statistics such as number of friends, number of daily visits, number of interactions, and other similar measurements to quantify their claims. These statistics are often not a clear indication of the true popularity and success of the product. In this chapter the term product is used to refer to any tangible or intangible product, service, celebrity, personality, film, book, or other entity produced by a commercial enterprise.
Towards Reducing the Data Exfiltration Surface for the Insider Threat
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schlicher, Bob G; MacIntyre, Lawrence Paul; Abercrombie, Robert K
Unauthorized data exfiltrations from both insiders and outsiders are costly and damaging. Network communication resources can be used for transporting data illicitly out of the enterprise or cloud. Combined with built-in malware copying utilities, we define this as comprising the Data Exfiltration Surface (DXS). For securing valuable data, it is desirable to reduce the DXS and maintain controls on the egress points. Our approach is to host the data in a protected enclave that includes novel software Data Diode (SDD) installed on a secured, border gateway. The SDD allows copying data into the enclave systems but denies data from beingmore » copied out. Simultaneously, it permits remote access with remote desktop and console applications. Our tests demonstrate that we are able to effectively reduce the DXS and we are able to protect data from being exfiltrated through the use of the SDD.« less
ASCR Cybersecurity for Scientific Computing Integrity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piesert, Sean
The Department of Energy (DOE) has the responsibility to address the energy, environmental, and nuclear security challenges that face our nation. Much of DOE’s enterprise involves distributed, collaborative teams; a signi¬cant fraction involves “open science,” which depends on multi-institutional, often international collaborations that must access or share signi¬cant amounts of information between institutions and over networks around the world. The mission of the Office of Science is the delivery of scienti¬c discoveries and major scienti¬c tools to transform our understanding of nature and to advance the energy, economic, and national security of the United States. The ability of DOE tomore » execute its responsibilities depends critically on its ability to assure the integrity and availability of scienti¬c facilities and computer systems, and of the scienti¬c, engineering, and operational software and data that support its mission.« less
Enterprise virtual private network (VPN) with dense wavelength division multiplexing (DWDM) design
NASA Astrophysics Data System (ADS)
Carranza, Aparicio
An innovative computer simulation and modeling tool for metropolitan area optical data communication networks is presented. These models address the unique requirements of Virtual Private Networks for enterprise data centers, which may comprise a mixture of protocols including ESCON, FICON, Fibre Channel, Sysplex protocols (ETR, CLO, ISC); and other links interconnected over dark fiber using Dense Wavelength Division Multiplexing (DWDM). Our models have the capability of designing a network with minimal inputs; to compute optical link budgets; suggest alternative configurations; and also optimize the design based on user-defined performance metrics. The models make use of Time Division Multiplexing (TDM) wherever possible for lower data rate traffics. Simulation results for several configurations are presented and they have been validated by means of experiments conducted on the IBM enterprise network testbed in Poughkeepsie, N.Y.
Supporting virtual enterprise design by a web-based information model
NASA Astrophysics Data System (ADS)
Li, Dong; Barn, Balbir; McKay, Alison; de Pennington, Alan
2001-10-01
Development of IT and its applications have led to significant changes in business processes. To pursue agility, flexibility and best service to customers, enterprises focus on their core competence and dynamically build relationships with partners to form virtual enterprises as customer driven temporary demand chains/networks. Building the networked enterprise needs responsively interactive decisions instead of a single-direction partner selection process. Benefits and risks in the combination should be systematically analysed, and aggregated information about value-adding abilities and risks of networks needs to be derived from interactions of all partners. In this research, a hierarchical information model to assess partnerships for designing virtual enterprises was developed. Internet technique has been applied to the evaluation process so that interactive decisions can be visualised and made responsively during the design process. The assessment is based on the process which allows each partner responds to requirements of the virtual enterprise by planning its operational process as a bidder. The assessment is then produced by making an aggregated value to represent prospect of the combination of partners given current bidding. Final design is a combination of partners with the greatest total value-adding capability and lowest risk.
FY 2016 - Stockpile Stewardship and Management Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-03-01
This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.
2012-09-01
Hewlett Packard Enterprise Services) that ended in September 2010.2 To bridge the time between the end of the NMCI contract and the full transition to...some leasehold improvements; and moveable infrastructure associated with local network operations. Award contract for transport services and
The Continuing Evolution of Effective IT Security Practices
ERIC Educational Resources Information Center
Voloudakis, John
2006-01-01
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security
2015-09-01
security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal
WriteShield: A Pseudo Thin Client for Prevention of Information Leakage
NASA Astrophysics Data System (ADS)
Kirihata, Yasuhiro; Sameshima, Yoshiki; Onoyama, Takashi; Komoda, Norihisa
While thin-client systems are diffusing as an effective security method in enterprises and organizations, there is a new approach called pseudo thin-client system. In this system, local disks of clients are write-protected and user data is forced to save on the central file server to realize the same security effect of conventional thin-client systems. Since it takes purely the software-based simple approach, it does not require the hardware enhancement of network and servers to reduce the installation cost. However there are several problems such as no write control to external media, memory depletion possibility, and lower security because of the exceptional write permission to the system processes. In this paper, we propose WriteShield, a pseudo thin-client system which solves these issues. In this system, the local disks are write-protected with volume filter driver and it has a virtual cache mechanism to extend the memory cache size for the write protection. This paper presents design and implementation details of WriteShield. Besides we describe the security analysis and simulation evaluation of paging algorithms for virtual cache mechanism and measure the disk I/O performance to verify its feasibility in the actual environment.
Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less
Distributed Common Ground System-Navy Increment 2 (DCGS-N Inc 2)
2016-03-01
15 minutes Enter and be Managed in the Network: Reference SvcV-7, Consolidated Afloat Networks and Enterprise Services ( CANES ) CDD, DCGS-N Inc 2...Red, White , Gray Data and Tracks to Command and Control System. Continuous Stream from SCI Common Intelligence Picture to General Service (GENSER...AIS - Automatic Information System AOC - Air Operations Command CANES - Consolidated Afloat Networks and Enterprise Services CID - Center for
Enterprise Networks for Competences Exchange: A Simulation Model
NASA Astrophysics Data System (ADS)
Remondino, Marco; Pironti, Marco; Pisano, Paola
A business process is a set of logically related tasks performed to achieve a defined business and related to improving organizational processes. Process innovation can happen at various levels: incrementally, redesign of existing processes, new processes. The knowledge behind process innovation can be shared, acquired, changed and increased by the enterprises inside a network. An enterprise can decide to exploit innovative processes it owns, thus potentially gaining competitive advantage, but risking, in turn, that other players could reach the same technological levels. Or it could decide to share it, in exchange for other competencies or money. These activities could be the basis for a network formation and/or impact the topology of an existing network. In this work an agent based model is introduced (E3), aiming to explore how a process innovation can facilitate network formation, affect its topology, induce new players to enter the market and spread onto the network by being shared or developed by new players.
Enterprise Social Networking: Technology Acceptance Related to Personality, Age, and Gender
ERIC Educational Resources Information Center
Rochelle, Joseph
2017-01-01
In this dissertation, the researcher examined and added to the body of knowledge within the project change management field of technology implementation. The rationale behind the study was to evaluate technology acceptance of Enterprise Social Networking (ESN), which has been widely implemented across over 90% of the "Fortune" 500…
38 CFR 74.22 - What are the procedures for cancellation?
Code of Federal Regulations, 2011 CFR
2011-07-01
... Veterans Enterprise, concerning the Notice of Verified Status Cancellation within 30 days of receipt of CVE... example, to security concerns or equipment failures. The filing party bears the risk that the delivery... Small and Disadvantaged Business Utilization and Center for Veterans Enterprise (00VE), U.S. Department...
Enterprise.SRS = Business for Success at SRS
Wilson, Dwayne; Moody, David; Michalske, Terry; Bush, Byron; Sprague, Leslie; Worrell, Timothy
2017-12-09
Goals and accomplishments of SRS. The debut of enterprise.srs, a strategic vision that will refocus site talents and efforts on developing future missions by broadening its impact in existing and new areas of national service. An expansion of people and facility in 3 areas: National Security, Clean Energy, and Environmental Stewardship.
Towards an Enterprise Level Measure of Security
ERIC Educational Resources Information Center
Marchant, Robert L.
2013-01-01
Vulnerabilities of Information Technology (IT) Infrastructure have grown at the similar pace (at least) as the sophistication and complexity of the technology that is the cornerstone of our IT enterprises. Despite massive increased funding for research, for development, and to support deployment of Information Assurance (IA) defenses, the damages…
Security Engineering Lessons Learned for Migrating Independent LANs to an Enterprise Environment
ERIC Educational Resources Information Center
Marchant, Robert L.; Bonneau, Thomas
2013-01-01
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
12 CFR 1777.10 - Developments prompting supervisory response.
Code of Federal Regulations, 2014 CFR
2014-01-01
...: (a) OFHEO's national House Price Index (HPI) for the most recent quarter is more than two percent... securities guaranteed by an enterprise, the HPI for the most recent quarter for such Division or Divisions is...) An Enterprise's publicly reported net income for the most recent calendar quarter is less than one...
12 CFR 1777.10 - Developments prompting supervisory response.
Code of Federal Regulations, 2012 CFR
2012-01-01
...: (a) OFHEO's national House Price Index (HPI) for the most recent quarter is more than two percent... securities guaranteed by an enterprise, the HPI for the most recent quarter for such Division or Divisions is...) An Enterprise's publicly reported net income for the most recent calendar quarter is less than one...
12 CFR 1777.10 - Developments prompting supervisory response.
Code of Federal Regulations, 2013 CFR
2013-01-01
...: (a) OFHEO's national House Price Index (HPI) for the most recent quarter is more than two percent... securities guaranteed by an enterprise, the HPI for the most recent quarter for such Division or Divisions is...) An Enterprise's publicly reported net income for the most recent calendar quarter is less than one...
22 CFR 1203.735-205 - Financial interests.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...
22 CFR 1203.735-205 - Financial interests.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...
22 CFR 1203.735-205 - Financial interests.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...
22 CFR 1203.735-205 - Financial interests.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., or other corporate securities under the trust will be exempt to the same extent as provided in... of investing in equity or debt securities: Provided, That the fair value of the interest involved... the purpose of investing in equity or debt securities, the interest of the employee in any enterprise...
Standards-based sensor interoperability and networking SensorWeb: an overview
NASA Astrophysics Data System (ADS)
Bolling, Sam
2012-06-01
The War fighter lacks a unified Intelligence, Surveillance, and Reconnaissance (ISR) environment to conduct mission planning, command and control (C2), tasking, collection, exploitation, processing, and data discovery of disparate sensor data across the ISR Enterprise. Legacy sensors and applications are not standardized or integrated for assured, universal access. Existing tasking and collection capabilities are not unified across the enterprise, inhibiting robust C2 of ISR including near-real time, cross-cueing operations. To address these critical needs, the National Measurement and Signature Intelligence (MASINT) Office (NMO), and partnering Combatant Commands and Intelligence Agencies are developing SensorWeb, an architecture that harmonizes heterogeneous sensor data to a common standard for users to discover, access, observe, subscribe to and task sensors. The SensorWeb initiative long term goal is to establish an open commercial standards-based, service-oriented framework to facilitate plug and play sensors. The current development effort will produce non-proprietary deliverables, intended as a Government off the Shelf (GOTS) solution to address the U.S. and Coalition nations' inability to quickly and reliably detect, identify, map, track, and fully understand security threats and operational activities.
NASA Astrophysics Data System (ADS)
Shahlan, M. Z.; Sidek, A. A.; Suffian, S. A.; Hazza, M. H. F. A.; Daud, M. R. C.
2018-01-01
In this paper, climate change and global warming are the biggest current issues in the industrial sectors. The green supply chain managements (GSCM) is one of the crucial input to these issues. Effective GSCM can potentially secure the organization’s competitive advantage and improve the environmental performance of the network activities. In this study, the aim is to investigate and examine how a small and medium enterprises (SMEs) stakeholder pressure and top management influence green supply chain management practices. The study is further advance green supply chain management research in Malaysia focusing on SMEs manufacturing sector using structural equation modelling. Structural equation modelling is a multivariate statistical analysis technique used to examine structural relationship. It is the combination of factor analysis and multi regression analysis and used to analyse structural relationship between measure variable and latent factor. This research found that top management support and stakeholder pressure is the major influence for SMEs to adopt green supply chain management. The research also found that top management is fully mediate with the relationship between stakeholder pressure and monitoring supplier environmental performance.
ERIC Educational Resources Information Center
Olmeda-Gomez, Carlos; Perianes-Rodriguez, Antonio; Ovalle-Perandones, Maria Antonia; Moya-Anegon, Felix
2008-01-01
Introduction: In an economy geared to innovation and competitiveness in research and development activities, inter-relationships between the university, private enterprise and government are of considerable interest. Networking constitutes a priority strategy to attain this strategic objective and a tool in knowledge-based economies. Method:…
ERIC Educational Resources Information Center
Lorain County Community Coll., Elyria, OH. Joint Center for Policy Research.
This document is intended to inform and advise the development and operation of campuswide information technology (IT) education and training programs at two-year colleges belonging to the EnterpriseOhio Network (EON). The report is based on information from the following sources: a comprehensive national literature review; an environmental scan…
ERIC Educational Resources Information Center
Chen, Jin; Wei, Shiyang
2008-01-01
This empirical study is concerned with university-industry collaboration from a knowledge management perspective. The authors introduce the concepts of "enterprise-level core elements" to define the principle status of an enterprise during university-industry collaboration, and "network embeddedness" as an indication of the…
Verification of Security Policy Enforcement in Enterprise Systems
NASA Astrophysics Data System (ADS)
Gupta, Puneet; Stoller, Scott D.
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
Study on Collaborative SCM of Construction Enterprises Based on Information-Sharing
NASA Astrophysics Data System (ADS)
Wang, Lianyue
Economic globalization and the integration process has led to competition among construction enterprises become increasingly fierce, which are adjusting their development strategies and efforts to seek for the knowledge economy and network environment to promote enterprise survival and development, enhancing the competitiveness of enterprises in the new business management models and ideas. This paper first discussed the concept of the supply chain collaboration of the construction enterprise and constituted a information management platform of the general contracting project. At last, the paper puts forward tactics which aims at helping construction enterprises realize supply chain collaboration and enhance the competitiveness of enterprises.
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model
NASA Astrophysics Data System (ADS)
Omote, Kazumasa; Shimoyama, Takeshi; Torii, Satoru
One of the worst threats present in an enterprise network is the propagation of "scanning malware" (e.g., scanning worms and bots). It is important to prevent such scanning malware from spreading within an enterprise network. It is especially important to suppress scanning malware infection to less than a few infected hosts. We estimated the timing of containment software to block "scanning malware" in a homogeneous enterprise network. The "combinatorics proliferation model", based on discrete mathematics, developed in this study derives a threshold that gives the number of the packets sent by a victim that must not be exceeded in order to suppress the number of infected hosts to less than a few. This model can appropriately express the early state under which an infection started. The result from our model fits very well to the result of computer simulation using a typical existing scanning malware and an actual network.
NASA Astrophysics Data System (ADS)
Anguelov, Kiril P.; Kaynakchieva, Vesela G.
2017-12-01
The aim of the current study is to research and analyze Adapted managerial mathematical model to study the functions and interactions between enterprises in high-tech cluster, and his approbation in given high-tech cluster; to create high-tech cluster, taking into account the impact of relationships between individual units in the cluster-Leading Enterprises, network of Enterprises subcontractors, economic infrastructure.
Scholars, Scholarship, and the Scholarly Enterprise in the Digital Age
ERIC Educational Resources Information Center
Katz, Richard N.
2010-01-01
Information technologies have empowered the individual and are unleashing a torrent of change, one that will reshape nearly all of institutions. To secure the place of the traditional scholarly enterprise, the author argues that leaders must rethink a number of the fundamentals behind the higher education institution. He discusses the impact of…
Secure Cooperative Data Access in Multi-Cloud Environment
ERIC Educational Resources Information Center
Le, Meixing
2013-01-01
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-30
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of International Poultry Co., Inc. (n/k/a Carley Enterprises, Inc.), International Thoroughbred Breeders, Inc., Internet Marketing... Internet Marketing, Inc. because it has not filed any periodic reports since the period ended December 31...
Department of the Navy For Policy
Policy DEPARTMENT OF THE NAVY For Policy Search this site... Search Policy Security Skip navigation links Security Expand Security Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: - Policy Page Content Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: Enterprise OPM
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases
ERIC Educational Resources Information Center
Alomari, Firas
2013-01-01
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
ERIC Educational Resources Information Center
Tadesse, Yohannes
2012-01-01
The importance of information security has made many organizations to invest and utilize effective information security controls within the information systems (IS) architecture. An organization's strategic decisions to secure enterprise-wide services often associated with the overall competitive advantages that are attained through the process of…
Telematics and satellites. Part 1: Information systems
NASA Astrophysics Data System (ADS)
Burke, W. R.
1980-06-01
Telematic systems are identified and described. The applications are examined emphasizing the role played by satellite links. The discussion includes file transfer, examples of distributed processor systems, terminal communication, information retrieval systems, office information systems, electronic preparation and publishing of information, electronic systems for transfer of funds, electronic mail systems, record file transfer characteristics, intra-enterprise networks, and inter-enterprise networks.
Networked Virtual Organizations: A Chance for Small and Medium Sized Enterprises on Global Markets
NASA Astrophysics Data System (ADS)
Cellary, Wojciech
Networked Virtual Organizations (NVOs) are a right answer to challenges of globalized, diversified, and dynamic contemporary economy. NVOs need more than e-trade and outsourcing, namely, they need out-tasking and e-collaboration. To out-task, but retain control on the way a task is performed by an external partner, two integrations are required: (1) integration of computer management systems of enterprises cooperating within an NVO; and (2) integration of cooperating representatives of NVO member enterprises into a virtual team. NVOs provide a particular chance to Small and Medium size Enterprises (SMEs) to find their place on global markets and to play a significant role on them. Requirements for SMEs to be able to successfully join an NVO are analyzed in the paper.
Evaluation research of small and medium-sized enterprise informatization on big data
NASA Astrophysics Data System (ADS)
Yang, Na
2017-09-01
Under the background of big data, key construction of small and medium-sized enterprise informationization level was needed, but information construction cost was large, while information cost of inputs can bring benefit to small and medium-sized enterprises. This paper established small and medium-sized enterprise informatization evaluation system from hardware and software security level, information organization level, information technology application and the profit level, and information ability level. The rough set theory was used to brief indexes, and then carry out evaluation by support vector machine (SVM) model. At last, examples were used to verify the theory in order to prove the effectiveness of the method.
The Role of Networks in Supporting Grassroots Good Practice in Enterprise Education
ERIC Educational Resources Information Center
Beresford, Richard; Beresford, Kate
2010-01-01
The important role that Further Education (FE) and Higher Education (HE) play in promoting more entrepreneurial attitudes and behaviours is well recognised. Whilst most countries in Europe have introduced policies to support this agenda through enterprise education, concerns remain as to its sustainability where enterprise education is often…
76 FR 62420 - Statement of Organization, Functions and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-07
... leadership, consultation, training, and management services for HRSA's enterprise computing environment; (2... responsibility with improved security management capabilities and improved alignment of current security... responsible for the organization, management, and administrative functions necessary to carry out the...
Mashup Model and Verification Using Mashup Processing Network
NASA Astrophysics Data System (ADS)
Zahoor, Ehtesham; Perrin, Olivier; Godart, Claude
Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term stability and robustness. In this paper we present a pattern based approach, called Mashup Processing Network (MPN). The idea is based on Event Processing Network and is supposed to facilitate the creation, modeling and the verification of mashups. MPN provides a view of how different actors interact for the mashup development namely the producer, consumer, mashup processing agent and the communication channels. It also supports modeling transformations and validations of data and offers validation of both functional and non-functional requirements, such as reliable messaging and security, that are key issues within the enterprise context. We have enriched the model with a set of processing operations and categorize them into data composition, transformation and validation categories. These processing operations can be seen as a set of patterns for facilitating the mashup development process. MPN also paves a way for realizing Mashup Oriented Architecture where mashups along with services are used as building blocks for application development.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Brien, K H
Nuclear weapons play an essential role in United States (U.S.) National Security Policy and a succession of official reviews has concluded that nuclear weapons will continue to have a role for the foreseeable future. Under the evolving U.S. government policy, it is clear that role will be quite different from what it was during the Cold War. The nuclear-weapons stockpile as well as the nuclear-weapons enterprise needs to continue to change to reflect this evolving role. Stockpile reductions in the early 1990s and the Stockpile Stewardship Program (SSP), established after the cessation of nuclear testing in 1992, began this processmore » of change. Further evolution is needed to address changing security environments, to enable further reductions in the number of stockpiled weapons, and to create a nuclear enterprise that is cost effective and sustainable for the long term. The SSP has successfully maintained the U.S. nuclear stockpile for more than a decade, since the end of nuclear testing. Current plans foresee maintaining warheads produced in the 1980s until about 2040. These warheads continue to age and they are expensive to refurbish. The current Life Extension Program plans for these legacy warheads are straining both the nuclear-weapons production and certification infrastructure making it difficult to respond rapidly to problems or changes in requirements. Furthermore, refurbishing and preserving Cold-War-era nuclear weapons requires refurbishing and preserving an infrastructure geared to support old technology. Stockpile Stewardship could continue this refurbishment approach, but an alternative approach could be considered that is more focused on sustainable technologies, and developing a more responsive nuclear weapons infrastructure. Guided by what we have learned from SSP during the last decade, the stewardship program can be evolved to address this increasing challenge using its computational and experimental tools and capabilities. This approach must start with an improved vision of the future stockpile and enterprise, and find a path that moves us toward that future. The goal of this approach is to achieve a more affordable, sustainable, and responsive enterprise. In order to transform the enterprise in this way, the SSP warhead designs that drive the enterprise must change. Designs that emphasize manufacturability, certifiability, and increased safety and security can enable enterprise transformation. It is anticipated that such warheads can be certified and sustained with high confidence without nuclear testing. The SSP provides the tools to provide such designs, and can develop replacement designs and produce them for the stockpile. The Cold War currency of optimizing warhead yield-to-weight can be replaced by SSP designs optimizing margin-to-uncertainty. The immediate challenge facing the nuclear weapons enterprise is to find a credible path that leads to this vision of the future stockpile and enterprise. Reliable warheads within a sustainable enterprise can best be achieved by shifting from a program of legacy-warhead refurbishment to one of warhead replacement. The nuclear weapons stockpile and the nuclear weapons enterprise must transform together to achieve this vision. The current Reliable Replacement Warhead (RRW) program represents an approach that can begin this process of transformation. If the RRW program succeeds, the designs, manufacturing complex, and certification strategy can evolve together and in so doing come up with a more cost-efficient solution that meets today's and tomorrow's national security requirements.« less
2015 Enterprise Strategic Vision
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-08-01
This document aligns with the Department of Energy Strategic Plan for 2014-2018 and provides a framework for integrating our missions and direction for pursuing DOE’s strategic goals. The vision is a guide to advancing world-class science and engineering, supporting our people, modernizing our infrastructure, and developing a management culture that operates a safe and secure enterprise in an efficient manner.
Feltus, Frank A; Breen, Joseph R; Deng, Juan; Izard, Ryan S; Konger, Christopher A; Ligon, Walter B; Preuss, Don; Wang, Kuang-Ching
2015-01-01
In the last decade, high-throughput DNA sequencing has become a disruptive technology and pushed the life sciences into a distributed ecosystem of sequence data producers and consumers. Given the power of genomics and declining sequencing costs, biology is an emerging "Big Data" discipline that will soon enter the exabyte data range when all subdisciplines are combined. These datasets must be transferred across commercial and research networks in creative ways since sending data without thought can have serious consequences on data processing time frames. Thus, it is imperative that biologists, bioinformaticians, and information technology engineers recalibrate data processing paradigms to fit this emerging reality. This review attempts to provide a snapshot of Big Data transfer across networks, which is often overlooked by many biologists. Specifically, we discuss four key areas: 1) data transfer networks, protocols, and applications; 2) data transfer security including encryption, access, firewalls, and the Science DMZ; 3) data flow control with software-defined networking; and 4) data storage, staging, archiving and access. A primary intention of this article is to orient the biologist in key aspects of the data transfer process in order to frame their genomics-oriented needs to enterprise IT professionals.
NASA Technical Reports Server (NTRS)
Hartman, Kathy; Weidow, David; Hadaegh, Fred
1999-01-01
Breakthrough technology development is critical to securing the future of our space industry. The National Aeronautics and Space Administration (NASA) Cross-Enterprise Technology Development Program (CETDP) is developing critical space technologies that enable innovative and less costly missions, and spawn new mission opportunities through revolutionary, long-term, high-risk, high-payoff technology advances. The CETDP is a NASA-wide activity managed by the Advanced Technology and Mission Studies Division (AT&MS) at Headquarters Office of Space Science. Program management for CETDP is distributed across the multiple NASA Centers and draws on expertise throughout the Agency. The technology research activities are organized along Project-level divisions called thrust areas that are directly linked to the Agency's goals and objectives of the Enterprises: Earth Science, Space Science, Human Exploration and Development of Space; and the Office of the Chief Technologist's (OCT) strategic technology areas. Cross-Enterprise technology is defined as long-range strategic technologies that have broad potential to span the needs of more than one Enterprise. Technology needs are identified and prioritized by each of the primary customers. The thrust area manager (TAM) for each division is responsible for the ultimate success of technologies within their area, and can draw from industry, academia, other government agencies, other CETDP thrust areas, and other NASA Centers to accomplish the goals of the thrust area. An overview of the CETDP and description of the future directions of the thrust area called Distributed Spacecraft are presented in this paper. Revolutionary technologies developed within this thrust area will enable the implementation of a spatially distributed network of individual vehicles, or assets, collaborating as a single collective unit, and exhibiting a common system-wide capability to accomplish a shared objective. With such a capability, new Earth and space science measurement concepts become a reality.
NASA Technical Reports Server (NTRS)
Hartman, Kathy; Weidow, David; Hadaegh, Fred
1999-01-01
Breakthrough technology development is critical to securing the future of our space industry. The National Aeronautics and Space Administration (NASA) Cross-Enterprise Technology Development Program (CETDP) is developing critical space technologies that enable innovative and less costly missions, and spawn new mission opportunities through revolutionary, long-term, high-risk, high-payoff technology advances. The CETDP is a NASA-wide activity managed by the Advanced Technology and Mission Studies Division (AT&MS) at Headquarters Office of Space Science. Program management for CETDP is distributed across the multiple NASA Centers and draws on expertise throughout the Agency. The technology research activities are organized along Project-level divisions called thrust areas that are directly linked to the Agency's goals and objectives of the Enterprises: Earth Science, Space Science, Human Exploration and Development of Space; and the Office of the Chief Technologist's (OCT) strategic technology areas. Cross-Enterprise technology is defined as long-range strategic technologies that have broad potential to span the needs of more than one Enterprise. Technology needs are identified and prioritized by each of the primary customers. The thrust area manager (TAM) for each division is responsible for the ultimate success of technologies within their area, and can draw from industry, academia, other government agencies, other CETDP thrust areas, and other NASA Centers to accomplish the goals of the thrust area. An overview of the CETDP and description of the future directions of the thrust area called Distributed Spacecraft are presented in this paper. Revolutionary technologies developed within this thrust area will enable the implementation of a spatially distributed network of individual vehicles, or assets, collaborating as a single collective unit, and exhibiting a common system-wide capability to accomplish a shared objective. With such a capability, new Earth and space science measurement concepts become a reality.
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Beck, Scott A; Fisk, Thomas B; Mohr, David N
2010-01-01
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information retrieval, business intelligence, and high-level decision making. Structurally it is a top-down, subject-oriented, integrated, time-variant, and non-volatile collection of data in support of Mayo Clinic's analytic and decision-making processes. It is an interconnected piece of Mayo Clinic's Enterprise Information Management initiative, which also includes Data Governance, Enterprise Data Modeling, the Enterprise Vocabulary System, and Metadata Management. These resources enable unprecedented organization of enterprise information about patient, genomic, and research data. While facile access for cohort definition or aggregate retrieval is supported, a high level of security, retrieval audit, and user authentication ensures privacy, confidentiality, and respect for the trust imparted by our patients for the respectful use of information about their conditions. PMID:20190054
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data.
Chute, Christopher G; Beck, Scott A; Fisk, Thomas B; Mohr, David N
2010-01-01
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information retrieval, business intelligence, and high-level decision making. Structurally it is a top-down, subject-oriented, integrated, time-variant, and non-volatile collection of data in support of Mayo Clinic's analytic and decision-making processes. It is an interconnected piece of Mayo Clinic's Enterprise Information Management initiative, which also includes Data Governance, Enterprise Data Modeling, the Enterprise Vocabulary System, and Metadata Management. These resources enable unprecedented organization of enterprise information about patient, genomic, and research data. While facile access for cohort definition or aggregate retrieval is supported, a high level of security, retrieval audit, and user authentication ensures privacy, confidentiality, and respect for the trust imparted by our patients for the respectful use of information about their conditions.
Deng, Wu; Zhao, Huimin; Zou, Li; Li, Yuanyuan; Li, Zhengguang
2012-08-01
Computer and information technology popularizes in the medicine manufacturing enterprise for its potentials in working efficiency and service quality. In allusion to the explosive data and information of application system in current medicine manufacturing enterprise, we desire to propose a novel application information system integration platform in medicine manufacturing enterprise, which based on a combination of RFID technology and SOA, to implement information sharing and alternation. This method exploits the application integration platform across service interface layer to invoke the RFID middleware. The loose coupling in integration solution is realized by Web services. The key techniques in RFID event components and expanded role-based security access mechanism are studied in detail. Finally, a case study is implemented and tested to evidence our understanding on application system integration platform in medicine manufacturing enterprise.
Virtual Organizations: Trends and Models
NASA Astrophysics Data System (ADS)
Nami, Mohammad Reza; Malekpour, Abbaas
The Use of ICT in business has changed views about traditional business. With VO, organizations with out physical, geographical, or structural constraint can collaborate with together in order to fulfill customer requests in a networked environment. This idea improves resource utilization, reduces development process and costs, and saves time. Virtual Organization (VO) is always a form of partnership and managing partners and handling partnerships are crucial. Virtual organizations are defined as a temporary collection of enterprises that cooperate and share resources, knowledge, and competencies to better respond to business opportunities. This paper presents an overview of virtual organizations and main issues in collaboration such as security and management. It also presents a number of different model approaches according to their purpose and applications.
A Simple Technique for Securing Data at Rest Stored in a Computing Cloud
NASA Astrophysics Data System (ADS)
Sedayao, Jeff; Su, Steven; Ma, Xiaohao; Jiang, Minghao; Miao, Kai
"Cloud Computing" offers many potential benefits, including cost savings, the ability to deploy applications and services quickly, and the ease of scaling those application and services once they are deployed. A key barrier for enterprise adoption is the confidentiality of data stored on Cloud Computing Infrastructure. Our simple technique implemented with Open Source software solves this problem by using public key encryption to render stored data at rest unreadable by unauthorized personnel, including system administrators of the cloud computing service on which the data is stored. We validate our approach on a network measurement system implemented on PlanetLab. We then use it on a service where confidentiality is critical - a scanning application that validates external firewall implementations.
A network-oriented business modeling environment
NASA Astrophysics Data System (ADS)
Bisconti, Cristian; Storelli, Davide; Totaro, Salvatore; Arigliano, Francesco; Savarino, Vincenzo; Vicari, Claudia
The development of formal models related to the organizational aspects of an enterprise is fundamental when these aspects must be re-engineered and digitalized, especially when the enterprise is involved in the dynamics and value flows of a business network. Business modeling provides an opportunity to synthesize and make business processes, business rules and the structural aspects of an organization explicit, allowing business managers to control their complexity and guide an enterprise through effective decisional and strategic activities. This chapter discusses the main results of the TEKNE project in terms of software components that enable enterprises to configure, store, search and share models of any aspects of their business while leveraging standard and business-oriented technologies and languages to bridge the gap between the world of business people and IT experts and to foster effective business-to-business collaborations.
Implementation of a Web-Based Collaborative Process Planning System
NASA Astrophysics Data System (ADS)
Wang, Huifen; Liu, Tingting; Qiao, Li; Huang, Shuangxi
Under the networked manufacturing environment, all phases of product manufacturing involving design, process planning, machining and assembling may be accomplished collaboratively by different enterprises, even different manufacturing stages of the same part may be finished collaboratively by different enterprises. Based on the self-developed networked manufacturing platform eCWS(e-Cooperative Work System), a multi-agent-based system framework for collaborative process planning is proposed. In accordance with requirements of collaborative process planning, share resources provided by cooperative enterprises in the course of collaboration are classified into seven classes. Then a reconfigurable and extendable resource object model is built. Decision-making strategy is also studied in this paper. Finally a collaborative process planning system e-CAPP is developed and applied. It provides strong support for distributed designers to collaboratively plan and optimize product process though network.
The networked health enterprise: a vision for 2008.
Stead, W W
1998-01-01
Informatics and information technology hold the promise of a consumer-centered health enterprise--one that provides quality care at a cost society is willing to pay; one where need-based, adaptive, competency-based learning results in cost-effectiveness of health education; one where team-based health and learning on demand, coupled with monitoring of process outcomes and network access to expertise, guarantee quality. The barriers to this promise are the professional guilds, the cross-subsidies that support the health enterprise of 1998, and the lack of respect for privacy. Collectively, the informatics community needs to develop a compelling vision that will galvanize the health community to action. If the health community does not step up to this challenge, consumers will take advantage of disintermediation. Empowered by the network, they will go outside the system into hands that meet their needs.
Risk assessment of logistics outsourcing based on BP neural network
NASA Astrophysics Data System (ADS)
Liu, Xiaofeng; Tian, Zi-you
The purpose of this article is to evaluate the risk of the enterprises logistics outsourcing. To get this goal, the paper first analysed he main risks existing in the logistics outsourcing, and then set up a risk evaluation index system of the logistics outsourcing; second applied BP neural network into the logistics outsourcing risk evaluation and used MATLAB to the simulation. It proved that the network error is small and has strong practicability. And this method can be used by enterprises to evaluate the risks of logistics outsourcing.
Reliability issues of free-space communications systems and networks
NASA Astrophysics Data System (ADS)
Willebrand, Heinz A.
2003-04-01
Free space optics (FSO) is a high-speed point-to-point connectivity solution traditionally used in the enterprise campus networking market for building-to-building LAN connectivity. However, more recently some wire line and wireless carriers started to deploy FSO systems in their networks. The requirements on FSO system reliability, meaing both system availability and component reliability, are far more stringent in the carrier market when compared to the requirements in the enterprise market segment. This paper tries to outline some of the aspects that are important to ensure carrier class system reliability.
7 CFR 4290.815 - Financings in the form of Debt Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... purchase Debt Securities from an Enterprise. (b) Restriction of options obtained by RBIC's management and... Section 4290.815 Agriculture Regulations of the Department of Agriculture (Continued) RURAL BUSINESS-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE RURAL BUSINESS INVESTMENT COMPANY...
Engineering Software for Interoperability through Use of Enterprise Architecture Techniques
2003-03-01
Response Home/ Business Security . To detect flood conditions (i.e. excess water levels) within the monitored area and alert authorities, as necessary...Response; Fire Detection & Response; and Flood Detection & Response. Functional Area Description Intruder Detection & Response Home/ Business ... Security . To monitor and detect unauthorized entry into the secured area and sound alarms/alert authorities, as necessary. Fire Detection
NASA Astrophysics Data System (ADS)
Telipenko, E.; Chernysheva, T.; Zakharova, A.; Dumchev, A.
2015-10-01
The article represents research results about the knowledge base development for the intellectual information system for the bankruptcy risk assessment of the enterprise. It is described the process analysis of the knowledge base development; the main process stages, some problems and their solutions are given. The article introduces the connectionist model for the bankruptcy risk assessment based on the analysis of industrial enterprise financial accounting. The basis for this connectionist model is a three-layer perceptron with the back propagation of error algorithm. The knowledge base for the intellectual information system consists of processed information and the processing operation method represented as the connectionist model. The article represents the structure of the intellectual information system, the knowledge base, and the information processing algorithm for neural network training. The paper shows mean values of 10 indexes for industrial enterprises; with the help of them it is possible to carry out a financial analysis of industrial enterprises and identify correctly the current situation for well-timed managerial decisions. Results are given about neural network testing on the data of both bankrupt and financially strong enterprises, which were not included into training and test sets.
2009-02-01
management, available at <http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40 &ICS3=>. ISO /IEC 27001 . Information...Management of the Systems Engineering Process. [ ISO /IEC 27001 ] ISO /IEC 27001 :2005. Information technology -- Security techniques -- Information security...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic
Crabb, Helen Kathleen; Allen, Joanne Lee; Devlin, Joanne Maree; Firestone, Simon Matthew; Stevenson, Mark Anthony; Gilkerson, James Rudkin
2018-05-01
To better understand factors influencing infectious agent dispersal within a livestock population information is needed on the nature and frequency of contacts between farm enterprises. This study uses social network analysis to describe the contact network within a vertically integrated broiler poultry enterprise to identify the potential horizontal and vertical transmission pathways for Salmonella spp. Nodes (farms, sheds, production facilities) were identified and the daily movement of commodities (eggs, birds, feed, litter) and people between nodes were extracted from routinely kept farm records. Three time periods were examined in detail, 1- and 8- and 17-weeks of the production cycle and contact networks were described for all movements, and by commodity and production type. All nodes were linked by at least one movement during the study period but network density was low indicating that all potential pathways between nodes did not exist. Salmonella spp. transmission via vertical or horizontal pathways can only occur along directed pathways when those pathways are present. Only two locations (breeder or feed nodes) were identified where the transmission of a single Salmonella spp. clone could theoretically percolate through the network to the broiler or processing nodes. Only the feed transmission pathway directly connected all parts of the network. Copyright © 2017 Elsevier Ltd. All rights reserved.
Implementing the enterprise master patient index.
Adragna, L
1998-10-01
In implementing a cross-facility initiative, the importance of planning and understanding the implications for all facilities can't be overlooked. Here's how one integrated delivery network navigated the challenges of implementing a cross-facility enterprise master patient index.
Enterprise-wide worklist management.
Locko, Roberta C; Blume, Hartwig; Goble, John C
2002-01-01
Radiologists in multi-facility health care delivery networks must serve not only their own departments but also departments of associated clinical facilities. We describe our experience with a picture archiving and communication system (PACS) implementation that provides a dynamic view of relevant radiological workload across multiple facilities. We implemented a distributed query system that permits management of enterprise worklists based on modality, body part, exam status, and other criteria that span multiple compatible PACSs. Dynamic worklists, with lesser flexibility, can be constructed if the incompatible PACSs support specific DICOM functionality. Enterprise-wide worklists were implemented across Generations Plus/Northern Manhattan Health Network, linking radiology departments of three hospitals (Harlem, Lincoln, and Metropolitan) with 1465 beds and 4260 ambulatory patients per day. Enterprise-wide, dynamic worklist management improves utilization of radiologists and enhances the quality of care across large multi-facility health care delivery organizations. Integration of other workflow-related components remain a significant challenge.
Y-12 Sustainability and Stewardship
John Krueger
2017-12-09
The Y-12 National Security Complex recently won a White House award for its leadership among Government installations for pollution prevention. This video tells the story of the many actions taken by this NNSA National Security Enterprise site towards being a responsible environmental citizen while protecting the national interest.
Y-12 Sustainability and Stewardship
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Krueger
2009-10-06
The Y-12 National Security Complex recently won a White House award for its leadership among Government installations for pollution prevention. This video tells the story of the many actions taken by this NNSA National Security Enterprise site towards being a responsible environmental citizen while protecting the national interest.
Improving Information Security Risk Management
ERIC Educational Resources Information Center
Singh, Anand
2009-01-01
manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…
A Generic Framework of Performance Measurement in Networked Enterprises
NASA Astrophysics Data System (ADS)
Kim, Duk-Hyun; Kim, Cheolhan
Performance measurement (PM) is essential for managing networked enterprises (NEs) because it greatly affects the effectiveness of collaboration among members of NE.PM in NE requires somewhat different approaches from PM in a single enterprise because of heterogeneity, dynamism, and complexity of NE’s. This paper introduces a generic framework of PM in NE (we call it NEPM) based on the Balanced Scorecard (BSC) approach. In NEPM key performance indicators and cause-and-effect relationships among them are defined in a generic strategy map. NEPM could be applied to various types of NEs after specializing KPIs and relationships among them. Effectiveness of NEPM is shown through a case study of some Korean NEs.
A network dedicated to sciences dissemination : Scité
NASA Astrophysics Data System (ADS)
Botman, M.; Scité Network
2005-11-01
The activities of the network Scité are destined for the schools and the general public and include laboratories visits, training periods, seminars, conferences, adult courses specially designed for teachers, etc. Since 2002, collaborations between universities and enterprises are enhanced and developed to bring to light the variety of jobs linked to science and the multi-disciplinary process leading to industrial application of scientific findings. Activities will include, enterprises visits preparation of CD and video support presenting "passionate" jobs, and the set up of interactive workshops for students. Systematic relations and interactions with scientific as well as global media are established and formalised. Activities enhancing such interactions include the development of media-universities interface assuring the quality and the adequacy of scientific information transfer and vulgarisation. Based on the wide expertise accumulated through recent projects, Scité Network develop innovative activities involving a wide range of actors: universities, enterprises, media, schools, general public.
Enterprise PACS and image distribution.
Huang, H K
2003-01-01
Around the world now, because of the need to improve operation efficiency and better cost effective healthcare, many large-scale healthcare enterprises have been formed. Each of these enterprises groups hospitals, medical centers, and clinics together as one enterprise healthcare network. The management of these enterprises recognizes the importance of using PACS and image distribution as a key technology in cost-effective healthcare delivery in the enterprise level. As a result, many large-scale enterprise level PACS/image distribution pilot studies, full design and implementation, are underway. The purpose of this paper is to provide readers an overall view of the current status of enterprise PACS and image distribution. reviews three large-scale enterprise PACS/image distribution systems in USA, Germany, and South Korean. The concept of enterprise level PACS/image distribution, its characteristics and ingredients are then discussed. Business models for enterprise level implementation available by the private medical imaging and system integration industry are highlighted. One current system under development in designing a healthcare enterprise level chest tuberculosis (TB) screening in Hong Kong is described in detail. Copyright 2002 Elsevier Science Ltd.
Knowledge Innovation System: The Common Language.
ERIC Educational Resources Information Center
Rogers, Debra M. Amidon
1993-01-01
The Knowledge Innovation System is a management technique in which a networked enterprise uses knowledge flow as a collaborative advantage. Enterprise Management System-Architecture, which can be applied to collaborative activities, has five domains: economic, sociological, psychological, managerial, and technological. (SK)
Defense Standardization Program Journal, July/December 2007
2007-12-01
during the standard next review cycle, and identified areas where supplemental standards are needed. ENTERPRISE POWER SECURITY AND CONTINUITY Continual...availability of electric power at the enterprise level is essential for busi- ness functions, safety, and the public well-being.Yet many practical...challenges exist related to keeping critical operations, equipment, or facilities powered when the Peieeaeuiyivle ail ad acn teholg tatsnee electric grid is
Energizing the Enterprise: An Incentive-Based Approach to Homeland Security
2010-12-01
participation in efforts to deter terrorists and other malicious actors and mitigate radicalization toward violence38 • Mission 3: Enforcing and...citizens are able in influence homeland security—as explained namely by public choice theory. Both paths lead individuals toward realizing enterprise...in citizen preparedness. A September 2004 survey revealed the following figures: • 58 percent of Americans had taken at least one action toward
A cryptologic based trust center for medical images.
Wong, S T
1996-01-01
To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.
A cryptologic based trust center for medical images.
Wong, S T
1996-01-01
OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. MEASUREMENTS: The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. RESULTS: The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. CONCLUSION: Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment. PMID:8930857
Managing information technology security risk
NASA Technical Reports Server (NTRS)
Gilliam, David
2003-01-01
Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.
Challenges of Information Technology Security in the NASA Environment
NASA Technical Reports Server (NTRS)
Santiago, S. S.
2000-01-01
A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.
Production, Service and Trade Enterprise EKOREX Co. Ltd.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wlodkowski, A.
1995-12-31
In the first period of its activity the business employed skilled and experienced specialists from the ex-Military College for Army Chemical Engineers in Cracow; therefore, the enterprise dealt chiefly with the elimination of environmental contamination. Nowadays, the enterprise`s operational range comprises: consulting and training services related with ecology; study on environmental contamination; participation in the US program of low emission elimination in Cracow; designing, consulting in the realization of projects {open_quotes}GEF{close_quotes} (Global Environmental Facility); designing, construction, servicing, operating the sewerage and water treatment plants, boiler-houses, incinerators etc.; and designing of heat networks, exchanger junctions, central heating and household hot watermore » installations. Since 1991 employees have individually participated in making the program and in testing boilers and fuels verified in the boiler houses covered by the Polish - US program of reduction of low emission sources in Cracow. We have actively joined the program of elimination of heating network boiler houses (industrial and local) by designing (for the Cracow cogeneration plant and MPEC) new connections among some structures and the municiple thermal distribution network and exchangers stations. In 1994, 47 such designs were made and have been working on successive projects to be carried out in Cracow.« less
Velonakis, E; Mantas, J; Mavrikakis, I
2006-01-01
The occupational health and safety management constitutes a field of increasing interest. Institutions in cooperation with enterprises make synchronized efforts to initiate quality management systems to this field. Computer networks can offer such services via TCP/IP which is a reliable protocol for workflow management between enterprises and institutions. A design of such network is based on several factors in order to achieve defined criteria and connectivity with other networks. The network will be consisted of certain nodes responsible to inform executive persons on Occupational Health and Safety. A web database has been planned for inserting and searching documents, for answering and processing questionnaires. The submission of files to a server and the answers to questionnaires through the web help the experts to make corrections and improvements on their activities. Based on the requirements of enterprises we have constructed a web file server. We submit files in purpose users could retrieve the files which need. The access is limited to authorized users and digital watermarks authenticate and protect digital objects. The Health and Safety Management System follows ISO 18001. The implementation of it, through the web site is an aim. The all application is developed and implemented on a pilot basis for the health services sector. It is all ready installed within a hospital, supporting health and safety management among different departments of the hospital and allowing communication through WEB with other hospitals.
Evolving bipartite authentication graph partitions
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
2017-01-16
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Evolving bipartite authentication graph partitions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Benefits of Enterprise Social Networking Systems for High Energy Physics community
NASA Astrophysics Data System (ADS)
Silva de Sousa, B.; Wagner, A.; Ormancey, E.; Grzywaczewski, P.
2015-12-01
The emergence of social media platforms in the consumer space unlocked new ways of interaction between individuals on the Web. People develop now their social networks and relations based on common interests and activities with the choice to opt-in or opt-out on content of their interest. This kind of platforms have also an important place to fill inside large organizations and enterprises where communication and collaborators interaction are keys for development. Enterprise Social Networking Systems (ESN) add value to an organization by encouraging information sharing, capturing knowledge, enabling action and empowering people. CERN is currently rolling out an ESN which aims to unify and provide a single point of access to the multitude of information sources in the organization. It also implements social features that can be added on top of existing communication channels. While the deployment of this kind of platforms is not without risks we firmly believe that they are of the best interest for our community, opening the opportunity to evaluate a global social network for High Energy Physics (HEP).
NASA Astrophysics Data System (ADS)
Cagnazzo, Luca; Taticchi, Paolo; Bidini, Gianni; Sameh, Mohamed
Collaboration among companies is nowadays a success leverage from those involved, especially for SMEs. The networking advantages are several and among them, reducing costs is a critical one. Costs reduction due to the possibility of Collaborative Procurement (CP) among partners is one of the most important achievements in a network. While the literature available offers good bases for managing single contractor procurement issues, little research addresses the case of CP within Enterprise Networks (ENs). This paper explore the mentioned issue and proposes a general framework for managing CP in ENs, those with the Virtual Development Office (VDO) structure. The findings from the application of the framework proposed in an Italian network are highlighted so as to provide preliminary results and drive future research.
Rep. Issa, Darrell E. [R-CA-49
2012-02-09
House - 02/23/2012 Referred to the Subcommittee on Capital Markets and Government Sponsored Enterprises. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Feltus, Frank A.; Breen, Joseph R.; Deng, Juan; Izard, Ryan S.; Konger, Christopher A.; Ligon, Walter B.; Preuss, Don; Wang, Kuang-Ching
2015-01-01
In the last decade, high-throughput DNA sequencing has become a disruptive technology and pushed the life sciences into a distributed ecosystem of sequence data producers and consumers. Given the power of genomics and declining sequencing costs, biology is an emerging “Big Data” discipline that will soon enter the exabyte data range when all subdisciplines are combined. These datasets must be transferred across commercial and research networks in creative ways since sending data without thought can have serious consequences on data processing time frames. Thus, it is imperative that biologists, bioinformaticians, and information technology engineers recalibrate data processing paradigms to fit this emerging reality. This review attempts to provide a snapshot of Big Data transfer across networks, which is often overlooked by many biologists. Specifically, we discuss four key areas: 1) data transfer networks, protocols, and applications; 2) data transfer security including encryption, access, firewalls, and the Science DMZ; 3) data flow control with software-defined networking; and 4) data storage, staging, archiving and access. A primary intention of this article is to orient the biologist in key aspects of the data transfer process in order to frame their genomics-oriented needs to enterprise IT professionals. PMID:26568680
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... promotes the growth and competitiveness of large, medium, and small minority business enterprises by offering management and technical assistance through a network of regional and local business centers... DEPARTMENT OF COMMERCE Minority Business Development Agency Proposed Information Collection...
Intrusion detection and monitoring for wireless networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.
Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wirelessmore » networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.« less
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Mangum, Kevin
2016-01-01
The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).
The virtual cooperation platform in enterprise and supplier cooperation models.
Chang, Che-Wei; Wu, Cheng-Ru; Liao, Chia-Chun
2010-08-01
Abstract This study examines the use of the virtual enterprise network supplier supply-chain model of business behavior in creating synergies of cooperation. To explore virtual network behavior, it evaluates 60 samples, taken from of a few supply chains, and 17 items meeting certain behavioral criteria. Such an analysis may help to reduce costs and processing time effectively, as well as promote effective communication. Furthermore, the study of behavior in this electronic setting is a reliable and useful assessment method.
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... building and loan company or association; (4) Trust company; (5) Insurance company; (6) Investment company registered with the U.S. Securities and Exchange Commission under the Investment Company Act of 1940 (15 U.S...) or (a)(5); (9) Small Business Investment Company or Minority Enterprise Small Business Investment...
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... building and loan company or association; (4) Trust company; (5) Insurance company; (6) Investment company registered with the U.S. Securities and Exchange Commission under the Investment Company Act of 1940 (15 U.S...) or (a)(5); (9) Small Business Investment Company or Minority Enterprise Small Business Investment...
Totally Integrated Munitions Enterprise ''Affordable Munitions Production for the 21st Century''
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burleson, R.R.; Poggio, M.E.; Rosenberg, S.J.
2000-09-13
The U.S. Army faces several munitions manufacturing issues: downsizing of the organic production base, timely fielding of affordable smart munitions, and munitions replenishment during national emergencies. Totally Integrated Munitions Enterprise (TIME) is addressing these complex issues via the development and demonstration of an integrated enterprise. The enterprise will include the tools, network, and open modular architecture controllers to enable accelerated acquisition, shortened concept to volume production, lower life cycle costs, capture of critical manufacturing processes, and communication of process parameters between remote sites to rapidly spin-off production for replenishment by commercial sources. TIME addresses the enterprise as a system, integratingmore » design, engineering, manufacturing, administration, and logistics.« less
Totally Integrated Munitions Enterprise ''Affordable Munitions Production for the 21st Century''
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burleson, R.R.; Poggio, M.E.; Rosenberg, S.J.
2000-08-18
The U.S. Army faces several munitions manufacturing issues: downsizing of the organic production base, timely fielding of affordable smart munitions, and munitions replenishment during national emergencies. Totally Integrated Munitions Enterprise (TIME) is addressing these complex issues via the development and demonstration of an integrated enterprise. The enterprise will include the tools, network, and open modular architecture controllers to enable accelerated acquisition, shortened concept to volume production, lower life cycle costs, capture of critical manufacturing processes, and communication of process parameters between remote sites to rapidly spin-off production for replenishment by commercial sources. TIME addresses the enterprise as a system, integratingmore » design, engineering, manufacturing, administration, and logistics.« less
Analyzing Enterprise Networks Needs: Action Research from the Mechatronics Sector
NASA Astrophysics Data System (ADS)
Cagnazzo, Luca; Taticchi, Paolo; Bidini, Gianni; Baglieri, Enzo
New business models and theories are developing nowadays towards collaborative environments direction, and many new tools in sustaining companies involved in these organizations are emerging. Among them, a plethora of methodologies to analyze their needs are already developed for single companies. Few academic works are available about Enterprise Networks (ENs) need analysis. This paper presents the learning from an action research (AR) in the mechatronics sector: AR has been used in order to experience the issue of evaluating network needs and therefore define, develop, and test a complete framework for network evaluation. Reflection on the story in the light of the experience and the theory is presented, as well as extrapolation to a broader context and articulation of usable knowledge.
NASA Technical Reports Server (NTRS)
Swenson, Paul
2017-01-01
Satellite/Payload Ground Systems - Typically highly-customized to a specific mission's use cases - Utilize hundreds (or thousands!) of specialized point-to-point interfaces for data flows / file transfers Documentation and tracking of these complex interfaces requires extensive time to develop and extremely high staffing costs Implementation and testing of these interfaces are even more cost-prohibitive, and documentation often lags behind implementation resulting in inconsistencies down the road With expanding threat vectors, IT Security, Information Assurance and Operational Security have become key Ground System architecture drivers New Federal security-related directives are generated on a daily basis, imposing new requirements on current / existing ground systems - These mandated activities and data calls typically carry little or no additional funding for implementation As a result, Ground System Sustaining Engineering groups and Information Technology staff continually struggle to keep up with the rolling tide of security Advancing security concerns and shrinking budgets are pushing these large stove-piped ground systems to begin sharing resources - I.e. Operational / SysAdmin staff, IT security baselines, architecture decisions or even networks / hosting infrastructure Refactoring these existing ground systems into multi-mission assets proves extremely challenging due to what is typically very tight coupling between legacy components As a result, many "Multi-Mission" ops. environments end up simply sharing compute resources and networks due to the difficulty of refactoring into true multi-mission systems Utilizing continuous integration / rapid system deployment technologies in conjunction with an open architecture messaging approach allows System Engineers and Architects to worry less about the low-level details of interfaces between components and configuration of systems GMSEC messaging is inherently designed to support multi-mission requirements, and allows components to aggregate data across multiple homogeneous or heterogeneous satellites or payloads - The highly-successful Goddard Science and Planetary Operations Control Center (SPOCC) utilizes GMSEC as the hub for it's automation and situational awareness capability Shifts focus towards getting GS to a final configuration-managed baseline, as well as multi-mission / big-picture capabilities that help increase situational awareness, promote cross-mission sharing and establish enhanced fleet management capabilities across all levels of the enterprise.
New Structures for the Effective Dissemination of Knowledge in an Enterprise.
ERIC Educational Resources Information Center
Kok, J. Andrew
2000-01-01
Discusses the creation of knowledge enterprises. Highlights include knowledge creation and sharing; networked organizational structures; structures of knowledge organization; competitive strategies; new structures to manage knowledge; boundary crossing; multi-skilled teams; communities of interest or practice; and dissemination of knowledge in an…
NASA Astrophysics Data System (ADS)
Dimond, David A.; Burgess, Robert; Barrios, Nolan; Johnson, Neil D.
2000-05-01
Traditionally, to guarantee the network performance of medical image data transmission, imaging traffic was isolated on a separate network. Organizations are depending on a new generation of multi-purpose networks to transport both normal information and image traffic as they expand access to images throughout the enterprise. These organi want to leverage their existing infrastructure for imaging traffic, but are not willing to accept degradations in overall network performance. To guarantee 'on demand' network performance for image transmissions anywhere at any time, networks need to be designed with the ability to 'carve out' bandwidth for specific applications and to minimize the chances of network failures. This paper will present the methodology Cincinnati Children's Hospital Medical Center (CHMC) used to enhance the physical and logical network design of the existing hospital network to guarantee a class of service for imaging traffic. PACS network designs should utilize the existing enterprise local area network i.e. (LAN) infrastructure where appropriate. Logical separation or segmentation provides the application independence from other clinical and administrative applications as required, ensuring bandwidth and service availability.
An end-to-end communications architecture for condition-based maintenance applications
NASA Astrophysics Data System (ADS)
Kroculick, Joseph
2014-06-01
This paper explores challenges in implementing an end-to-end communications architecture for Condition-Based Maintenance Plus (CBM+) data transmission which aligns with the Army's Network Modernization Strategy. The Army's Network Modernization strategy is based on rolling out network capabilities which connect the smallest unit and Soldier level to enterprise systems. CBM+ is a continuous improvement initiative over the life cycle of a weapon system or equipment to improve the reliability and maintenance effectiveness of Department of Defense (DoD) systems. CBM+ depends on the collection, processing and transport of large volumes of data. An important capability that enables CBM+ is an end-to-end network architecture that enables data to be uploaded from the platform at the tactical level to enterprise data analysis tools. To connect end-to-end maintenance processes in the Army's supply chain, a CBM+ network capability can be developed from available network capabilities.
Vietnam: expanding the social security system.
Pruzin, D
1996-01-01
Viet Nam's shift toward a market-oriented economy has been associated with annual gross domestic product growth of more than 8% over the past 5 years. At the same time, the emergence of private-sector enterprises and subsequent closure of many state-run enterprises have had profound implications for Viet Nam's social protection systems. At present, only 5.6 million of the country's 33 million workers are covered under the state-run social insurance system. In 1995, the government moved to include private enterprises with 10 or more employees in its state benefits system. The International Labor Organization (ILO) has been working with the Vietnamese Government to design and implement a social security system that would extend coverage progressively to excluded sectors and provide support to workers who have become unemployed as a result of the economic transition process. At its Eighth National Congress, the Vietnamese Communist Party approved a 5-year social and economic plan calling for such an expansion of the social insurance system as well as for a guaranteed standard of living for pensioners. To facilitate anticipated changes, activities that were previously divided between the Ministry of Labor, Invalids, and Social Affairs and the Vietnam General Confederation of Labor have been assigned to the newly formed Vietnam Social Insurance (VSI) Organization. Under consideration is a plan to combine some VSI activities with those of the Vietnam Health Insurance Organization. The ILO will assist with training, computerization, and social security fund investing. Noncompliance is a major obstacle to planned expansion of the social security system; about 90% of private firms are still not paying into the system.
Enterprise 2.0: An Extended Technology Acceptance Model
ERIC Educational Resources Information Center
Kurz, James M.
2012-01-01
The amount of information that people produce is changing, especially as social networking becomes more commonplace and globalization inefficiencies continue to swamp enterprise. Companies are rising to the challenge to create a collaborative approach for information management, but according to many leading technology advisory firms, they have…
2009-12-01
type of information available through DISA search tools: Centralized Search, Federated Search , and Enterprise Search (Defense Information Systems... Federated Search , and Enterprise 41 Search services. Likewise, EFD and GCDS support COIs in discovering information by making information
Code of Federal Regulations, 2010 CFR
2010-04-01
... management investment company. 270.17d-3 Section 270.17d-3 Commodity and Securities Exchanges SECURITIES AND... registered open-end management investment company. An affiliated person of, or principal underwriter for, a registered open-end management investment company and an affiliated person of such a person or principal...
KASH, BITA A.
2016-01-01
Policy Points: Community health information exchanges have the characteristics of a public good, and they support population health initiatives at the state and national levels. However, current policy equally incentivizes health systems to create their own information exchanges covering more narrowly defined populations.Noninteroperable electronic health records and vendors’ expensive custom interfaces are hindering health information exchanges. Moreover, vendors are imposing the costs of interoperability on health systems and community health information exchanges.Health systems are creating networks of targeted physicians and facilities by funding connections to their own enterprise health information exchanges. These private networks may change referral patterns and foster more integration with outpatient providers. Context The United States has invested billions of dollars to encourage the adoption of and implement the information technologies necessary for health information exchange (HIE), enabling providers to efficiently and effectively share patient information with other providers. Health care providers now have multiple options for obtaining and sharing patient information. Community HIEs facilitate information sharing for a broad group of providers within a region. Enterprise HIEs are operated by health systems and share information among affiliated hospitals and providers. We sought to identify why hospitals and health systems choose either to participate in community HIEs or to establish enterprise HIEs. Methods We conducted semistructured interviews with 40 policymakers, community and enterprise HIE leaders, and health care executives from 19 different organizations. Our qualitative analysis used a general inductive and comparative approach to identify factors influencing participation in, and the success of, each approach to HIE. Findings Enterprise HIEs support health systems' strategic goals through the control of an information technology network consisting of desired trading partners. Community HIEs support obtaining patient information from the broadest set of providers, but with more dispersed benefits to all participants, the community, and patients. Although not an either/or decision, community and enterprise HIEs compete for finite organizational resources like time, skilled staff, and money. Both approaches face challenges due to vendor costs and less‐than‐interoperable technology. Conclusions Both community and enterprise HIEs support aggregating clinical data and following patients across settings. Although they can be complementary, community and enterprise HIEs nonetheless compete for providers’ attention and organizational resources. Health policymakers might try to encourage the type of widespread information exchange pursued by community HIEs, but the business case for enterprise HIEs clearly is stronger. The sustainability of a community HIE, potentially a public good, may necessitate ongoing public funding and supportive regulation. PMID:26994710
Vest, Joshua R; Kash, Bita A
2016-03-01
Community health information exchanges have the characteristics of a public good, and they support population health initiatives at the state and national levels. However, current policy equally incentivizes health systems to create their own information exchanges covering more narrowly defined populations. Noninteroperable electronic health records and vendors' expensive custom interfaces are hindering health information exchanges. Moreover, vendors are imposing the costs of interoperability on health systems and community health information exchanges. Health systems are creating networks of targeted physicians and facilities by funding connections to their own enterprise health information exchanges. These private networks may change referral patterns and foster more integration with outpatient providers. The United States has invested billions of dollars to encourage the adoption of and implement the information technologies necessary for health information exchange (HIE), enabling providers to efficiently and effectively share patient information with other providers. Health care providers now have multiple options for obtaining and sharing patient information. Community HIEs facilitate information sharing for a broad group of providers within a region. Enterprise HIEs are operated by health systems and share information among affiliated hospitals and providers. We sought to identify why hospitals and health systems choose either to participate in community HIEs or to establish enterprise HIEs. We conducted semistructured interviews with 40 policymakers, community and enterprise HIE leaders, and health care executives from 19 different organizations. Our qualitative analysis used a general inductive and comparative approach to identify factors influencing participation in, and the success of, each approach to HIE. Enterprise HIEs support health systems' strategic goals through the control of an information technology network consisting of desired trading partners. Community HIEs support obtaining patient information from the broadest set of providers, but with more dispersed benefits to all participants, the community, and patients. Although not an either/or decision, community and enterprise HIEs compete for finite organizational resources like time, skilled staff, and money. Both approaches face challenges due to vendor costs and less-than-interoperable technology. Both community and enterprise HIEs support aggregating clinical data and following patients across settings. Although they can be complementary, community and enterprise HIEs nonetheless compete for providers' attention and organizational resources. Health policymakers might try to encourage the type of widespread information exchange pursued by community HIEs, but the business case for enterprise HIEs clearly is stronger. The sustainability of a community HIE, potentially a public good, may necessitate ongoing public funding and supportive regulation. © 2016 Milbank Memorial Fund.
Strategic Enterprise Resource Planning for Global Supply Chain Competitiveness
ERIC Educational Resources Information Center
Nageswararao, A. V.; Sahu, Dasarathi; Mohan, V. Krishna
2011-01-01
Strategic Enterprise Resource planning (SERP) systems are networked and integrated information mechanisms which are developed to achieve competitive advantage for organizations operating in global scale. It plays a vital role in Integrating various stake holders and channel partners involved in day to day operations. In the present Globalized…
Creative Research Ethics in the Enterprise University: What Price Academic Freedom?
ERIC Educational Resources Information Center
O'Neill, John
2013-01-01
Between 1990 and 2010, the New Zealand university adopted an enterprise form. The nature of academic work changed commensurate with changes in the external regulatory and funding environment, the internal performative research culture, the proliferation of trans-national researcher networks, and the growing managerial codification of acceptable…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-14
... Minority Business Development Agency's (MBDA) Native American Business Enterprise Center (NABEC) Program... collaboration among the NABECs and Minority Business Enterprises (MBEs) to achieve the same program goals, and... offering management and technical assistance through a nationwide network of 40 business centers. Among the...
Practicing Technology Implementation: The Case of an Enterprise System
ERIC Educational Resources Information Center
Awazu, Yukika
2013-01-01
Drawing on four theories of practice--Communities of Practice (CoP), Bourdieu's theory of practice, Pickering's mangle of practice, and Actor Network Theory (ANT), the study provides an in-depth understanding about technology implementation practice. Analysis of an Enterprise System implementation project in a software manufacturing…
Power Grid Construction Project Portfolio Optimization Based on Bi-level programming model
NASA Astrophysics Data System (ADS)
Zhao, Erdong; Li, Shangqi
2017-08-01
As the main body of power grid operation, county-level power supply enterprises undertake an important emission to guarantee the security of power grid operation and safeguard social power using order. The optimization of grid construction projects has been a key issue of power supply capacity and service level of grid enterprises. According to the actual situation of power grid construction project optimization of county-level power enterprises, on the basis of qualitative analysis of the projects, this paper builds a Bi-level programming model based on quantitative analysis. The upper layer of the model is the target restriction of the optimal portfolio; the lower layer of the model is enterprises’ financial restrictions on the size of the enterprise project portfolio. Finally, using a real example to illustrate operation proceeding and the optimization result of the model. Through qualitative analysis and quantitative analysis, the bi-level programming model improves the accuracy and normative standardization of power grid enterprises projects.
A study of the security technology and a new security model for WiFi network
NASA Astrophysics Data System (ADS)
Huang, Jing
2013-07-01
The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robertson, Perry J.; Kottenstette, Richard Joseph; Crouch, Shannon M.
The National Ecological Observatory Network (NEON) is an ambitious National Science Foundation sponsored project intended to accumulate and disseminate ecologically informative sensor data from sites among 20 distinct biomes found within the United States and Puerto Rico over a period of at least 30 years. These data are expected to provide valuable insights into the ecological impacts of climate change, land-use change, and invasive species in these various biomes, and thereby provide a scientific foundation for the decisions of future national, regional, and local policy makers. NEON's objectives are of substantial national and international importance, yet they must be achievedmore » with limited resources. Sandia National Laboratories was therefore contracted to examine four areas of significant systems engineering concern; specifically, alternatives to commercial electrical utility power for remote operations, approaches to data acquisition and local data handling, protocols for secure long-distance data transmission, and processes and procedures for the introduction of new instruments and continuous improvement of the sensor network. The results of these preliminary systems engineering evaluations are presented, with a series of recommendations intended to optimize the efficiency and probability of long-term success for the NEON enterprise.« less
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
NASA Technical Reports Server (NTRS)
Davies, Mark
1991-01-01
The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both Local Area Network (LAN) and Wide Area Network (WAN) space. Also, you can expect to see the higher level functions and applications begin the same transition. Additional information is given in viewgraph form.
Spatial decision support system for tobacco enterprise based on spatial data mining
NASA Astrophysics Data System (ADS)
Mei, Xin; Liu, Junyi; Zhang, Xuexia; Cui, Weihong
2007-11-01
Tobacco enterprise is a special enterprise, which has strong correlation to regional geography. But in the past research and application, the combination between tobacco and GIS is limited to use digital maps to assist cigarette distribution. How to comprehensively import 3S technique and spatial data mining (SDM) to construct spatial decision support system (SDSS) of tobacco enterprise is the main research aspect in this paper. The paper concretely analyzes the GIS requirements in tobacco enterprise for planning location of production, monitoring production management and product sale at the beginning. Then holistic solution is presented and frame design for tobacco enterprise spatial decision based on SDM is given. This paper describes how to use spatial analysis and data mining to realize the spatial decision processing such as monitoring tobacco planted acreage, analyzing and planning the cigarette sale network and so on.
The evaluation model of the enterprise energy efficiency based on DPSR.
Wei, Jin-Yu; Zhao, Xiao-Yu; Sun, Xue-Shan
2017-05-08
The reasonable evaluation of the enterprise energy efficiency is an important work in order to reduce the energy consumption. In this paper, an effective energy efficiency evaluation index system is proposed based on DPSR (Driving forces-Pressure-State-Response) with the consideration of the actual situation of enterprises. This index system which covers multi-dimensional indexes of the enterprise energy efficiency can reveal the complete causal chain which includes the "driver forces" and "pressure" of the enterprise energy efficiency "state" caused by the internal and external environment, and the ultimate enterprise energy-saving "response" measures. Furthermore, the ANP (Analytic Network Process) and cloud model are used to calculate the weight of each index and evaluate the energy efficiency level. The analysis of BL Company verifies the feasibility of this index system and also provides an effective way to improve the energy efficiency at last.
Defense Security Enterprise Architecture (DSEA) Product Reference Guide. Revision 1.0
2016-06-01
research and development efforts and functional requirements to provide an information sharing capability across all defense security domains. The...Office of the Secretary of Defense (OSD) Research and Development (RDT&E) initiative addressing vertical and horizontal information sharing across the...legal responsibilities to ensure data received by analysts meets user- specified criteria. This advancement in information sharing is made
Essays on Innovation Ecosystems in the Enterprise Software Industry
ERIC Educational Resources Information Center
Huang, Peng
2010-01-01
Innovation ecosystem strategy is often adopted by platform technology owners to seek complementary innovation from resources located outside the firm to exploit indirect network effect. In this dissertation I aim to address the issues that are related to the formation and business value of platform innovation ecosystems in the enterprise software…
NAVO MSRC Navigator. Fall 2004
2004-01-01
conjunction with Concord eHealth Enterprise Management Suite. Together these enterprise management packages provide real-time network and host performance...Right. A Concord eHealth -generated trend report from the NAVO MSRC 10-Gb Ethernet backbone. B an dw id th U ti liz at io n 23AU G04 0:00 30 AUG 04
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
... the Office of Management and Budget (OMB) a request to review and approve the information collection...: The NCI Center for Biomedical Informatics and Information Technology (CBIIT) launched the enterprise...] Enterprise Support Network (ESN), including the caBIG [supreg] Support Service Provider (SSP) Program. The ca...
Intelligent support of e-management for consumer-focused virtual enterprises
NASA Astrophysics Data System (ADS)
Chandra, Charu; Smirnov, Alexander V.
2000-10-01
The interest in consumer-focused virtual enterprises (VE) decision-making problem is growing fast. The purpose of this type of enterprise is to transform incomplete information about customer orders and available resources into-co-ordinated plans for production and replenishment of goods and services in the temporal network formed by collaborating units. This implies that information in the consumer-focused VE can be shared via Internet, Intranet, and Extranet for business-to-consumer (B2C), business-to-business service (B2B-S), and business-to-business goods (B2B-G) transactions. One of the goals of Internet-Based Management (e-management) is to facilitate transfer and sharing of data and knowledge in the context of enterprise collaboration. This paper discusses a generic framework of e-management that integrates intelligent information support group-decision making, and agreement modeling for a VE network. It offers the platform for design and modeling of diverse implementation strategies related to the type of agreement, optimization policies, decision-making strategies, organization structures, and information sharing strategies and mechanisms, and business policies for the VE.
NASA Astrophysics Data System (ADS)
Ma, Yuan-yuan; Zhuang, Xin-tian; Li, Ling-xuan
2011-02-01
Enterprises are the core power and the carriers to promote the country's economy developing sustainably and rapidly; the listed enterprises are the outstanding companies which can represent the economic level at the places where the enterprises are located, so we establish the cross-shareholding networks of the listed companies between 2002 and 2009, and then analyze the mutual investment at company-level, province-level and region-level. We have researched the overall trend of economic development and the overall tendency of capital flow of China in the recent 8 years based on the cross-shareholding networks, the influence of a global economic crisis on the stock markets and the overall economics of China in 2008 and the recovery of the economy after the economic crisis. Moreover, we analyze the variations of the cross-shareholding networks and the influence of the state-owned large and medium enterprises listing frequently on Chinese stock markets. We divide the provinces of China into 3 main categories according to their industrial situations. Though the analysis, we find that the wealth gap between the different areas is not significantly reduced even though the government has carried out strategies such as the Development of the West Regions and the Rejuvenation of Old Industrial Bases in Northeastern China. We analyze the cumulative distribution function of the degree of the vertices and use large amounts of data to do empirical analysis. The methods used include the hierarchical cluster analysis, regression analysis, etc.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-29
... DEPARTMENT OF HOMELAND SECURITY Notice of Meeting of the Homeland Security Information Network... Security. ACTION: Notice of open meeting. SUMMARY: The Homeland Security Information Network Advisory... (Pub. L. 92-463). The mission of the Homeland Security Information Network Advisory Committee is to...
Connecting to the Internet Securely; Protecting Home Networks CIAC-2324
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W J; Krystosek, P; Smith, J
2002-11-27
With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less
2012-09-01
Pentagon, U.S. National Parks and Monuments and Reagan National Airport. Amidst the PCC sits Pentagon City Mall, home to more than 170 stores, a movie...integrated into the homeland security apparatus. As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the...Advisor Dan Moran, PhD Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This thesis
ESB-based Sensor Web integration for the prediction of electric power supply system vulnerability.
Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja
2013-08-15
Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.
ESB-Based Sensor Web Integration for the Prediction of Electric Power Supply System Vulnerability
Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja
2013-01-01
Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application. PMID:23955435
2013-06-01
notwithstanding any other provision of law , no person shall be subject to a penalty for failing to comply with a collection of information if it does not...attempt to reconcile the complex organizational ecosystem that constitutes the DOD ISR enterprise. The modern enterprise remains a reflection of...rights. 3. The Western Hemisphere – must control insurgencies, support NAFTA arrangements, and work with non-govt organizations to support
Code of Federal Regulations, 2011 CFR
2011-04-01
... ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.53 Preamble. (a) Members of the Securities... enterprise system serves the welfare of all citizens. Their success in this endeavor is a bulwark against...
76 FR 67750 - Homeland Security Information Network Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-02
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...
78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...
78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Homeland Security Information Network Advisory... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet... posted beforehand at this link: http://www.dhs.gov/homeland-security-information-network-advisory...
Social Media: Strategic Asset or Operational Vulnerability?
2012-05-04
Marine Corps message indicated that social networking sites “are particularly high risk due to information exposure, user generated content, and...Immediate Ban of Internet Social Networking Sites on Marine Corps Enterprise Network NIPRNET,” U.S. Marine Corps, accessed April 3, 2012, http... networking sites via the DoD’s unclassified computer network. The memorandum provided guidance on official use of social networking sites as well
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat
The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility onmore » enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.« less
Security Shift in Future Network Architectures
2010-11-01
RTO-MP-IST-091 2 - 1 Security Shift in Future Network Architectures Tim Hartog, M.Sc Information Security Dept. TNO Information and...current practice military communication infrastructures are deployed as stand-alone networked information systems. Network -Enabled Capabilities (NEC) and...information architects and security specialists about the separation of network and information security, the consequences of this shift and our view
Military Cyberspace: From Evolution to Revolution
2012-02-08
support the GCCs and enable USCYBERCOM to accomplish its mission? 15. SUBJECT TERMS Network Operations, Global Information Grid ( GIG ), Network...DATE: 08 February 2012 WORD COUNT: 5,405 PAGES: 30 KEY TERMS: Network Operations, Global Information Grid ( GIG ), Network Architecture...defense of the DOD global information grid ( GIG ). The DOD must pursue an enterprise approach to network management in the cyberspace domain to
2010-09-01
secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless
«Smart Grid» Concept As A Modern Technology For The Power Industry Development
NASA Astrophysics Data System (ADS)
Vidyaev, Igor G.; Ivashutenko, Alexandr S.; Samburskaya, Maria A.
2017-01-01
The article discusses the main problems of the power industry and energy supply to the distribution networks. One of the suggested solutions for these problems is the use of intelligent energy networks on the basis of digital reality simulation, in particular, the concept of «SMART GRID». The article presents the basic points of the concept and the peculiarities of its application at the enterprises. It was demonstrated that the use of this technology eliminates power shortage, reduces the energy intensity and improves the energy efficiency throughout the operation of an enterprise as a whole.
Prototype system of secure VOD
NASA Astrophysics Data System (ADS)
Minemura, Harumi; Yamaguchi, Tomohisa
1997-12-01
Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.
Totally Integrated Munitions Enterprise ''Affordable Munitions Production for the 21st Century''
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burleson, R.R.; Poggio, M.E.; Rosenberg, S.J.
2000-07-14
The U.S. Army faces several munitions manufacturing issues: downsizing of the organic production base, timely fielding of affordable smart munitions, and munitions replenishment during national emergencies. TIME is addressing these complex issues via the development and demonstration of an integrated enterprise. The enterprise will include the tools, network, and open modular architecture controller to enable accelerated acquisition, shortened concept to volume production, lower life cycle costs, capture of critical manufacturing processes, and communication of process parameters between remote sites to rapidly spin-off production for replenishment by commercial sources. TIME addresses the enterprise as a system, integrating design, engineering, manufacturing, administration,more » and logistics.« less
Digital Dimension Disruption: A National Security Enterprise Response
2017-12-21
societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks...humans did calculations and searched for information. In the past quarter century, human use of computers has changed fundamentally , but com- mon...the nature of data is, itself, undergoing a fundamental change. The terms “bespoke data” (from the British term for cus- tom-tailored) and “by
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] A.G. Volney Center, Inc. (f/k/a Buddha Steel, Inc.), China Green Material Technologies, Inc., China Tractor Holdings, Inc., and Franklin Towers Enterprises, Inc.; Order of Suspension of Trading September 18, 2013. It appears to the Securities and Exchange Commission that there is a lack of...
Data Integration in Computer Distributed Systems
NASA Astrophysics Data System (ADS)
Kwiecień, Błażej
In this article the author analyze a problem of data integration in a computer distributed systems. Exchange of information between different levels in integrated pyramid of enterprise process is fundamental with regard to efficient enterprise work. Communication and data exchange between levels are not always the same cause of necessity of different network protocols usage, communication medium, system response time, etc.
Enterprise-class Digital Imaging and Communications in Medicine (DICOM) image infrastructure.
York, G; Wortmann, J; Atanasiu, R
2001-06-01
Most current picture archiving and communication systems (PACS) are designed for a single department or a single modality. Few PACS installations have been deployed that support the needs of the hospital or the entire Integrated Delivery Network (IDN). The authors propose a new image management architecture that can support a large, distributed enterprise.
ERIC Educational Resources Information Center
Bosua, Rachelle; Evans, Nina; Sawyer, Janet
2013-01-01
Small and Medium Enterprises (SMEs) are major sources of prosperity and employment and are viewed as critical to regional development in Australia. A key factor to foster productivity and growth in SMEs is their ability to identify, acquire, transform and exploit external knowledge. This ability, referred to as the "absorptive capacity…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... proposed projects to be submitted to the Office of Management and Budget (OMB) for review and approval... Information Technology (CBIIT) launched the enterprise phase of the caBIG [supreg] initiative in early 2007... resources available through the caBIG [supreg] Enterprise Support Network (ESN), including the caBIG [supreg...
Routing architecture and security for airborne networks
NASA Astrophysics Data System (ADS)
Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato
2009-05-01
Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.
Final Report - Cloud-Based Management Platform for Distributed, Multi-Domain Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chowdhury, Pulak; Mukherjee, Biswanath
2017-11-03
In this Department of Energy (DOE) Small Business Innovation Research (SBIR) Phase II project final report, Ennetix presents the development of a solution for end-to-end monitoring, analysis, and visualization of network performance for distributed networks. This solution benefits enterprises of all sizes, operators of distributed and federated networks, and service providers.
ERIC Educational Resources Information Center
Tovstiga, George; Fantner, Ernest J.
2000-01-01
Examines implications of the networked economy for e-commerce business start-ups. Revisits the notion of "value" and "value creation" in a network context. Examines "value" relative to technological innovation. Looks at implications of the network environment for the organization and transformation of the enterprise's…
Process-driven selection of information systems for healthcare
NASA Astrophysics Data System (ADS)
Mills, Stephen F.; Yeh, Raymond T.; Giroir, Brett P.; Tanik, Murat M.
1995-05-01
Integration of networking and data management technologies such as PACS, RIS and HIS into a healthcare enterprise in a clinically acceptable manner is a difficult problem. Data within such a facility are generally managed via a combination of manual hardcopy systems and proprietary, special-purpose data processing systems. Process modeling techniques have been successfully applied to engineering and manufacturing enterprises, but have not generally been applied to service-based enterprises such as healthcare facilities. The use of process modeling techniques can provide guidance for the placement, configuration and usage of PACS and other informatics technologies within the healthcare enterprise, and thus improve the quality of healthcare. Initial process modeling activities conducted within the Pediatric ICU at Children's Medical Center in Dallas, Texas are described. The ongoing development of a full enterprise- level model for the Pediatric ICU is also described.
Scarselli, A; Leva, A; Campo, G; Marconi, M; Nesti, M; Erba, P
2005-01-01
The Italian Institute for Occupational Prevention and Safety (ISPESL) carried out a register of enterprises operating in industry, services and agriculture sector to provide information on their location, economical activity and occupational data. This database has been built merging administrative files from the National Institute of Social Security (INPS) and the Computer Science Society of Italian Chambers of Commerce (InfoCamere). Enterprises have been classified by economic sector - in accordance with ISTAT (National Statistics Institute) "Ateco91" classification--and by accuracy level of the record linkage. In details, three different subsystems have been set up: (A) enterprises satisfying linkage; (B) enterprises in InfoCamere file not linked with INPS file; (C) enterprises in INPS file not linked with InfoCamere file. In the whole, 6.026.676 factories have been collected, of which 1.188.784 in group A, 4.543.091 in group B and 294.801 in group C. Establishing a database of information on industries may be useful to improve preventive programs and to plan health care surveillance systems.
Dynamic Business Networks: A Headache for Sustainable Systems Interoperability
NASA Astrophysics Data System (ADS)
Agostinho, Carlos; Jardim-Goncalves, Ricardo
Collaborative networked environments emerged with the spread of the internet, contributing to overcome past communication barriers, and identifying interoperability as an essential property. When achieved seamlessly, efficiency is increased in the entire product life cycle. Nowadays, most organizations try to attain interoperability by establishing peer-to-peer mappings with the different partners, or in optimized networks, by using international standard models as the core for information exchange. In current industrial practice, mappings are only defined once, and the morphisms that represent them, are hardcoded in the enterprise systems. This solution has been effective for static environments, where enterprise and product models are valid for decades. However, with an increasingly complex and dynamic global market, models change frequently to answer new customer requirements. This paper draws concepts from the complex systems science and proposes a framework for sustainable systems interoperability in dynamic networks, enabling different organizations to evolve at their own rate.
38 CFR 74.27 - How will VA store information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... (CONTINUED) VETERANS SMALL BUSINESS REGULATIONS Records Management § 74.27 How will VA store information? VA... examination visits will be scanned onto portable media and fully secured in the Center for Veterans Enterprise...
78 FR 57336 - Disadvantaged Business Enterprise: Program Implementation Modifications
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-18
... West Building. (2) Attendance: Due to security and seating limitations, any person wishing to attend.... Speakers' remarks will be limited to 5 minutes each, although the Department may need to limit the duration...
Detecting eavesdropping activity in fiber optic networks
NASA Astrophysics Data System (ADS)
MacDonald, Gregory G.
The secure transmission of data is critical to governments, military organizations, financial institutions, health care providers and other enterprises. The primary method of securing in-transit data is though data encryption. A number of encryption methods exist but the fundamental approach is to assume an eavesdropper has access to the encrypted message but does not have the computing capability to decrypt the message in a timely fashion. Essentially, the strength of security depends on the complexity of the encryption method and the resources available to the eavesdropper. The development of future technologies, most notably quantum computers and quantum computing, is often cited as a direct threat to traditional encryption schemes. It seems reasonable that additional effort should be placed on prohibiting the eavesdropper from coming into possession of the encrypted message in the first place. One strategy for denying possession of the encrypted message is to secure the physical layer of the communications path. Because the majority of transmitted information is over fiber-optic networks, it seems appropriate to consider ways of enhancing the integrity and security of the fiber-based physical layer. The purpose of this research is to investigate the properties of light, as they are manifested in single mode fiber, as a means of insuring the integrity and security of the physical layer of a fiber-optic based communication link. Specifically, the approach focuses on the behavior of polarization in single mode fiber, as it is shown to be especially sensitive to fiber geometry. Fiber geometry is necessarily modified during the placement of optical taps. The problem of detecting activity associated with the placement of an optical tap is herein approached as a supervised machine learning anomaly identification task. The inputs include raw polarization measurements along with additional features derived from various visualizations of the raw data (the inputs are collectively referred to as “features”). Extreme Value Theory (EVT) is proposed as a means of characterizing normal polarization fluctuations in optical fiber. New uses (as anomaly detectors) are proposed for some long-time statistics (Ripley’s K function, its variant the L function, and the Hopkins statistic). These metrics are shown to have good discriminating qualities when identifying anomalous polarization measurements. The metrics have such good performance only simple algorithms are necessary for identifying modifications to fiber geometry.
Gross anatomy of network security
NASA Technical Reports Server (NTRS)
Siu, Thomas J.
2002-01-01
Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.
Optical identity authentication technique based on compressive ghost imaging with QR code
NASA Astrophysics Data System (ADS)
Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang
2018-04-01
With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.
Network Security Validation Using Game Theory
NASA Astrophysics Data System (ADS)
Papadopoulou, Vicky; Gregoriades, Andreas
Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.
The Enterprise 2.0 Concept: Challenges on Data and Information Security
NASA Astrophysics Data System (ADS)
Silva, Ana; Moreira, Fernando; Varajão, João
The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Network Security Risk Assessment System Based on Attack Graph and Markov Chain
NASA Astrophysics Data System (ADS)
Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian
2017-10-01
Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.
NASA Astrophysics Data System (ADS)
Leuchter, S.; Reinert, F.; Müller, W.
2014-06-01
Procurement and design of system architectures capable of network centric operations demand for an assessment scheme in order to compare different alternative realizations. In this contribution an assessment method for system architectures targeted at the C4ISR domain is presented. The method addresses the integration capability of software systems from a complex and distributed software system perspective focusing communication, interfaces and software. The aim is to evaluate the capability to integrate a system or its functions within a system-of-systems network. This method uses approaches from software architecture quality assessment and applies them on the system architecture level. It features a specific goal tree of several dimensions that are relevant for enterprise integration. These dimensions have to be weighed against each other and totalized using methods from the normative decision theory in order to reflect the intention of the particular enterprise integration effort. The indicators and measurements for many of the considered quality features rely on a model based view on systems, networks, and the enterprise. That means it is applicable to System-of-System specifications based on enterprise architectural frameworks relying on defined meta-models or domain ontologies for defining views and viewpoints. In the defense context we use the NATO Architecture Framework (NAF) to ground respective system models. The proposed assessment method allows evaluating and comparing competing system designs regarding their future integration potential. It is a contribution to the system-of-systems engineering methodology.
ERIC Educational Resources Information Center
Peters-Burton, Erin; Baynard, Liz R.
2013-01-01
An understanding of the scientific enterprise is useful because citizens need to make systematic, rational decisions about projects involving scientific endeavors and technology, and a clearer understanding of scientific epistemology is beneficial because it could encourage more public engagement with science. The purpose of this study was to…
Tools to manage the enterprise-wide picture archiving and communications system environment.
Lannum, L M; Gumpf, S; Piraino, D
2001-06-01
The presentation will focus on the implementation and utilization of a central picture archiving and communications system (PACS) network-monitoring tool that allows for enterprise-wide operations management and support of the image distribution network. The MagicWatch (Siemens, Iselin, NJ) PACS/radiology information system (RIS) monitoring station from Siemens has allowed our organization to create a service support structure that has given us proactive control of our environment and has allowed us to meet the service level performance expectations of the users. The Radiology Help Desk has used the MagicWatch PACS monitoring station as an applications support tool that has allowed the group to monitor network activity and individual systems performance at each node. Fast and timely recognition of the effects of single events within the PACS/RIS environment has allowed the group to proactively recognize possible performance issues and resolve problems. The PACS/operations group performs network management control, image storage management, and software distribution management from a single, central point in the enterprise. The MagicWatch station allows for the complete automation of software distribution, installation, and configuration process across all the nodes in the system. The tool has allowed for the standardization of the workstations and provides a central configuration control for the establishment and maintenance of the system standards. This report will describe the PACS management and operation prior to the implementation of the MagicWatch PACS monitoring station and will highlight the operational benefits of a centralized network and system-monitoring tool.
Common Capabilities for Trust and Security in Service Oriented Infrastructures
NASA Astrophysics Data System (ADS)
Brossard, David; Colombo, Maurizio
In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.
Economics of National Security: Unfunding Terror
2011-07-01
that it cost [al-Qa’ida] about $30 million per year to sustain its activities before 9/11, an amount raised almost entirely through donations .”27...connection between the two threats does imply that efforts to combat transnational criminal enterprises will have an ancillary dampening effect on terror...National Security Strategy 2010, (Washington, D.C.: The White House, May 2010), http://www.whitehouse.gov/ sites/ default /files/rss_viewer
Federation for a Secure Enterprise
2016-09-10
12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
Trust and Online Reputation Systems
NASA Astrophysics Data System (ADS)
Kwan, Ming; Ramachandran, Deepak
Web 2.0 technologies provide organizations with unprecedented opportunities to expand and solidify relationships with their customers, partners, and employees—while empowering firms to define entirely new business models focused on sharing information in online collaborative environments. Yet, in and of themselves, these technologies cannot ensure productive online interactions. Leading enterprises that are experimenting with social networks and online communities are already discovering this fact and along with it, the importance of establishing trust as the foundation for online collaboration and transactions. Just as today's consumers must feel secure to bank, exchange personal information and purchase products and services online; participants in Web 2.0 initiatives will only accept the higher levels of risk and exposure inherent in e-commerce and Web collaboration in an environment of trust. Indeed, only by attending to the need to cultivate online trust with customers, partners and employees will enterprises ever fully exploit the expanded business potential posed by Web 2.0. But developing online trust is no easy feat. While various preliminary attempts have occurred, no definitive model for establishing or measuring it has yet been established. To that end, nGenera has identified three, distinct dimensions of online trust: reputation (quantitative-based); relationship (qualitative-based) and process (system-based). When considered together, they form a valuable model for understanding online trust and a toolbox for cultivating it to support Web 2.0 initiatives.
Immune Inspired Security Approach for Manets: a Case Study
NASA Astrophysics Data System (ADS)
Mohamed, Yasir Abdelgadir
2011-06-01
This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, we have seen that specifying the security system in one of the communications applications that need further security approach may help to understand how effectively the system can contribute to this vital and important networks sector. Security in this type of networks is important and controversial as it plays a key role in users' eagerness or reluctance for the services provided by these networks. In this paper, the immune inspired security system is specified to secure web services in converged networks.
ERIC Educational Resources Information Center
Pease, Pamela S.; Kitchen, Lillian
The TI-IN Network is an interactive, satellite-based educational system offering a technological alternative to face-to-face classroom instruction. Developed through a cooperative venture between private enterprise and public education agencies, the TI-IN Network offers a total systems approach by providing the entire programming and hardware…
NASA Enterprise Architecture and Its Use in Transition of Research Results to Operations
NASA Astrophysics Data System (ADS)
Frisbie, T. E.; Hall, C. M.
2006-12-01
Enterprise architecture describes the design of the components of an enterprise, their relationships and how they support the objectives of that enterprise. NASA Stennis Space Center leads several projects involving enterprise architecture tools used to gather information on research assets within NASA's Earth Science Division. In the near future, enterprise architecture tools will link and display the relevant requirements, parameters, observatories, models, decision systems, and benefit/impact information relationships and map to the Federal Enterprise Architecture Reference Models. Components configured within the enterprise architecture serving the NASA Applied Sciences Program include the Earth Science Components Knowledge Base, the Systems Components database, and the Earth Science Architecture Tool. The Earth Science Components Knowledge Base systematically catalogues NASA missions, sensors, models, data products, model products, and network partners appropriate for consideration in NASA Earth Science applications projects. The Systems Components database is a centralized information warehouse of NASA's Earth Science research assets and a critical first link in the implementation of enterprise architecture. The Earth Science Architecture Tool is used to analyze potential NASA candidate systems that may be beneficial to decision-making capabilities of other Federal agencies. Use of the current configuration of NASA enterprise architecture (the Earth Science Components Knowledge Base, the Systems Components database, and the Earth Science Architecture Tool) has far exceeded its original intent and has tremendous potential for the transition of research results to operational entities.
5 CFR 5001.102 - Prohibited financial interests in for-hire transportation companies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the Interstate Commerce Act; or (ii) Any company, mutual fund or other enterprise which has an... on the most recent financial statement issued to its security holders by the company, fund or other...
5 CFR 5001.102 - Prohibited financial interests in for-hire transportation companies.
Code of Federal Regulations, 2011 CFR
2011-01-01
... the Interstate Commerce Act; or (ii) Any company, mutual fund or other enterprise which has an... on the most recent financial statement issued to its security holders by the company, fund or other...
Competitive Cyber-Insurance and Internet Security
NASA Astrophysics Data System (ADS)
Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean
This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.
Tedmanson, Deirdre; Guerin, Pauline
2011-07-01
Social enterprises are market-based activities that provide social benefits through the direct engagement of people in productive activities. Participation in social enterprise development brings psychosocial wellbeing benefits, by strengthening family networks, enhancing trust, increasing self-reliance and social esteem and promoting cultural safety. Our objective is to explore how social enterprise activities can meet community needs and foster self-sustainability while generating profits for redistribution as social investment into other ventures that aid social functioning and emotional well-being. Social entrepreneurship enhances both interdependence and independence. Concomitant mental health and social wellbeing dividends accrue overtime to communities engaged in self-determined enterprise activities. Social entrepreneurship builds social capital that supports social wellbeing. Strengths-based approaches to social entrepreneurship can assuage disempowering effects of the "welfare economy" through shifting the focus onto productive activities generated on people's own terms.
Semantic Social Network Portal for Collaborative Online Communities
ERIC Educational Resources Information Center
Neumann, Marco; O'Murchu, Ina; Breslin, John; Decker, Stefan; Hogan, Deirdre; MacDonaill, Ciaran
2005-01-01
Purpose: The motivation for this investigation is to apply social networking features to a semantic network portal, which supports the efforts in enterprise training units to up-skill the employee in the company, and facilitates the creation and reuse of knowledge in online communities. Design/methodology/approach: The paper provides an overview…
ERIC Educational Resources Information Center
Raftery, Deirdre
2015-01-01
This article examines the management of the education enterprise of teaching Sisters, with reference to their transnational networking. The article suggests that orders of women religious were the first all-female transnational networks, engaged constantly in work that was characterised by "movement, ebb and circulation". The mobility of…
The Role of Action Research in the Development of Learning Networks for Entrepreneurs
ERIC Educational Resources Information Center
Brett, Valerie; Mullally, Martina; O'Gorman, Bill; Fuller-Love, Nerys
2012-01-01
Developing sustainable learning networks for entrepreneurs is the core objective of the Sustainable Learning Networks in Ireland and Wales (SLNIW) project. One research team drawn from the Centre for Enterprise Development and Regional Economy at Waterford Institute of Technology and the School of Management and Business from Aberystwyth…
Development and Implementation of Kumamoto Technopolis Regional Database T-KIND
NASA Astrophysics Data System (ADS)
Onoue, Noriaki
T-KIND (Techno-Kumamoto Information Network for Data-Base) is a system for effectively searching information of technology, human resources and industries which are necessary to realize Kumamoto Technopolis. It is composed of coded database, image database and LAN inside technoresearch park which is the center of R & D in the Technopolis. It constructs on-line system by networking general-purposed computers, minicomputers, optical disk file systems and so on, and provides the service through public telephone line. Two databases are now available on enterprise information and human resource information. The former covers about 4,000 enterprises, and the latter does about 2,000 persons.
Towards Semantic Modelling of Business Processes for Networked Enterprises
NASA Astrophysics Data System (ADS)
Furdík, Karol; Mach, Marián; Sabol, Tomáš
The paper presents an approach to the semantic modelling and annotation of business processes and information resources, as it was designed within the FP7 ICT EU project SPIKE to support creation and maintenance of short-term business alliances and networked enterprises. A methodology for the development of the resource ontology, as a shareable knowledge model for semantic description of business processes, is proposed. Systematically collected user requirements, conceptual models implied by the selected implementation platform as well as available ontology resources and standards are employed in the ontology creation. The process of semantic annotation is described and illustrated using an example taken from a real application case.
Hybrid network defense model based on fuzzy evaluation.
Cho, Ying-Chiang; Pan, Jen-Yi
2014-01-01
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.
SEADE: Countering the Futility of Network Security
2015-10-01
guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
CORBASec Used to Secure Distributed Aerospace Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.
Analysis on the University’s Network Security Level System in the Big Data Era
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-12-01
The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.
Planning Considerations for Secure Network Protocols
1999-03-01
distribution / management ) requirements needed to support network security services are examined. The thesis concludes by identifying tactical user network requirements and suggests security issues to be considered in concert with network
Security and Privacy Preservation in Human-Involved Networks
NASA Astrophysics Data System (ADS)
Asher, Craig; Aumasson, Jean-Philippe; Phan, Raphael C.-W.
This paper discusses security within human-involved networks, with a focus on social networking services (SNS). We argue that more secure networks could be designed using semi-formal security models inspired from cryptography, as well as notions like that of ceremony, which exploits human-specific abilities and psychology to assist creating more secure protocols. We illustrate some of our ideas with the example of the SNS Facebook.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Study on the context-aware middleware for ubiquitous greenhouses using wireless sensor networks.
Hwang, Jeonghwang; Yoe, Hyun
2011-01-01
Wireless Sensor Network (WSN) technology is one of the important technologies to implement the ubiquitous society, and it could increase productivity of agricultural and livestock products, and secure transparency of distribution channels if such a WSN technology were successfully applied to the agricultural sector. Middleware, which can connect WSN hardware, applications, and enterprise systems, is required to construct ubiquitous agriculture environment combining WSN technology with agricultural sector applications, but there have been insufficient studies in the field of WSN middleware in the agricultural environment, compared to other industries. This paper proposes a context-aware middleware to efficiently process data collected from ubiquitous greenhouses by applying WSN technology and used to implement combined services through organic connectivity of data. The proposed middleware abstracts heterogeneous sensor nodes to integrate different forms of data, and provides intelligent context-aware, event service, and filtering functions to maximize operability and scalability of the middleware. To evaluate the performance of the middleware, an integrated management system for ubiquitous greenhouses was implemented by applying the proposed middleware to an existing greenhouse, and it was tested by measuring the level of load through CPU usage and the response time for users' requests when the system is working.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND FISCAL AFFAIRS Investment Management § 652.5 Definitions. For purposes of this subpart, the...) means investment securities that provide for ownership of a fractional undivided interest or collateral... States Government, including but not limited to any Government-sponsored enterprise. Liquid investments...
Final Programmatic Environment Impact Statement for Commercial Reentry Vehicles
DOT National Transportation Integrated Search
1992-05-28
To ensure that space launch services provided by private enterprises are : consistent with national security and foreign policy interests of the U.S., : and do not jeopardize public safety and safety of property, the Department of : Transportation (D...
ERIC Educational Resources Information Center
Boudet, Rene
An examination of the ways in which vocational training can be extended to small and medium-sized enterprises in the European Economic Community, this document consists of: an introduction; four parts containing multiple chapters; 10 case studies; and a bibliography. Following the introduction, which is an update of a report made in 1985, part one…
Improving access to competitive employment for service users in forensic psychiatric units
Beck, Charlotte; Wernham, Connie
2014-01-01
Employment has been proven to be an effective recovery tool and therapeutic intervention for those with severe and enduring mental health conditions. Aside from monetary reward, employment is a means of structuring time and provides a sense of worth and achievement, which enhances self-esteem and confidence. A social identity is developed through employment, encouraging social support and increasing social networks. Securing employment can bring about improved quality of life and positive change in one's social circumstances; therefore it can reduce symptoms associated with mental illness and potentially prevent re-offending, as the individual develops a sense of independence, self-efficacy, and value. Barriers to employment exist for forensic mental health service users and therefore it is imperative that employment needs are addressed at the earliest possible stage in recovery. An evaluation of employment activities across two forensic mental health units revealed a lack of appropriate employment opportunities for service users, and those roles available were not implemented in line with recommended best practice. In response to this issue several enterprises were established to offer opportunities for service users to engage in meaningful employment and develop skills that a future employer would value. Each enterprise responds to a business need within the units to ensure sustainability of services. The enterprises are essentially micro-businesses with social objectives whose surpluses are reinvested for the purpose of increasing opportunities for service users. The enterprises are underpinned by the philosophy of the Individual Placement and Support (IPS) model; empirical evidence suggests that the IPS model is the most effective intervention, based on the ‘place then train’ philosophy. The model recommends a focus upon rapid job search to achieve competitive employment for those who want to work; opportunities sourced should be consistent with individual preference and benefits counselling offered. Support should be time unlimited and integrated with mental health treatment. A person-centred and strengths-based approach is also adopted to support people to build on their strengths, establish goals, and encourage motivation. PMID:26734271
Whither the RMA: Two Perspectives on Tomorrow’s Army
1994-07-22
HENRI (ROY) ALCALA heads a consulting firm, Alcala Enterprises, which specializes in national security and foreign policy issues . He retired from the...thinking about national security was too constrained by immediate issues . Downsizing of force structure, budget reductions, Bosnia, and other issues were all...these immediate issues as signposts of the future, even though little evidence existed to support such aI :use. From many years of experience in long
Time Delay Measurements of Key Generation Process on Smart Cards
2015-03-01
random number generator is available (Chatterjee & Gupta, 2009). The ECC algorithm will grow in usage as information becomes more and more secure. Figure...Worldwide Mobile Enterprise Security Software 2012–2016 Forecast and Analysis), mobile identity and access management is expected to grow by 27.6 percent...iPad, tablets) as well as 80000 BlackBerry phones. The mobility plan itself will be deployed in three phases over 2014, with the first phase
2002-09-01
ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Egov 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING...initiatives. The federal government has 55 databases that deal with security threats, but inter- agency access depends on establishing agreements through...which that information can be shared. True cooperation also will require government -wide commitment to enterprise architecture, integrated
Intelligence-Led Risk Management for Homeland Security: A Collaborative Approach for a Common Goal
2011-12-01
phases of research into a summary analysis of the risk management policy within the homeland security enterprise. The result of the multi-goal policy ...management and policy decisions with emphasis on social aspects and efforts to support local and regional decision making, and to avoid cascading...independent variables. The second order social and economic effects of terrorism have been largely overlooked so far in accounting for the risk from
Zero Nuclear Weapons and Nuclear Security Enterprise Modernization
2011-01-01
national security strategy. For the first time since the Manhattan Project , the United States was no longer building nuclear weapons and was in fact...50 to 60 years to the Manhattan Project and are on the verge of catastrophic failure. Caustic chemicals and processes have sped up the corrosion and...day, the United States must fund the long-term modernization effort of the entire enter prise. Notes 1. Nuclear Weapon Archive, “The Manhattan
The system of technical diagnostics of the industrial safety information network
NASA Astrophysics Data System (ADS)
Repp, P. V.
2017-01-01
This research is devoted to problems of safety of the industrial information network. Basic sub-networks, ensuring reliable operation of the elements of the industrial Automatic Process Control System, were identified. The core tasks of technical diagnostics of industrial information safety were presented. The structure of the technical diagnostics system of the information safety was proposed. It includes two parts: a generator of cyber-attacks and the virtual model of the enterprise information network. The virtual model was obtained by scanning a real enterprise network. A new classification of cyber-attacks was proposed. This classification enables one to design an efficient generator of cyber-attacks sets for testing the virtual modes of the industrial information network. The numerical method of the Monte Carlo (with LPτ - sequences of Sobol), and Markov chain was considered as the design method for the cyber-attacks generation algorithm. The proposed system also includes a diagnostic analyzer, performing expert functions. As an integrative quantitative indicator of the network reliability the stability factor (Kstab) was selected. This factor is determined by the weight of sets of cyber-attacks, identifying the vulnerability of the network. The weight depends on the frequency and complexity of cyber-attacks, the degree of damage, complexity of remediation. The proposed Kstab is an effective integral quantitative measure of the information network reliability.
Computer and Network Security in Small Libraries: A Guide for Planning.
ERIC Educational Resources Information Center
Williams, Robert L.
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
NASA Astrophysics Data System (ADS)
Collmann, Jeff R.
2003-05-01
This paper justifies and explains current efforts in the Military Health System (MHS) to enhance information assurance in light of the sociological debate between "Normal Accident" (NAT) and "High Reliability" (HRT) theorists. NAT argues that complex systems such as enterprise health information systems display multiple, interdependent interactions among diverse parts that potentially manifest unfamiliar, unplanned, or unexpected sequences that operators may not perceive or immediately understand, especially during emergencies. If the system functions rapidly with few breaks in time, space or process development, the effects of single failures ramify before operators understand or gain control of the incident thus producing catastrophic accidents. HRT counters that organizations with strong leadership support, continuous training, redundant safety features and "cultures of high reliability" contain the effects of component failures even in complex, tightly coupled systems. Building highly integrated, enterprise-wide computerized health information management systems risks creating the conditions for catastrophic breaches of data security as argued by NAT. The data security regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) implicitly depend on the premises of High Reliability Theorists. Limitations in HRT thus have implications for both safe program design and compliance efforts. MHS and other health care organizations should consider both NAT and HRT when designing and deploying enterprise-wide computerized health information systems.
Evaluation System and Implementation Countermeasure of Automobile Green Maintenance
NASA Astrophysics Data System (ADS)
Zhang, Fei; Xie, Xinxin; Yan, Chaoyong
2018-01-01
Green maintenance research is in the beginning of our country, the work is being explored. Based on the existing research results at home and abroad, this paper learns and draws lessons from the experiences and lessons of foreign advanced countries and domestic advanced enterprises. In the face of the challenges brought by economic development and energy saving and emission reduction, this paper discusses the green maintenance theory and security system, And the research status of green maintenance content and system at home and abroad, through the deletion and selection of green maintenance index, through the AHP method to determine the green evaluation criteria, and the introduction of C equivalent evaluation system, the use of fuzzy synthesis Evaluation method to build a green maintenance evaluation model, and the actual validation, put forward the implementation of green maintenance feasibility programs and related security recommendations, vehicle maintenance enterprises to carry out green maintenance, improve business efficiency and reduce environmental management costs to provide theoretical basis. And to achieve effective reduction of environmental pollution, reduce maintenance costs of the target, a reasonable promotion of maintenance and environmental protection and sustainable development. Promote green maintenance from research to practice, from the laboratory to the maintenance of enterprises, from the pilot to the overall development and transformation.
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Identifying the Key Weaknesses in Network Security at Colleges.
ERIC Educational Resources Information Center
Olsen, Florence
2000-01-01
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Enterprise networks. Strategies for integrated delivery systems.
Siwicki, B
1997-02-01
More integrated delivery systems are making progress toward building computer networks that link all their care delivery sites so they can efficiently and economically coordinate care. A growing number of these systems are turning to intranets--private computer networks that use Internet-derived protocols and technologies--to move information that's essential to managing scare health care resources.
A Logically Centralized Approach for Control and Management of Large Computer Networks
ERIC Educational Resources Information Center
Iqbal, Hammad A.
2012-01-01
Management of large enterprise and Internet service provider networks is a complex, error-prone, and costly challenge. It is widely accepted that the key contributors to this complexity are the bundling of control and data forwarding in traditional routers and the use of fully distributed protocols for network control. To address these…
Space Internet Architectures and Technologies for NASA Enterprises
NASA Technical Reports Server (NTRS)
Bhasin, Kul; Hayden, Jeffrey L.
2001-01-01
NASA's future communications services will be supplied through a space communications network that mirrors the terrestrial Internet in its capabilities and flexibility. The notional requirements for future data gathering and distribution by this Space Internet have been gathered from NASA's Earth Science Enterprise (ESE), the Human Exploration and Development in Space (HEDS), and the Space Science Enterprise (SSE). This paper describes a communications infrastructure for the Space Internet, the architectures within the infrastructure, and the elements that make up the architectures. The architectures meet the requirements of the enterprises beyond 2010 with Internet 'compatible technologies and functionality. The elements of an architecture include the backbone, access, inter-spacecraft and proximity communication parts. From the architectures, technologies have been identified which have the most impact and are critical for the implementation of the architectures.
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy
NASA Astrophysics Data System (ADS)
Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan
2016-11-01
Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.
A Fast lattice-based polynomial digital signature system for m-commerce
NASA Astrophysics Data System (ADS)
Wei, Xinzhou; Leung, Lin; Anshel, Michael
2003-01-01
The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.
Hybrid Network Defense Model Based on Fuzzy Evaluation
2014-01-01
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture. PMID:24574870
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
Maturity model for enterprise interoperability
NASA Astrophysics Data System (ADS)
Guédria, Wided; Naudet, Yannick; Chen, David
2015-01-01
Historically, progress occurs when entities communicate, share information and together create something that no one individually could do alone. Moving beyond people to machines and systems, interoperability is becoming a key factor of success in all domains. In particular, interoperability has become a challenge for enterprises, to exploit market opportunities, to meet their own objectives of cooperation or simply to survive in a growing competitive world where the networked enterprise is becoming a standard. Within this context, many research works have been conducted over the past few years and enterprise interoperability has become an important area of research, ensuring the competitiveness and growth of European enterprises. Among others, enterprises have to control their interoperability strategy and enhance their ability to interoperate. This is the purpose of the interoperability assessment. Assessing interoperability maturity allows a company to know its strengths and weaknesses in terms of interoperability with its current and potential partners, and to prioritise actions for improvement. The objective of this paper is to define a maturity model for enterprise interoperability that takes into account existing maturity models while extending the coverage of the interoperability domain. The assessment methodology is also presented. Both are demonstrated with a real case study.
Social enterprises and public health improvement in England: a qualitative case study.
Garnett, Emma; Baeza, Juan; Trenholm, Susan; Gulliford, Martin; Green, Judith
2018-06-22
To explore the contribution of social enterprises to publicly commissioned public health improvement and assess the risks and benefits of their role. Qualitative case study of four south London boroughs. Documentary research; in-depth interviews with 19 key informants. This study identified 24 social enterprises that were currently commissioned to contribute to public health improvement. These organisations ranged in size, longevity, and structure. They were widely reported as flexible and able to rapidly develop services responsive to local community needs. Their work often addressed upstream health determinants. However, to capitalise on securing contracts, they had to bureaucratise and establish provider alliances, which risked losing the very characteristics that make them unique. Social enterprises bore the financial risk of innovative service developments. Emerging mixed economies of public health were fragmented, limiting commissioners' abilities to plan strategically and evaluate the impact. Social enterprises have an increasing role in providing potential solutions to intractable health improvement challenges, contributing to a broader vision around upstream action for health. However, the fragmentation and growing outsourcing of public health has risks for coherent and equitable service planning. Copyright © 2018 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
...-end repository to manage various reporting, pooling, and risk management activities associated with... records is to serve as a central back-end repository to house loan origination and servicing, security...
Privacy Impact Assessment for the Inspector General Enterprise Management System
This system collects personally identifiable information (PII), including social security numbers, date of birth, etc. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies.
Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise
2011-12-01
NEMA ), • International Association Emergency Managers (IAEM), • National Association of Chiefs of Police, International Association of...on application of normative principles to the facts and evidence accumulated by decision makers—and will show why other alternative courses of
The study and implementation of the wireless network data security model
NASA Astrophysics Data System (ADS)
Lin, Haifeng
2013-03-01
In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.
Security clustering algorithm based on reputation in hierarchical peer-to-peer network
NASA Astrophysics Data System (ADS)
Chen, Mei; Luo, Xin; Wu, Guowen; Tan, Yang; Kita, Kenji
2013-03-01
For the security problems of the hierarchical P2P network (HPN), the paper presents a security clustering algorithm based on reputation (CABR). In the algorithm, we take the reputation mechanism for ensuring the security of transaction and use cluster for managing the reputation mechanism. In order to improve security, reduce cost of network brought by management of reputation and enhance stability of cluster, we select reputation, the historical average online time, and the network bandwidth as the basic factors of the comprehensive performance of node. Simulation results showed that the proposed algorithm improved the security, reduced the network overhead, and enhanced stability of cluster.
32 CFR 2001.50 - Telecommunications automated information systems and network security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...
32 CFR 2001.50 - Telecommunications automated information systems and network security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...
32 CFR 2001.50 - Telecommunications automated information systems and network security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...
Investigation on Law and Economics Based on Complex Network and Time Series Analysis.
Yang, Jian; Qu, Zhao; Chang, Hui
2015-01-01
The research focuses on the cooperative relationship and the strategy tendency among three mutually interactive parties in financing: small enterprises, commercial banks and micro-credit companies. Complex network theory and time series analysis were applied to figure out the quantitative evidence. Moreover, this paper built up a fundamental model describing the particular interaction among them through evolutionary game. Combining the results of data analysis and current situation, it is justifiable to put forward reasonable legislative recommendations for regulations on lending activities among small enterprises, commercial banks and micro-credit companies. The approach in this research provides a framework for constructing mathematical models and applying econometrics and evolutionary game in the issue of corporation financing.
Wireless Security Within Hastily Formed Networks
2006-09-01
WLAN DEVICES (STEP ONE) ............34 1. Personal Firewalls..............................................................................34 2. Anti ...includes client devices , access points, network infrastructure, network management, and delivery of mobility services to maintain network security and...Technology Special Publication 800-48, Wireless Network Security, 802.11, Bluetooth , and Handheld Devices . Available at http://csrc.nist.gov
Web-based monitoring and management system for integrated enterprise-wide imaging networks
NASA Astrophysics Data System (ADS)
Ma, Keith; Slik, David; Lam, Alvin; Ng, Won
2003-05-01
Mass proliferation of IP networks and the maturity of standards has enabled the creation of sophisticated image distribution networks that operate over Intranets, Extranets, Communities of Interest (CoI) and even the public Internet. Unified monitoring, provisioning and management of such systems at the application and protocol levels represent a challenge. This paper presents a web based monitoring and management tool that employs established telecom standards for the creation of an open system that enables proactive management, provisioning and monitoring of image management systems at the enterprise level and across multi-site geographically distributed deployments. Utilizing established standards including ITU-T M.3100, and web technologies such as XML/XSLT, JSP/JSTL, and J2SE, the system allows for seamless device and protocol adaptation between multiple disparate devices. The goal has been to develop a unified interface that provides network topology views, multi-level customizable alerts, real-time fault detection as well as real-time and historical reporting of all monitored resources, including network connectivity, system load, DICOM transactions and storage capacities.
Chen, Yu-Gene T.
2013-04-16
A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.
Vision 2015: A Globally Networked and Integrated Intelligence Enterprise
2008-07-01
of the Intellligence Community agency members. Building such an Enterprise will require the sustained focus of hard -nosed leadership. Services... The purpose of intelligence is not solely to determine truth , but to enable decision-makers to make better choices in dealing with forces...objectivity and relevance, often summarized by the axiom that the Intelligence Community “speaks truth to power.” At times, members of the Intelli- gence
Systemic Approach of a Virtual Enterprise that Constructs Wireless Payment Mechanisms
NASA Astrophysics Data System (ADS)
Assimakopoulos, Nikitas A.; Riggas, Anastasis N.; Kotsimpos, George K.
2004-08-01
Enterprises and Organizations are realizing that there are many win-win scenarios, for their customers and business partners, using the latest technology to enact convenient and secure purchases `over the air'. Wireless Payment (W/P) is the key element of Wireless Commerce. Businesses around the world are attempting to position themselves to operate in a highly competitive global economy. A single organization is often not able to develop sufficient internal design or production capabilities to respond effectively within a short period of time. The focus of this paper will be on the development and analysis of a Virtual Enterprise Architecture for the construction of W/P Mechanisms using Systemic Methodologies. A framework for the rapid and efficient integration of the business processes of the participating companies that construct W/P Mechanisms is provided.
Correlation Research of Medical Security Management System Network Platform in Medical Practice
NASA Astrophysics Data System (ADS)
Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang
Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.
AF-TRUST, Air Force Team for Research in Ubiquitous Secure Technology
2010-07-26
Charles Sutton, J. D. Tygar, and Kai Xia. Book chapter in Jeffrey J. P. Tsai and Philip S. Yu (eds.) Machine Learning in Cyber Trust: Security, Privacy...enterprise, tactical, embedded systems and command and control levels. From these studies, commissioned by Dr . Sekar Chandersekaran of the Secretary of the...Data centers avoid IP Multicast because of a series of problems with the technology. • Dr . Multicast (the MCMD), a system that maps traditional I PMC
Usage of information safety requirements in improving tube bending process
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Kunakov, E.; Lontsikh, P. A.
2018-05-01
This article is devoted to an improvement of the technological process's analysis with the information security requirements implementation. The aim of this research is the competition increase analysis in aircraft industry enterprises due to the information technology implementation by the example of the tube bending technological process. The article analyzes tube bending kinds and current technique. In addition, a potential risks analysis in a tube bending technological process is carried out in terms of information security.
Groupthink: A Significant Threat to the Homeland Security of the United States
2014-12-01
Jin Nam Choi and Myung Un Kim, details a study that examines groupthink’s effect on 30 organizational teams faced with impending crises. The study...40sessionmgr114&hid=115. 13 Jin Nam Choi and Myung Un Kim, “The Organizational Application of Groupthink and its Limitations in Organizations,” Journal of...the past to provide a mechanism that will help identify, manage, and mitigate this psychological phenomenon in the homeland security enterprise
NASA Astrophysics Data System (ADS)
Gonzalez, Elias; Kish, Laszlo B.
2016-03-01
As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.
76 FR 11503 - National Offshore Safety Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... person representing enterprises specializing in offshore drilling. To be eligible, applicants for all... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0040] National Offshore Safety... Coast Guard seeks applications for membership on the National Offshore Safety Advisory Committee. This...
76 FR 39410 - National Offshore Safety Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... energy industry; (d) One member representing enterprises specializing in offshore drilling; and, (e) One... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0539] National Offshore Safety... Coast Guard seeks applications for membership on the National Offshore Safety Advisory Committee. This...
Streamlining the Process of Acquiring Secure Open Architecture Software Systems
2013-10-08
Microsoft.NET, Enterprise Java Beans, GNU Lesser General Public License (LGPL) libraries, and data communication protocols like the Hypertext Transfer...NetBeans development environments), customer relationship management (SugarCRM), database management systems (PostgreSQL, MySQL ), operating
2005 8th Annual Systems Engineering Conference. Volume 1, Tuesday
2005-10-27
Services NCES Discovery Services Federated Search Denotes interface Service NCCP Oktoberfest 2004 101 Task: Global Strike Mission Planning NCCP Oktoberfest...Enterprise Service Management Security Services NCES Discovery Services Federated Search Service Test, cert and accreditation needs to be focused on small
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Providing interoperability of eHealth communities through peer-to-peer networks.
Kilic, Ozgur; Dogac, Asuman; Eichelberg, Marco
2010-05-01
Providing an interoperability infrastructure for Electronic Healthcare Records (EHRs) is on the agenda of many national and regional eHealth initiatives. Two important integration profiles have been specified for this purpose, namely, the "Integrating the Healthcare Enterprise (IHE) Cross-enterprise Document Sharing (XDS)" and the "IHE Cross Community Access (XCA)." IHE XDS describes how to share EHRs in a community of healthcare enterprises and IHE XCA describes how EHRs are shared across communities. However, the current version of the IHE XCA integration profile does not address some of the important challenges of cross-community exchange environments. The first challenge is scalability. If every community that joins the network needs to connect to every other community, i.e., a pure peer-to-peer network, this solution will not scale. Furthermore, each community may use a different coding vocabulary for the same metadata attribute, in which case, the target community cannot interpret the query involving such an attribute. Yet another important challenge is that each community may (and typically will) have a different patient identifier domain. Querying for the patient identifiers in the target community using patient demographic data may create patient privacy concerns. In this paper, we address each of these challenges and show how they can be handled effectively in a superpeer-based peer-to-peer architecture.
Supporting Quality in Vocational Training through Networking. CEDEFOP Panorama.
ERIC Educational Resources Information Center
Seyfried, Erwin; Kohlmeyer, Klaus; Furth-Riedesser, Rafael
The extent to which network cooperation between the general education system, vocational training institutions, business enterprises, social partners, and political decision makers affects quality development in vocational training was examined through a literature review and synthesis of eight case studies in the following seven European…
78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
... Network Advisory Committee (HSINAC) AGENCY: Operation Coordination and Planning/Office of Chief.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...
Security of Quantum Repeater Network Operation
2016-10-03
AFRL-AFOSR-JP-TR-2016-0079 Security of Quantum Repeater Network Operation Rodney Van Meter KEIO UNIVERSITY Final Report 10/03/2016 DISTRIBUTION A...To) 29 May 2014 to 28 May 2016 4. TITLE AND SUBTITLE Security of Quantum Repeater Network Operation 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386...ABSTRACT Much of the work on quantum networks , both entangled and unentangled, has been about the uses of quantum networks to enhance end- host security
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
NASA Astrophysics Data System (ADS)
Rosen, Charles; Siegel, Edward Carl-Ludwig; Feynman, Richard; Wunderman, Irwin; Smith, Adolph; Marinov, Vesco; Goldman, Jacob; Brine, Sergey; Poge, Larry; Schmidt, Erich; Young, Frederic; Goates-Bulmer, William-Steven; Lewis-Tsurakov-Altshuler, Thomas-Valerie-Genot; Ibm/Exxon Collaboration; Google/Uw Collaboration; Microsoft/Amazon Collaboration; Oracle/Sun Collaboration; Ostp/Dod/Dia/Nsa/W.-F./Boa/Ubs/Ub Collaboration
2013-03-01
Belew[Finding Out About, Cambridge(2000)] and separately full-decade pre-Page/Brin/Google FIRST Siegel-Rosen(Machine-Intelligence/Atherton)-Feynman-Smith-Marinov(Guzik Enterprises/Exxon-Enterprises/A.-I./Santa Clara)-Wunderman(H.-P.) [IBM Conf. on Computers and Mathematics, Stanford(1986); APS Mtgs.(1980s): Palo Alto/Santa Clara/San Francisco/...(1980s) MRS Spring-Mtgs.(1980s): Palo Alto/San Jose/San Francisco/...(1980-1992) FIRST quantum-computing via Bose-Einstein quantum-statistics(BEQS) Bose-Einstein CONDENSATION (BEC) in artificial-intelligence(A-I) artificial neural-networks(A-N-N) and biological neural-networks(B-N-N) and Siegel[J. Noncrystalline-Solids 40, 453(1980); Symp. on Fractals..., MRS Fall-Mtg., Boston(1989)-5-papers; Symp. on Scaling..., (1990); Symp. on Transport in Geometric-Constraint (1990)
A methodology aimed at fostering and sustaining the development processes of an IE-based industry
NASA Astrophysics Data System (ADS)
Corallo, Angelo; Errico, Fabrizio; de Maggio, Marco; Giangreco, Enza
In the current competitive scenario, where business relationships are fundamental in building successful business models and inter/intra organizational business processes are progressively digitalized, an end-to-end methodology is required that is capable of guiding business networks through the Internetworked Enterprise (IE) paradigm: a new and innovative organizational model able to leverage Internet technologies to perform real-time coordination of intra and inter-firm activities, to create value by offering innovative and personalized products/services and reduce transaction costs. This chapter presents the TEKNE project Methodology of change that guides business networks, by means of a modular and flexible approach, towards the IE techno-organizational paradigm, taking into account the competitive environment of the network and how this environment influences its strategic, organizational and technological levels. Contingency, the business model, enterprise architecture and performance metrics are the key concepts that form the cornerstone of this methodological framework.
Enabling the MLSpOC (Multi-Level Space Operations Center) of the Future
NASA Astrophysics Data System (ADS)
Missal, D.
2012-09-01
The Intelligence Reform and Terrorism Prevention Act, passed by Congress in 2004, established the expectation that the "vast intelligence enterprise" of the United States would become more unified, coordinated, and effective. This law charged the intelligence community and government agencies to integrate foreign intelligence and domestic US intelligence components to reduce gaps in understanding threats to our national security and to improve our reaction. This intelligence strategy — designed to provide more comprehensive and accurate intelligence analysis—substantially increases requirements for secure data sharing capabilities. An information system must be Certified & Accredited (C&A) by the appropriate Accreditation Authority in accordance with each Authority's prescribed compliance requirements and governance. Cross-Domain Solutions (CDSs) can provide the ability to share data between multiple operating domains (e.g. among users on Top Secret and Secret networks). However, sharing sensitive data across security domains and networks has been impeded by both technical and cultural challenges. A viable CDS requires a tremendous investment for initial C&A and many solutions are limited with respect to the integration of an organization's applications. As a result, most of today's highly secured systems have been designed to restrict access to entire user populations rather than implement data sharing on the basis of mandatory access controls and an individual's need-to-know. Most CDSs today are based on one-way replication through data transfer guards that copy data from one network to another. This model inherently builds in additional and extensive Operations and Maintenance (O&M) costs. Oracle's National Security Group challenged its top engineers and security architects to engineer the first Cross-Domain database providing a practical and robust solution to the Cross-Domain security problem. The result is the MLSpOC, which is deployed, fielded, and accredited today at multiple sites both CONUS and OCONUS. It is designed to assist information systems developers achieve DCID 6/3 Protection Level 4 or 5 (PL4 or PL5) or DoD SABI C&A for SECRET-to-UNCLASSIFIED systems (PL3). The product is on the DoD/DNI Unified Cross-domain Management Office's (UCDMO) Baseline of accredited solutions, and is the only solution on the Baseline which the Government considers to be an "All-in-One" approach to the Cross-domain Security challenge. Our solution is also the only PL-4 Cloud in existence and that is deployed and operational in the entire world today (at DIA). The Space marketplace is a very unique cross-domain challenge, as a need exists for Unclassified SSA Data Sharing at a deeper and more fundamental level than anywhere else in the IC or DoD. For instance, certain Agencies and/or Programs have a requirement to share information with Partner Nations that are not considered to be "friendly" (e.g. China). Our Solution is the ONLY solution in the world today that's achieved C&A, and that is uniquely positioned to enable the Multi-level Space Operations Center (MLSpOC) of the Future.
The architecture of enterprise hospital information system.
Lu, Xudong; Duan, Huilong; Li, Haomin; Zhao, Chenhui; An, Jiye
2005-01-01
Because of the complexity of the hospital environment, there exist a lot of medical information systems from different vendors with incompatible structures. In order to establish an enterprise hospital information system, the integration among these heterogeneous systems must be considered. Complete integration should cover three aspects: data integration, function integration and workflow integration. However most of the previous design of architecture did not accomplish such a complete integration. This article offers an architecture design of the enterprise hospital information system based on the concept of digital neural network system in hospital. It covers all three aspects of integration, and eventually achieves the target of one virtual data center with Enterprise Viewer for users of different roles. The initial implementation of the architecture in the 5-year Digital Hospital Project in Huzhou Central hospital of Zhejiang Province is also described.
77 FR 74226 - Excepted Service
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-13
..., network and systems engineering, enterprise architecture, intelligence analysis, investigation... Affairs. Bureau of Economic Staff Assistant.... DS120122 10/11/2012 and Business Affairs. Bureau of...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 3 2011-10-01 2011-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 3 2010-10-01 2010-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2013-10-01 2013-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.5111 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Proprietary Network Information. § 64.5111 Notification of customer proprietary network information security... 47 Telecommunication 3 2013-10-01 2013-10-01 false Notification of customer proprietary network information security breaches. 64.5111 Section 64.5111 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.5111 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Proprietary Network Information. § 64.5111 Notification of customer proprietary network information security... 47 Telecommunication 3 2014-10-01 2014-10-01 false Notification of customer proprietary network information security breaches. 64.5111 Section 64.5111 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2014-10-01 2014-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2012-10-01 2012-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
A feedback-based secure path approach for wireless sensor network data collection.
Mao, Yuxin; Wei, Guiyi
2010-01-01
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
Kraemer, Sara; Carayon, Pascale
2007-03-01
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.
2010-09-01
IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER...United States. AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER PROCESS...USAF September 2010 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND
Field test of quantum key distribution in the Tokyo QKD Network.
Sasaki, M; Fujiwara, M; Ishizuka, H; Klaus, W; Wakui, K; Takeoka, M; Miki, S; Yamashita, T; Wang, Z; Tanaka, A; Yoshino, K; Nambu, Y; Takahashi, S; Tajima, A; Tomita, A; Domeki, T; Hasegawa, T; Sakai, Y; Kobayashi, H; Asai, T; Shimizu, K; Tokura, T; Tsurumaru, T; Matsui, M; Honjo, T; Tamaki, K; Takesue, H; Tokura, Y; Dynes, J F; Dixon, A R; Sharpe, A W; Yuan, Z L; Shields, A J; Uchikoga, S; Legré, M; Robyr, S; Trinkler, P; Monat, L; Page, J-B; Ribordy, G; Poppe, A; Allacher, A; Maurhart, O; Länger, T; Peev, M; Zeilinger, A
2011-05-23
A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to demonstrate the world-first secure TV conferencing over a distance of 45km. The network includes a commercial QKD product for long-term stable operation, and application interface to secure mobile phones. Detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and... classified national security information (classified information) on computer networks, it is hereby ordered as follows: Section 1. Policy. Our Nation's security requires classified information to be shared...
2007-03-01
Intelligence AIS Artificial Immune System ANN Artificial Neural Networks API Application Programming Interface BFS Breadth-First Search BIS Biological...problem domain is too large for only one algorithm’s application . It ranges from network - based sniffer systems, responsible for Enterprise-wide coverage...options to network administrators in choosing detectors to employ in future ID applications . Objectives Our hypothesis validity is based on a set
On the topological structure of multinationals network
NASA Astrophysics Data System (ADS)
Joyez, Charlie
2017-05-01
This paper uses a weighted network analysis to examine the structure of multinationals' implantation countries network. Based on French firm-level dataset of multinational enterprises (MNEs) the network analysis provides information on each country position in the network and in internationalization strategies of French MNEs through connectivity preferences among the nodes. The paper also details network-wide features and their recent evolution toward a more decentralized structure. While much has been said on international trade network, this paper shows that multinational firms' studies would also benefit from network analysis, notably by investigating the sensitivity of the network construction to firm heterogeneity.
ERIC Educational Resources Information Center
Jongeward, Carolyn
2001-01-01
The crafts sector is a significant arena of rural nonfarm employment in Thailand. A handicrafts network focused on women's development helps rural women weavers not only with enterprise development and marketing but also environmental and health issues for appropriate and sustainable development. (SK)
Knowledge Sharing via Social Networking Platforms in Organizations
ERIC Educational Resources Information Center
Kettles, Degan
2012-01-01
Knowledge Management Systems have been actively promoted for decades within organizations but have frequently failed to be used. Recently, deployments of enterprise social networking platforms used for knowledge management have become commonplace. These platforms help harness the knowledge of workers by serving as repositories of knowledge as well…
77 FR 6156 - Rand Capital Corporation, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
... venture capital investments in small, early-stage and developing enterprises. Rand's principal objective... Capital Corporation, et al.; Notice of Application February 1, 2012. AGENCY: Securities and Exchange... Act'') granting an exemption from section 13(a) of the Exchange Act. Applicants: Rand Capital...
Measuring Information Security: Guidelines to Build Metrics
NASA Astrophysics Data System (ADS)
von Faber, Eberhard
Measuring information security is a genuine interest of security managers. With metrics they can develop their security organization's visibility and standing within the enterprise or public authority as a whole. Organizations using information technology need to use security metrics. Despite the clear demands and advantages, security metrics are often poorly developed or ineffective parameters are collected and analysed. This paper describes best practices for the development of security metrics. First attention is drawn to motivation showing both requirements and benefits. The main body of this paper lists things which need to be observed (characteristic of metrics), things which can be measured (how measurements can be conducted) and steps for the development and implementation of metrics (procedures and planning). Analysis and communication is also key when using security metrics. Examples are also given in order to develop a better understanding. The author wants to resume, continue and develop the discussion about a topic which is or increasingly will be a critical factor of success for any security managers in larger organizations.
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas
2007-09-01
Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd
NNSA Administrator Tom D'Agostino's speech at the 2009 ISM Conference
Thomas D'Agostino
2017-12-09
National Nuclear Security Administration Administrator Thomas DAgostino addressed the 2009 Department of Energy Integrated Safety Management (ISM) Conference in Knoxville, Tenn., on Wednesday, Aug. 26. In his remarks, Administrator DAgostino highlighted the NNSAs track record of developing innovative approaches to workplace safety. And, while he noted the improvements in NNSAs safety record over the years, the Administrator highlighted the need to ensure that workers across the nuclear security enterprise never become complacent in their approach to safety.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adamson, Ryan M.
Password management solutions exist, but few are designed for enterprise systems administrators sharing oncall rotations. Due to the Multi-Factor Level of Assurance 4 effort, DOE is now distributing PIV cards with cryptographically signed certificate and private key pairs to administrators and other security-significant users. We utilize this public key infrastructure (PKI) to encrypt passwords for other recipients in a secure way. This is cross platform (works on OSX and Linux systems), and has already been adopted internally by the NCCS systems administration staff to replace their old password book system.
Evaluation of a Cyber Security System for Hospital Network.
Faysel, Mohammad A
2015-01-01
Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.
Investigation on Law and Economics Based on Complex Network and Time Series Analysis
Yang, Jian; Qu, Zhao; Chang, Hui
2015-01-01
The research focuses on the cooperative relationship and the strategy tendency among three mutually interactive parties in financing: small enterprises, commercial banks and micro-credit companies. Complex network theory and time series analysis were applied to figure out the quantitative evidence. Moreover, this paper built up a fundamental model describing the particular interaction among them through evolutionary game. Combining the results of data analysis and current situation, it is justifiable to put forward reasonable legislative recommendations for regulations on lending activities among small enterprises, commercial banks and micro-credit companies. The approach in this research provides a framework for constructing mathematical models and applying econometrics and evolutionary game in the issue of corporation financing. PMID:26076460
Code of Federal Regulations, 2012 CFR
2012-01-01
... Reforms To Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of... October 7, 2011 EO 13587 Structural Reforms To Improve the Security of Classified Networks and the... networks, it is hereby ordered as follows: Section 1. Policy. Our Nation's security requires classified...
Understand the Big Picture So You Can Plan for Network Security
ERIC Educational Resources Information Center
Cervone, Frank
2005-01-01
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations
2011-03-01
leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements...Detection with an Autonomous Micro UAV Mesh Network . In the near future police departments, fire brigades and other homeland security ...UAV-based sensor networks with respect to existing constraints and user requirements. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION
Ubiquitous virtual private network: a solution for WSN seamless integration.
Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos
2014-01-06
Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network.
Marketing Plan for the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubatormore » program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.« less
How Academies use science to enhance global security and well-being.
NASA Astrophysics Data System (ADS)
Boright, John
2017-01-01
Science academies were originally created to facilitate science communication and later to recognize excellence. But in the last 20 years some 150 academies of science, engineering,and medicine around the world have united to cooperate in contributing to human welfare, by: 1. Providing evidence-based inputs to national, regional, and global policies addressing human needs, and 2. Conducting cooperative programs to increase the capacity of academies to provide such advice, and to better connect academies to publics and to policy makers. Examples: At the global level, 112 academies of science produce brief common statements on major global issues. They have also created an organization to provide in-depth reports on major issues such as a transition to sustainable energy systems, boosting agricultural productivity in Africa, and a guide to responsible conduct in the global research enterprise. Regional networks of those academies, in Africa, the Americas, Asia, and Europe conduct program on topics such as water, energy, engagement of women in science, and science education. They also help and mentor new academies.
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
7 CFR 2.98 - Director, Management Services.
Code of Federal Regulations, 2011 CFR
2011-01-01
... management services; information technology services related to end user office automation, desktop computers, enterprise networking support, handheld devices and voice telecommunications; with authority to take actions...
7 CFR 2.98 - Director, Management Services.
Code of Federal Regulations, 2013 CFR
2013-01-01
... management services; information technology services related to end user office automation, desktop computers, enterprise networking support, handheld devices and voice telecommunications; with authority to take actions...
7 CFR 2.98 - Director, Management Services.
Code of Federal Regulations, 2012 CFR
2012-01-01
... management services; information technology services related to end user office automation, desktop computers, enterprise networking support, handheld devices and voice telecommunications; with authority to take actions...
The research of network database security technology based on web service
NASA Astrophysics Data System (ADS)
Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin
2013-03-01
Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.
Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Huang, Ming-Qi; Zhang, Wei-Jun; Chen, Si-Jing; Zhang, Lu; You, Li-Xing; Wang, Zhen; Liu, Yang; Lu, Chao-Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Chen, Teng-Yun; Pan, Jian-Wei
2016-01-01
Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-10
... Corporation, Containerboard Mill, Including On-Site Leased Workers From KMW Enterprises and General Security... Assistance on May 6, 2010, applicable to workers of Smurfit-Stone Container Corporation, Containerboard Mill... Ontonagon, Michigan location of Smurfit-Stone Container Corporation, Containerboard Mill, Ontonagon...
Defense in Depth: Foundation for Secure and Resilient IT Enterprises
2006-09-01
Quantifying risk means understanding the possibility of the risk existing or coming to fruition. Here the home user attempts to measure the...Management Process of assessing and quantifying risk and establishing an acceptable level of risk for the organization Risk can be mitigated, but
12 CFR 1731.3 - Unsafe and unsound conduct.
Code of Federal Regulations, 2010 CFR
2010-01-01
... DEVELOPMENT SAFETY AND SOUNDNESS MORTGAGE FRAUD REPORTING § 1731.3 Unsafe and unsound conduct. An Enterprise may not require the repurchase of or may not decline to purchase a mortgage, mortgage backed security, or similar financial instrument because of possible mortgage fraud without promptly reporting to the...
12 CFR 1750.4 - Minimum capital requirement computation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... amounts: (1) 2.50 percent times the aggregate on-balance sheet assets of the Enterprise; (2) 0.45 percent times the unpaid principal balance of mortgage-backed securities and substantially equivalent... current market value of posted qualifying collateral, computed in accordance with appendix A to this...
Helix Project Testbed - Towards the Self-Regenerative Incorruptible Enterprise
2011-09-14
hardware implementation with a microkernel in a way that allows information flow properties of the entire construction to be statically verified all the way...secure architectural skeleton. This skeleton couples a critical slice of the low level hardware implementation with a microkernel in a way that
77 FR 26815 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-07
... submitted to the Office of Management and Budget (OMB) for review, as required by the Paperwork Reduction..., non-profit institutions, businesses, or other for-profit. Small Businesses or Organizations Affected... that of TVA's salary policy employees. Michael T. Tallent, Director, Enterprise Information Security...
Security of Quantum Repeater Network Operation
2016-10-03
readily in quantum networks than in classical networks. Our presentation at the SENT workshop attracted the attention of computer and network researchers...AFRL-AFOSR-JP-TR-2016-0079 Security of Quantum Repeater Network Operation Rodney Van Meter KEIO UNIVERSITY Final Report 10/03/2016 DISTRIBUTION A...To) 29 May 2014 to 28 May 2016 4. TITLE AND SUBTITLE Security of Quantum Repeater Network Operation 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386
Information-based management mode based on value network analysis for livestock enterprises
NASA Astrophysics Data System (ADS)
Liu, Haoqi; Lee, Changhoon; Han, Mingming; Su, Zhongbin; Padigala, Varshinee Anu; Shen, Weizheng
2018-01-01
With the development of computer and IT technologies, enterprise management has gradually become information-based management. Moreover, due to poor technical competence and non-uniform management, most breeding enterprises show a lack of organisation in data collection and management. In addition, low levels of efficiency result in increasing production costs. This paper adopts 'struts2' in order to construct an information-based management system for standardised and normalised management within the process of production in beef cattle breeding enterprises. We present a radio-frequency identification system by studying multiple-tag anti-collision via a dynamic grouping ALOHA algorithm. This algorithm is based on the existing ALOHA algorithm and uses an improved packet dynamic of this algorithm, which is characterised by a high-throughput rate. This new algorithm can reach a throughput 42% higher than that of the general ALOHA algorithm. With a change in the number of tags, the system throughput is relatively stable.
A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection
Mao, Yuxin; Wei, Guiyi
2010-01-01
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose. PMID:22163424
Network Science Center Research Team’s Visit to Addis Ababa, Ethiopia
2012-08-01
www.netscience.usma.edu 845.938.0804 enterprise that supports the German Government in achieving its objectives in the field of international cooperation for...U.S. Government . 14. ABSTRACT A Network Science Center research team demonstrated a network analysis “tool kit” to the Political and Economic...by China State Construction Engineering 3 | P a g e Network Science Center, West Point www.netscience.usma.edu 845.938.0804 Corporation as a
Personnel Data Analysis and Retrieval of Phase 1 Move To LC-39 Area
NASA Technical Reports Server (NTRS)
Davis, Derrick D.
2013-01-01
As a technology major from Jackson State University (JSU) I was called in as a summer intern at Kennedy Space Center (KSC) to work in the NASA Engineering, Control and Data Systems (NE-C) Division supporting the Spaceport Command and Control System (SCCS) at the Space Station Processing Facility (SSPF). I was given a two-part project; the first consisted of lending support relocating SCCS Computer Equipment and Project Personnel to the Launch Control Center (LCC). This task involved me using a Microsoft Office data processing tool to assist with the analysis and information management of logistics worth millions of dollars. With the assistance of two other interns, I was responsible for collecting data on equipment used, on a daily basis, by over 200 KSC employees. The many network servers, enterprise switches, desktop computers, and fiber optics had to be handled in an equally prompt and precise manner in order to ensure a minimal amount of equipment down time; which is critical in ensuring a properly secured networking environment. The second part of my project was to assist KSC in developing a more cost effective way of maintaining and taking full advantage of the functionality of some new kiosk units. Since KSC currently has no expert on the servicing and maintenance of the units, I, as a computer technology major, was given the opportunity to assess the hardware and software of the machines. The goal was to learn to establish a secure and remote environment for the kiosks; a goal highly valuing convenience by preserving valuable man-hours saved by not having to travel to each individual kiosk location. In addition, I was to leave a clear and precise plan for future users and administrators of the devices to follow.
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-12-17
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-01-01
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
NASA Astrophysics Data System (ADS)
Naik, R. Lalu; Reddy, P. Chenna
2015-12-01
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.
Cyber Foraging for Improving Survivability of Mobile Systems
2016-02-10
environments—such as dynamic context, limited computing resources, disconnected- intermittent - limited (DIL) network connectivity, and high levels of stress...environments, such as dynamic context, limited computing resources, disconnected- intermittent -limited (DIL) network connectivity, and high levels of...Table 1: Mapping of Cloudlet Features to Survivability Requirements Threats Intermittent Cloudlet- Enterprise Connectivity Mobility Limited
Project Leadership Lived Experiences with Web-Based Social Networking: A Phenomenological Study
ERIC Educational Resources Information Center
Scroggins, Charles W.
2010-01-01
This study explores the lived experiences of project leaders adopting and using Web-2.0 social networking collaboration applications for their project leadership activities. The experiences of 20 project leaders in a Fortune 500 aerospace and defense enterprise in the northeastern United States of America were explored using a qualitative…
2011-03-01
million. To bridge the time frame between the end of the NMCI contract and the full transition to NGEN, DON awarded a $3.7 billion continuity of...leasehold improvements; and moveable infrastructure associated with local network operations. End-User Hardware December 2011 Provide end-user
ERIC Educational Resources Information Center
Mills, Nicole
2011-01-01
Scholars praise social networking tools for their ability to engage and motivate iGeneration students in meaningful communicative practice, content exchange, and collaboration (Greenhow, Robelia, & Hughes, 2009; Ziegler, 2007). To gain further insight about the nature of student participation, knowledge acquisition, and relationship development…
The research and application of Ethernet over RPR technology
NASA Astrophysics Data System (ADS)
Feng, Xiancheng; Yun, Xiang
2008-11-01
With service competitions of carriers aggravating and client's higher service experience requirement, it urges the MAN technology develops forward. When the Core Layer and Distribution Layer technology are mature, all kinds of reliability technologies of MAN access Layer are proposed. EoRPR is one of reliability technologies for MAN access network service protection. This paper elaborates Ethernet over RPR technology's many advantages through analyzing basic principle, address learning and key technologies of Ethernet over RPR. EpRPR has quicker replacing speed, plug and play, stronger QoS ability, convenient service deployment, band fairly sharing, and so on. At the same time the paper proposed solution of Ethernet over RPR in MAN, NGN network and enterprise Private network. So, among many technologies of MAN access network, EoRPR technology has higher reliability and manageable and highly effectiveness and lower costive of Ethernet. It is not only suitable for enterprise interconnection, BTV and NGN access services and so on, but also can meet the requirement of carriers' reducing CAPEX and OPEX's and increase the rate of investment.
Lack of security of networked medical equipment in radiology.
Moses, Vinu; Korah, Ipeson
2015-02-01
OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.
Expanding the spectrum: 20 years of advances in MMW imagery
NASA Astrophysics Data System (ADS)
Martin, Christopher A.; Lovberg, John A.; Kolinko, Valdimir G.
2017-05-01
Millimeter-wave imaging has expanded from the single-pixel swept imagers developed in the 1960s to large field-ofview real-time systems in use today. Trex Enterprises has been developing millimeter-wave imagers since 1991 for aviation and security applications, as well as millimeter-wave communications devices. As MMIC device development was stretching into the MMW band in the 1990s, Trex developed novel imaging architectures to create 2-D staring systems with large pixel counts and no moving parts while using a minimal number of devices. Trex also contributed to the device development in amplifiers, switches, and detectors to enable the next generation of passive MMW imaging systems. The architectures and devices developed continue to be employed in security imagers, radar, and radios produced by Trex. This paper reviews the development of the initial real-time MMW imagers and associated devices by Trex Enterprises from the 1990s through the 2000s. The devices include W-band MMIC amplifiers, switches, and detector didoes, and MMW circuit boards and optical processors. The imaging systems discussed include two different real-time passive MMW imagers flown on helicopters and a MMW radar system, as well as implementation of the devices and architectures in simpler stand-off and gateway security imagers.
Policy revision in health enterprise information security: P3WG final report
NASA Astrophysics Data System (ADS)
Sostrom, Kristen; Collmann, Jeff R.
2003-05-01
Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.
NASA Technical Reports Server (NTRS)
Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy
2015-01-01
Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.
Extending SQL to Support Privacy Policies
NASA Astrophysics Data System (ADS)
Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken
Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.
Enterprise-scale image distribution with a Web PACS.
Gropper, A; Doyle, S; Dreyer, K
1998-08-01
The integration of images with existing and new health care information systems poses a number of challenges in a multi-facility network: image distribution to clinicians; making DICOM image headers consistent across information systems; and integration of teleradiology into PACS. A novel, Web-based enterprise PACS architecture introduced at Massachusetts General Hospital provides a solution. Four AMICAS Web/Intranet Image Servers were installed as the default DICOM destination of 10 digital modalities. A fifth AMICAS receives teleradiology studies via the Internet. Each AMICAS includes: a Java-based interface to the IDXrad radiology information system (RIS), a DICOM autorouter to tape-library archives and to the Agfa PACS, a wavelet image compressor/decompressor that preserves compatibility with DICOM workstations, a Web server to distribute images throughout the enterprise, and an extensible interface which permits links between other HIS and AMICAS. Using wavelet compression and Internet standards as its native formats, AMICAS creates a bridge to the DICOM networks of remote imaging centers via the Internet. This teleradiology capability is integrated into the DICOM network and the PACS thereby eliminating the need for special teleradiology workstations. AMICAS has been installed at MGH since March of 1997. During that time, it has been a reliable component of the evolving digital image distribution system. As a result, the recently renovated neurosurgical ICU will be filmless and use only AMICAS workstations for mission-critical patient care.
Inter-firm Networks, Organizational Learning and Knowledge Updating: An Empirical Study
NASA Astrophysics Data System (ADS)
Zhang, Su-rong; Wang, Wen-ping
In the era of knowledge-based economy which information technology develops rapidly, the rate of knowledge updating has become a critical factor for enterprises to gaining competitive advantage .We build an interactional theoretical model among inter-firm networks, organizational learning and knowledge updating thereby and demonstrate it with empirical study at last. The result shows that inter-firm networks and organizational learning is the source of knowledge updating.
Digital watermarking for secure and adaptive teleconferencing
NASA Astrophysics Data System (ADS)
Vorbrueggen, Jan C.; Thorwirth, Niels
2002-04-01
The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.
NASA Astrophysics Data System (ADS)
Zhang, Hong
2017-06-01
In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
NASA Astrophysics Data System (ADS)
Hassan, Ahmed A.; Bahgat, Waleed M.
2010-01-01
Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.
Survey of methods for secure connection to the internet
NASA Astrophysics Data System (ADS)
Matsui, Shouichi
1994-04-01
This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.
The Career Choice of Business Graduates: SMEs or MNCs?
ERIC Educational Resources Information Center
Moy, Jane W.; Lee, Sze M.
2002-01-01
Business undergraduates' (n=116) ratings of job attributes were overall less favorable for small/medium-sized enterprises (SMEs) than multinational corporations. SME employers' (n=30) perceptions of the attractiveness of these attributes were very different. Comparison of recruitment packages indicated that job security and long-term career…
77 FR 47652 - Use of Eminent Domain To Restructure Performing Loans
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-09
... FHFA may be made public. Dated: August 6, 2012. Richard Hornsby, Chief Operating Officer, Federal... Banks accept collateral that consists of mortgages of member financial firms pledged in exchange for... existing financial contracts and the alteration of the value of Enterprise or Bank securities holdings. In...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-15
... screen activity in the National Emergency Management Information System for both call-related customer... desktop screen as they perform work in National Emergency Management Information System (NEMIS); (3) Avaya...), Enterprise Performance Information Management Section, Federal Emergency Management Agency, Texas National...
An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments
ERIC Educational Resources Information Center
Zhang, Yue
2010-01-01
Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…
12 CFR 1750.4 - Minimum capital requirement computation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... amounts: (1) 2.50 percent times the aggregate on-balance sheet assets of the Enterprise; (2) 0.45 percent times the unpaid principal balance of mortgage-backed securities and substantially equivalent... last day of the quarter just ended (or the date for which the minimum capital report is filed, if...
Rep. Meeks, Gregory W. [D-NY-6
2012-01-18
House - 02/09/2012 Referred to the Subcommittee on Capital Markets and Government Sponsored Enterprises. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-27
... FURTHER INFORMATION CONTACT: Denise McLamb, Enterprise Records Service (005R1B), Department of Veterans... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0673] Agency Information Collection (One-VA..., Security, and Preparedness, Department of Veterans Affairs, will submit the collection of information...
78 FR 73915 - Notice of Request for Extension of Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
..., Enterprise Information Security & Policy. [FR Doc. 2013-29218 Filed 12-6-13; 8:45 am] BILLING CODE 8120-08-P ... TENNESSEE VALLEY AUTHORITY Notice of Request for Extension of Currently Approved Information... Currently Approved Information Collection. SUMMARY: The information collection described below will be...
24 CFR 970.19 - Disposition of property; use of proceeds.
Code of Federal Regulations, 2010 CFR
2010-04-01
... fair market value before the property is advertised for bid, the PHA shall have one independent... advertised for bid, HUD may accept a reasonable valuation of the property. (e) A PHA shall use net proceeds... housing; or (ii) Leveraging amounts for securing commercial enterprises, on-site in public housing...
Optimizing Institutional Approaches to Enable Research
ERIC Educational Resources Information Center
Grieb, Teri; Horon, Jeffrey R.; Wong, Cassandra; Durkin, Jessica; Kunkel, Steven L.
2014-01-01
Challenges that face the academic research enterprise are numerous. These concerns include, but are not limited to: declines in extramural funding for investigatorinitiated research, an aging faculty workforce (the average age of securing a faculty's first R01 is over 42), insufficient funds to support faculty laboratories, and limited access to…
7 CFR 4290.610 - Required certifications for Loans and Investments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... to a Rural Business Concern or Smaller Enterprise, a certification by the Portfolio Concern stating... by the Portfolio Concern certifying that the concern is a Small Business Concern. For securities... is a Small Business Concern. (c) A certification by the Portfolio Concern that it will not...
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
Network security system for health and medical information using smart IC card
NASA Astrophysics Data System (ADS)
Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki
1998-07-01
A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.
Experimental realization of an entanglement access network and secure multi-party computation
NASA Astrophysics Data System (ADS)
Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.
2016-07-01
To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.
Experimental realization of an entanglement access network and secure multi-party computation
NASA Astrophysics Data System (ADS)
Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; CenterQuantum Information in Tsinghua University Team
2017-04-01
To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.