Changes to Quantum Cryptography
NASA Astrophysics Data System (ADS)
Sakai, Yasuyuki; Tanaka, Hidema
Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the “unconditionally” secure infrastructure. We also have many cryptographic tools that are based on “modern cryptography” at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.
Advanced Distribution Management Systems | Grid Modernization | NREL
Advanced Distribution Management Systems Advanced Distribution Management Systems Electric utilities are investing in updated grid technologies such as advanced distribution management systems to management testbed for cyber security in power systems. The "advanced" elements of advanced
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman
2015-10-30
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman
2015-01-01
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280
Network Security Validation Using Game Theory
NASA Astrophysics Data System (ADS)
Papadopoulou, Vicky; Gregoriades, Andreas
Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.
Key Reconciliation for High Performance Quantum Key Distribution
Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente
2013-01-01
Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440
Initiative in Soviet Air Force Tactics and Decision Making.
1986-06-01
34 [Ref. 7: p. 1211 [Ref. 8: p.197] The issue is do modern Soviet Air Force command style and tactics allow for the freidom of actions or initiative...Approved for public release; distribution is unlimited. ;:.,,. ,,- .,, ... ., , V SECURITY CLASSIFICATION OF THIS PACE "" ? /"/’ 22 - REPORT DOCUMENTATION...REPORT 2b. DECLASSiFICATIONiDOWNGRAOING SCHEDULE Approved for public release; distribution is unlimited. 4 PERFORMING ORGANIZATION REPORT NUMBER(S) S
Blockchain: A Path to Grid Modernization and Cyber Resiliency
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil G.
Blockchain may help solve several complex problems related to integrity and trustworthiness of rapid, distributed, complex energy transactions and data exchanges. In a move towards resilience, blockchain commoditizes trust and enables automated smart contracts to support auditable multiparty transactions based on predefined rules between distributed energy providers and customers. Blockchain based smart contracts also help remove the need to interact with third-parties, facilitating the adoption and monetization of distributed energy transactions and exchanges, both energy flows as well as financial transactions. This may help reduce transactive energy costs and increase the security and sustainability of distributed energy resource (DER) integration,more » helping to remove barriers to a more decentralized and resilient power grid. This paper explores the application of blockchain and smart contracts to improve smart grid cyber resiliency and secure transactive energy applications.« less
A PKI Approach for Deploying Modern Secure Distributed E-Learning and M-Learning Environments
ERIC Educational Resources Information Center
Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos
2007-01-01
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…
Strategy for the Long Haul: An Army at the Crossroads
2008-01-01
SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12 . DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution...modernized, and postured to meet existing and emerging challenges to US Security. air and SPaCe forCeS. Explores how Air and Space Forces might best be...capabilities that could threaten the United States’ access to the “global com- mons” of space , cyberspace, the air, the seas and the undersea, and possibly
Modernization of B-2 Data, Video, and Control Systems Infrastructure
NASA Technical Reports Server (NTRS)
Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.
2012-01-01
The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA s third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.
Modernization of B-2 Data, Video, and Control Systems Infrastructure
NASA Technical Reports Server (NTRS)
Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.
2012-01-01
The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA's third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.
1984-06-01
carrier pipe is usually insulated with preformed calcium silicate or mineral wool insulation. The preformed insula- tion is secured with stainless steel...glass or mineral wool insula- tion. Each tile is installed in this manner. Repair is difficult, but can be done by local workers with readily available...corrosion S Site I and return lines in of condensate line ( mineral wool insulation). 2. Ft. Campbell, 12 Tile system B No insulation was installed on
NASA Astrophysics Data System (ADS)
Bodin, P.; Olin, S.; Pugh, T. A. M.; Arneth, A.
2014-12-01
Food security can be defined as stable access to food of good nutritional quality. In Sub Saharan Africa access to food is strongly linked to local food production and the capacity to generate enough calories to sustain the local population. Therefore it is important in these regions to generate not only sufficiently high yields but also to reduce interannual variability in food production. Traditionally, climate impact simulation studies have focused on factors that underlie maximum productivity ignoring the variability in yield. By using Modern Portfolio Theory, a method stemming from economics, we here calculate optimum current and future crop selection that maintain current yield while minimizing variance, vs. maintaining variance while maximizing yield. Based on simulated yield using the LPJ-GUESS dynamic vegetation model, the results show that current cropland distribution for many crops is close to these optimum distributions. Even so, the optimizations displayed substantial potential to either increase food production and/or to decrease its variance regionally. Our approach can also be seen as a method to create future scenarios for the sown areas of crops in regions where local food production is important for food security.
Lay, Chee Leng; Koh, Charlynn Sher Lin; Wang, Jing; Lee, Yih Hong; Jiang, Ruibin; Yang, Yijie; Yang, Zhe; Phang, In Yee; Ling, Xing Yi
2018-01-03
The application of aluminum (Al)-based nanostructures for visible-range plasmonics, especially for surface-enhanced Raman scattering (SERS), currently suffers from inconsistent local electromagnetic field distributions and/or inhomogeneous distribution of probe molecules. Herein, we lithographically fabricate structurally uniform Al nanostructures which enable homogeneous adsorption of various probe molecules. Individual Al nanostructures exhibit strong local electromagnetic field enhancements, in turn leading to intense SERS activity. The average SERS enhancement factor (EF) for individual nanostructures exceeds 10 4 for non-resonant probe molecules in the visible spectrum. These Al nanostructures also retain more than 70% of their original SERS intensities after one-month storage, displaying superb stability under ambient conditions. We further achieve tunable polarization-dependent SERS responses using anisotropic Al nanostructures, facilitating the design of sophisticated SERS-based security labels. Our micron-sized security label comprises two-tier security features, including a machine-readable hybrid quick-response (QR) code overlaid with a set of ciphertexts. Our work demonstrates the versatility of Al-based structures in low-cost modern chemical nano-analytics and forgery protection.
Measurement-device-independent quantum digital signatures
NASA Astrophysics Data System (ADS)
Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika
2016-08-01
Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.
Security Issues on the Internet.
ERIC Educational Resources Information Center
Bar-Ilan, Judit
1996-01-01
Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)
Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application
Zhang, Ping; Li, Wenjun; Sun, Hua
2016-01-01
Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy. PMID:27551747
Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application.
Zhang, Ping; Li, Wenjun; Sun, Hua
2016-01-01
Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy.
78 FR 67956 - Rates for Interstate Inmate Calling Services
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-13
... facility employees. Our Order ensures that security features that are part of modern ICS continue to be...]iven modern-day technology, the costs for providing secure phone and video services to correctional...
Securing Secrets and Managing Trust in Modern Computing Applications
ERIC Educational Resources Information Center
Sayler, Andy
2016-01-01
The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
Quantum key distribution session with 16-dimensional photonic states.
Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G
2013-01-01
The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.
Quantum key distribution session with 16-dimensional photonic states
NASA Astrophysics Data System (ADS)
Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.
2013-07-01
The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.
Quantum key distribution session with 16-dimensional photonic states
Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.
2013-01-01
The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033
[No exchange of information without technology : modern infrastructure in radiology].
Hupperts, H; Hermann, K-G A
2014-01-01
Modern radiology cannot accomplish the daily numbers of examinations without supportive technology. Even though technology seems to be becoming increasingly more indispensable, business continuity should be ensured at any time and if necessary even with a limited technical infrastructure by business continuity management. An efficient information security management system forms the basis. The early radiology information systems were islands of information processing. A modern radiology department must be able to be modularly integrated into an informational network of a bigger organization. The secondary use of stored data for clinical decision-making support poses new challenges for the integrity of the data or systems because medical knowledge is displayed and provided in a context of treatment. In terms of imaging the creation and distribution radiology services work in a fully digital manner which is often different for radiology reports. Legally secure electronic diagnostic reports require a complex technical infrastructure; therefore, diagnostic findings still need to be filed as a paper document. The internal exchange and an improved dose management can be simplified by systems which continuously and automatically record the doses and thus provide the possibility of permanent analysis and reporting. Communication between patient and radiologist will gain ongoing importance. Intelligent use of technology will convey this to the radiologist and it will facilitate the understanding of the information by the patient.
NetWall distributed firewall in the use of campus network
NASA Astrophysics Data System (ADS)
He, Junhua; Zhang, Pengshuai
2011-10-01
Internet provides a modern means of education but also non-mainstream consciousness and poor dissemination of information opens the door, network and moral issues have become prominent, poor dissemination of information and network spread rumors and negative effects of new problems, ideological and political education in schools had a huge impact, poses a severe challenge. This paper presents a distributed firewall will NetWall deployed in a campus network solution. The characteristics of the campus network, using technology to filter out bad information on the means of control, of sensitive information related to the record, establish a complete information security management platform for the campus network.
One Health in food safety and security education: A curricular framework.
Angelos, J; Arens, A; Johnson, H; Cadriel, J; Osburn, B
2016-02-01
The challenges of producing and distributing the food necessary to feed an anticipated 9 billion people in developed and developing societies by 2050 without destroying Earth's finite soil and water resources present extremely complex problems that lack simple solutions. The ability of modern societies to adequately address these and other food-related problems will require an educated workforce trained not only in traditional food safety, security, and public health, but also in other areas including food production, sustainable practices, and ecosystem health. To help address the need for such an educated workforce, a curricular framework was developed to assist those tasked with designing education and training for future food systems workers. One sentence summary: A curricular framework for education and training in food safety and security was developed that incorporates One Health concepts. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.
Random sequences generation through optical measurements by phase-shifting interferometry
NASA Astrophysics Data System (ADS)
François, M.; Grosges, T.; Barchiesi, D.; Erra, R.; Cornet, A.
2012-04-01
The development of new techniques for producing random sequences with a high level of security is a challenging topic of research in modern cryptographics. The proposed method is based on the measurement by phase-shifting interferometry of the speckle signals of the interaction between light and structures. We show how the combination of amplitude and phase distributions (maps) under a numerical process can produce random sequences. The produced sequences satisfy all the statistical requirements of randomness and can be used in cryptographic schemes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, Timothy M.; Kadavil, Rahul; Palmintier, Bryan
The 21st century electric power grid is transforming with an unprecedented increase in demand and increase in new technologies. In the United States Energy Independence and Security Act of 2007, Title XIII sets the tenets for modernizing the electricity grid through what is known as the 'Smart Grid Initiative.' This initiative calls for increased design, deployment, and integration of distributed energy resources, smart technologies and appliances, and advanced storage devices. The deployment of these new technologies requires rethinking and re-engineering the traditional boundaries between different electric power system domains.
Ecological Modernization and the US Farm Bill: The Case of the Conservation Security Program
ERIC Educational Resources Information Center
Lenihan, Martin H.; Brasier, Kathryn J.
2010-01-01
This paper examines the debate surrounding the inception of the Conservation Security Program (CSP) under the 2002 US Farm Bill as a possible expression of ecological modernization by examining the discursive contributions made by official actors, social movement organizations, and producer organizations. Based on this analysis, the CSP embodies…
Video performance for high security applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Connell, Jack C.; Norman, Bradley C.
2010-06-01
The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivitymore » of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.« less
ERIC Educational Resources Information Center
Murphy, Garrett
2014-01-01
This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…
Contextualizing Secure Information System Design: A Socio-Technical Approach
ERIC Educational Resources Information Center
Charif, Abdul Rahim
2017-01-01
Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to "technological fixes" neither is the design of SIS. Technical security cannot ensure IS security.…
Medicare privatization and the erosion of retirement security.
Polivka, Larry; Kwak, Jung
2008-01-01
This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.
A European Perspective on Security Research
NASA Astrophysics Data System (ADS)
Liem, Khoen; Hiller, Daniel; Castex, Christoph
Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.
Security and Resilience | Grid Modernization | NREL
Security and Resilience Security and Resilience NREL develops tools and solutions to enable a more Consortium, NREL collaborates with industry, academia, and other research organizations to find solutions to
Information security requirements in patient-centred healthcare support systems.
Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah
2013-01-01
Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.
Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
Moya, José M.; Araujo, Álvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals. PMID:22291569
Feyisso, Mohammed; Belachew, Tefera; Tesfay, Amanuel; Addisu, Yohannes
2015-01-01
In spite of the massive spending and extensive family-planning promotion, many poor people in the third world remain reluctant to use modern contraceptive method. Mostly when they use modern contraceptives, their continuation rates are often low. Reproductive health can improve women's nutrition; in return better nutrition can improve reproductive health. Thus addressing the connection between nutrition and reproductive health is critical to ensure population growth that does not overwhelm world resources. A community based cross-sectional study was conducted from March 15-30, 2014 in Soddo Zuria Woreda, Southern Ethiopia. A total of 651 currently married women of reproductive age group were selected using multistage sampling. Probability proportional to the size allocation method was employed to determine the number of households. Multivariable logistic regression was used to assess the association between family planning use and food security status after adjusting for other covariates. Use of modern contraceptive method was significantly low among food insecure women (29.7 %) compared to those who were food secure (52.0 %), (P < 0.001). Women from food secure households were nearly twice likely to use modern contraceptive methods (AOR: 1.69 (CI: 1.03, 2.66)). Similarly, those who had antenatal care (ANC) visit (AOR: 4.56 (CI: 2.45, 7.05)); exposure to media (AOR: 4.92 (CI: 1.84, 13.79)) and those who discussed about contraceptive methods with their partner (AOR: 3.07 (CI: 1.86, 5.22)) were more likely to use modern contraceptive methods. Conversely, women who delivered their last child at home were less likely to use modern contraceptive methods (AOR: 0.08 (CI: 0.03, 0.13)). Food insecurity is negatively associated with modern contraceptive method use. Thus food insecurity should be considered as one of the barriers in designing family planning services and needs special arrangement.
Twenty-Five Year Site Plan FY2013 - FY2037
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, William H.
2012-07-12
Los Alamos National Laboratory (the Laboratory) is the nation's premier national security science laboratory. Its mission is to develop and apply science and technology to ensure the safety, security, and reliability of the United States (U.S.) nuclear stockpile; reduce the threat of weapons of mass destruction, proliferation, and terrorism; and solve national problems in defense, energy, and the environment. The fiscal year (FY) 2013-2037 Twenty-Five Year Site Plan (TYSP) is a vital component for planning to meet the National Nuclear Security Administration (NNSA) commitment to ensure the U.S. has a safe, secure, and reliable nuclear deterrent. The Laboratory also usesmore » the TYSP as an integrated planning tool to guide development of an efficient and responsive infrastructure that effectively supports the Laboratory's missions and workforce. Emphasizing the Laboratory's core capabilities, this TYSP reflects the Laboratory's role as a prominent contributor to NNSA missions through its programs and campaigns. The Laboratory is aligned with Nuclear Security Enterprise (NSE) modernization activities outlined in the NNSA Strategic Plan (May 2011) which include: (1) ensuring laboratory plutonium space effectively supports pit manufacturing and enterprise-wide special nuclear materials consolidation; (2) constructing the Chemistry and Metallurgy Research Replacement Nuclear Facility (CMRR-NF); (3) establishing shared user facilities to more cost effectively manage high-value, experimental, computational and production capabilities; and (4) modernizing enduring facilities while reducing the excess facility footprint. Th is TYSP is viewed by the Laboratory as a vital planning tool to develop an effi cient and responsive infrastructure. Long range facility and infrastructure development planning are critical to assure sustainment and modernization. Out-year re-investment is essential for sustaining existing facilities, and will be re-evaluated on an annual basis. At the same time, major modernization projects will require new line-item funding. This document is, in essence, a roadmap that defines a path forward for the Laboratory to modernize, streamline, consolidate, and sustain its infrastructure to meet its national security mission.« less
The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare
2015-10-01
INDMDUALIZATION OF MODERN WARFARE Glenn J. Voelz U.S. ARMY WAR COLLEGE ~~ ..... ~O.L STRATEGIC STUDIES INSTITUTE Report Documentation Page Form...ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and
Trust-Based Security Level Evaluation Using Bayesian Belief Networks
NASA Astrophysics Data System (ADS)
Houmb, Siv Hilde; Ray, Indrakshi; Ray, Indrajit; Chakraborty, Sudip
Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.
NASA Astrophysics Data System (ADS)
Srikantha, Pirathayini
Today's electric grid is rapidly evolving to provision for heterogeneous system components (e.g. intermittent generation, electric vehicles, storage devices, etc.) while catering to diverse consumer power demand patterns. In order to accommodate this changing landscape, the widespread integration of cyber communication with physical components can be witnessed in all tenets of the modern power grid. This ubiquitous connectivity provides an elevated level of awareness and decision-making ability to system operators. Moreover, devices that were typically passive in the traditional grid are now `smarter' as these can respond to remote signals, learn about local conditions and even make their own actuation decisions if necessary. These advantages can be leveraged to reap unprecedented long-term benefits that include sustainable, efficient and economical power grid operations. Furthermore, challenges introduced by emerging trends in the grid such as high penetration of distributed energy sources, rising power demands, deregulations and cyber-security concerns due to vulnerabilities in standard communication protocols can be overcome by tapping onto the active nature of modern power grid components. In this thesis, distributed constructs in optimization and game theory are utilized to design the seamless real-time integration of a large number of heterogeneous power components such as distributed energy sources with highly fluctuating generation capacities and flexible power consumers with varying demand patterns to achieve optimal operations across multiple levels of hierarchy in the power grid. Specifically, advanced data acquisition, cloud analytics (such as prediction), control and storage systems are leveraged to promote sustainable and economical grid operations while ensuring that physical network, generation and consumer comfort requirements are met. Moreover, privacy and security considerations are incorporated into the core of the proposed designs and these serve to improve the resiliency of the future smart grid. It is demonstrated both theoretically and practically that the techniques proposed in this thesis are highly scalable and robust with superior convergence characteristics. These distributed and decentralized algorithms allow individual actuating nodes to execute self-healing and adaptive actions when exposed to changes in the grid so that the optimal operating state in the grid is maintained consistently.
Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.
Zero Nuclear Weapons and Nuclear Security Enterprise Modernization
2011-01-01
national security strategy. For the first time since the Manhattan Project , the United States was no longer building nuclear weapons and was in fact...50 to 60 years to the Manhattan Project and are on the verge of catastrophic failure. Caustic chemicals and processes have sped up the corrosion and...day, the United States must fund the long-term modernization effort of the entire enter prise. Notes 1. Nuclear Weapon Archive, “The Manhattan
2011-09-01
Petropoulos and Harry J . Psomiades, Foreign Interference in Greek Politics: An Historical Perspective, vol. II of Modern Greek Research Series, ed... Maxwell Airforce Base, 2002), 13. 48 Ibid. 49 According to this theory, Turkish diplomats claim that several islets, while not explicitly...and Opportunities, vol. VI in Modern Greek Research Series, ed. Van Coufoudakis, Harry J . Psomiades and Andre Gerolymatos (New York: Pella Publishing
Secure quantum signatures: a practical quantum technology (Conference Presentation)
NASA Astrophysics Data System (ADS)
Andersson, Erika
2016-10-01
Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.
Factors affecting food security and contribution of modern technologies in food sustainability.
Premanandh, Jagadeesan
2011-12-01
The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.
The Department of Homeland Security’s Role in Protecting the National Economy
2017-09-01
national influence, power, and security. However, new characteristics of the modern trade environment have the potential to undermine U.S. economic ...prosperity. The Department of Homeland Security (DHS) claims that homeland security is inseparable from economic security and, as such, that the...department has a role to play in supporting national economic security goals. However, DHS has yet to fully reconcile the tension between its trade
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Designing Security-Hardened Microkernels For Field Devices
NASA Astrophysics Data System (ADS)
Hieb, Jeffrey; Graham, James
Distributed control systems (DCSs) play an essential role in the operation of critical infrastructures. Perimeter field devices are important DCS components that measure physical process parameters and perform control actions. Modern field devices are vulnerable to cyber attacks due to their increased adoption of commodity technologies and that fact that control networks are no longer isolated. This paper describes an approach for creating security-hardened field devices using operating system microkernels that isolate vital field device operations from untrusted network-accessible applications. The approach, which is influenced by the MILS and Nizza architectures, is implemented in a prototype field device. Whereas, previous microkernel-based implementations have been plagued by poor inter-process communication (IPC) performance, the prototype exhibits an average IPC overhead for protected device calls of 64.59 μs. The overall performance of field devices is influenced by several factors; nevertheless, the observed IPC overhead is low enough to encourage the continued development of the prototype.
HOW TO SELECT THE PROPER SECURITY AND EQUIPMENT SURVEILLANCE SYSTEMS TO PROTECT YOUR FACILITIES.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
IN PRESENTING A SURVEY OF MODERN SECURITY SYSTEMS, THIS BOOKLET DISCUSSES THE REQUIREMENTS FOR SURVEILLANCE AND PROTECTION OF AREAS, PERIMETER, AND OBJECTS. A VARIETY OF EQUIPMENT IS DESCRIBED WITH DISCUSSION OF OPERATING PROCEDURES, COSTS, AND RECENT DEVELOPMENTS IN SECURITY SYSTEMS. (JT)
2009-06-12
OF MILITARY ART AND SCIENCE General Studies by KAREN J. DILL, MAJ, USA M.A.E.D., University of Phoenix , Hampton, Virginia, 2005 B.A...policy areas or gaps that require clarification or revision in light of the 21st century security environment and the changes in Army structure, doctrine...researcher identified policy gaps by determining how verbiage is understood in light of the modern OE and Army organization and tactics changes. The
Federal Aviation Administration : challenges in modernizing the agency
DOT National Transportation Integrated Search
2000-02-01
FAA's efforts to implement initiatives in five key areas-air traffic control modernization, procurement and personnel reform, aviation safety, aviation and computer security, and financial management-have met with limited success. For example, FAA ha...
75 FR 81152 - Export Control Modernization: Strategic Trade Authorization License Exception
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-27
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 732, 738, 740, 743, 758, and... Authorization License Exception AGENCY: Bureau of Industry and Security, Commerce. ACTION: Proposed rule..., Bureau of Industry and Security, Room 2705, U.S. Department of Commerce, Washington, DC 20230. Please...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Linger, Richard C; Pleszkoch, Mark G; Prowell, Stacy J
Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and securitymore » vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.« less
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
Prat, Sandrine; Péan, Stéphane C; Crépin, Laurent; Drucker, Dorothée G; Puaud, Simon J; Valladas, Hélène; Lázničková-Galetová, Martina; van der Plicht, Johannes; Yanevich, Alexander
2011-01-01
Anatomically Modern Humans (AMHs) are known to have spread across Europe during the period coinciding with the Middle to Upper Paleolithic transition. Whereas their dispersal into Western Europe is relatively well established, evidence of an early settlement of Eastern Europe by modern humans are comparatively scarce. Based on a multidisciplinary approach for the study of human and faunal remains, we describe here the oldest AMH remains from the extreme southeast Europe, in conjunction with their associated cultural and paleoecological background. We applied taxonomy, paleoecology, and taphonomy combined with geomorphology, stratigraphy, archeology and radiocarbon dating. More than 160 human bone remains have been discovered. They originate from a well documented Upper Paleolithic archeological layer (Gravettian cultural tradition) from the site of Buran-Kaya III located in Crimea (Ukraine). The combination of non-metric dental traits and the morphology of the occipital bones allow us to attribute the human remains to Anatomically Modern Humans. A set of human and faunal remains from this layer has been radiocarbon dated by Accelerator Mass Spectrometry. The direct-dating results of human bone establish a secure presence of AMHs at 31,900+240/-220 BP in this region. They are the oldest direct evidence of the presence of AMHs in a well documented archeological context. Based on taphonomical observations (cut marks and distribution of skeletal elements), they represent the oldest Upper Paleolithic modern humans from Eastern Europe, showing post-mortem treatment of the dead as well. These findings are essential for the debate on the spread of modern humans in Europe during the Upper Paleolithic, as well as their cultural behaviors.
Department of Defense High Performance Computing Modernization Program. 2008 Annual Report
2009-04-01
place to another on the network. Without it, a computer could only talk to itself - no email, no web browsing, and no iTunes . Most of the Internet...Your SecurID Card ), Ken Renard Secure Wireless, Rob Scott and Stephen Bowman Securing Today’s Networks, Rich Whittney, Juniper Networks, Federal
A Framework for the Governance of Information Security
ERIC Educational Resources Information Center
Edwards, Charles K.
2013-01-01
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.
Nellore, Vishwa; Xi, Sam; Dwyer, Chris
2015-12-22
Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.
Information Systems at Enterprise. Design of Secure Network of Enterprise
NASA Astrophysics Data System (ADS)
Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.
2018-05-01
No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.
Characterization of potential security threats in modern automobiles: a composite modeling approach
DOT National Transportation Integrated Search
2014-10-01
The primary objective of the work detailed in this report is to describe a composite modeling approach for potential cybersecurity threats in modern vehicles. Threat models, threat descriptions, and examples of various types of conceivable threats to...
Evolution of Stored-Product Entomology: Protecting the World Food Supply.
Hagstrum, David W; Phillips, Thomas W
2017-01-31
Traditional methods of stored-product pest control were initially passed from generation to generation. Ancient literature and archaeology reveal hermetic sealing, burning sulfur, desiccant dusts, and toxic botanicals as early control methods. Whereas traditional nonchemical methods were subsequently replaced by synthetic chemicals, other traditional methods were improved and integrated with key modern pesticides. Modern stored-product integrated pest management (IPM) makes decisions using knowledge of population dynamics and threshold insect densities. IPM programs are now being fine-tuned to meet regulatory and market standards. Better sampling methods and insights from life histories and ecological studies have been used to optimize the timing of pest management. Over the past 100 years, research on stored-product insects has shifted from being largely concentrated within 10 countries to being distributed across 65 countries. Although the components of IPM programs have been well researched, more research is needed on how these components can be combined to improve effectiveness and assure the security of postharvest food as the human population increases.
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
Disability Data Modernization Act
Sen. Martinez, Mel [R-FL
2009-05-21
Senate - 06/09/2009 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure
Sequential Service Restoration for Unbalanced Distribution Systems and Microgrids
Chen, Bo; Chen, Chen; Wang, Jianhui; ...
2017-07-07
The resilience and reliability of modern power systems are threatened by increasingly severe weather events and cyber-physical security events. An effective restoration methodology is desired to optimally integrate emerging smart grid technologies and pave the way for developing self-healing smart grids. In this paper, a sequential service restoration (SSR) framework is proposed to generate restoration solutions for distribution systems and microgrids in the event of large-scale power outages. The restoration solution contains a sequence of control actions that properly coordinate switches, distributed generators, and switchable loads to form multiple isolated microgrids. The SSR can be applied for three-phase unbalanced distributionmore » systems and microgrids and can adapt to various operation conditions. Mathematical models are introduced for three-phase unbalanced power flow, voltage regulators, transformers, and loads. Furthermore, the SSR problem is formulated as a mixed-integer linear programming model, and its effectiveness is evaluated via the modified IEEE 123 node test feeder.« less
Sequential Service Restoration for Unbalanced Distribution Systems and Microgrids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Bo; Chen, Chen; Wang, Jianhui
The resilience and reliability of modern power systems are threatened by increasingly severe weather events and cyber-physical security events. An effective restoration methodology is desired to optimally integrate emerging smart grid technologies and pave the way for developing self-healing smart grids. In this paper, a sequential service restoration (SSR) framework is proposed to generate restoration solutions for distribution systems and microgrids in the event of large-scale power outages. The restoration solution contains a sequence of control actions that properly coordinate switches, distributed generators, and switchable loads to form multiple isolated microgrids. The SSR can be applied for three-phase unbalanced distributionmore » systems and microgrids and can adapt to various operation conditions. Mathematical models are introduced for three-phase unbalanced power flow, voltage regulators, transformers, and loads. Furthermore, the SSR problem is formulated as a mixed-integer linear programming model, and its effectiveness is evaluated via the modified IEEE 123 node test feeder.« less
Fujita, Masaki; Yamasaki, Shinji; Katagiri, Chiaki; Oshiro, Itsuro; Sano, Katsuhiro; Kurozumi, Taiji; Sugawara, Hiroshi; Kunikita, Dai; Matsuzaki, Hiroyuki; Kano, Akihiro; Okumura, Tomoyo; Sone, Tomomi; Fujita, Hikaru; Kobayashi, Satoshi; Naruse, Toru; Kondo, Megumi; Matsu'ura, Shuji; Suwa, Gen; Kaifu, Yousuke
2016-10-04
Maritime adaptation was one of the essential factors that enabled modern humans to disperse all over the world. However, geographic distribution of early maritime technology during the Late Pleistocene remains unclear. At this time, the Indonesian Archipelago and eastern New Guinea stand as the sole, well-recognized area for secure Pleistocene evidence of repeated ocean crossings and advanced fishing technology. The incomplete archeological records also make it difficult to know whether modern humans could sustain their life on a resource-poor, small oceanic island for extended periods with Paleolithic technology. We here report evidence from a limestone cave site on Okinawa Island, Japan, of successive occupation that extends back to 35,000-30,000 y ago. Well-stratified strata at the Sakitari Cave site yielded a rich assemblage of seashell artifacts, including formally shaped tools, beads, and the world's oldest fishhooks. These are accompanied by seasonally exploited food residue. The persistent occupation on this relatively small, geographically isolated island, as well as the appearance of Paleolithic sites on nearby islands by 30,000 y ago, suggest wider distribution of successful maritime adaptations than previously recognized, spanning the lower to midlatitude areas in the western Pacific coastal region.
Fujita, Masaki; Yamasaki, Shinji; Katagiri, Chiaki; Oshiro, Itsuro; Sano, Katsuhiro; Kurozumi, Taiji; Sugawara, Hiroshi; Kunikita, Dai; Matsuzaki, Hiroyuki; Kano, Akihiro; Okumura, Tomoyo; Sone, Tomomi; Fujita, Hikaru; Kobayashi, Satoshi; Naruse, Toru; Kondo, Megumi; Matsu’ura, Shuji; Suwa, Gen; Kaifu, Yousuke
2016-01-01
Maritime adaptation was one of the essential factors that enabled modern humans to disperse all over the world. However, geographic distribution of early maritime technology during the Late Pleistocene remains unclear. At this time, the Indonesian Archipelago and eastern New Guinea stand as the sole, well-recognized area for secure Pleistocene evidence of repeated ocean crossings and advanced fishing technology. The incomplete archeological records also make it difficult to know whether modern humans could sustain their life on a resource-poor, small oceanic island for extended periods with Paleolithic technology. We here report evidence from a limestone cave site on Okinawa Island, Japan, of successive occupation that extends back to 35,000−30,000 y ago. Well-stratified strata at the Sakitari Cave site yielded a rich assemblage of seashell artifacts, including formally shaped tools, beads, and the world’s oldest fishhooks. These are accompanied by seasonally exploited food residue. The persistent occupation on this relatively small, geographically isolated island, as well as the appearance of Paleolithic sites on nearby islands by 30,000 y ago, suggest wider distribution of successful maritime adaptations than previously recognized, spanning the lower to midlatitude areas in the western Pacific coastal region. PMID:27638208
COVERING THE SEAMS IN U.S. NATIONAL SECURITY BY APPLYING NETWORK AND TEAM ATTRIBUTES
2017-04-06
Today, one such weakness is the seams that exist in the system . Organizational criteria like geography , functions, and responsibilities often create...establishment by the National Security Act of 1947, the modern U.S. national security system has evolved as a result of legislation, presidential preference...and because of changes in the U.S. and international security environments. With each evolution, the system has found ways to function in dealing
The Oldest Anatomically Modern Humans from Far Southeast Europe: Direct Dating, Culture and Behavior
Prat, Sandrine; Péan, Stéphane C.; Crépin, Laurent; Drucker, Dorothée G.; Puaud, Simon J.; Valladas, Hélène; Lázničková-Galetová, Martina; van der Plicht, Johannes; Yanevich, Alexander
2011-01-01
Background Anatomically Modern Humans (AMHs) are known to have spread across Europe during the period coinciding with the Middle to Upper Paleolithic transition. Whereas their dispersal into Western Europe is relatively well established, evidence of an early settlement of Eastern Europe by modern humans are comparatively scarce. Methodology/Principal Finding Based on a multidisciplinary approach for the study of human and faunal remains, we describe here the oldest AMH remains from the extreme southeast Europe, in conjunction with their associated cultural and paleoecological background. We applied taxonomy, paleoecology, and taphonomy combined with geomorphology, stratigraphy, archeology and radiocarbon dating. More than 160 human bone remains have been discovered. They originate from a well documented Upper Paleolithic archeological layer (Gravettian cultural tradition) from the site of Buran-Kaya III located in Crimea (Ukraine). The combination of non-metric dental traits and the morphology of the occipital bones allow us to attribute the human remains to Anatomically Modern Humans. A set of human and faunal remains from this layer has been radiocarbon dated by Accelerator Mass Spectrometry. The direct-dating results of human bone establish a secure presence of AMHs at 31,900+240/−220 BP in this region. They are the oldest direct evidence of the presence of AMHs in a well documented archeological context. Based on taphonomical observations (cut marks and distribution of skeletal elements), they represent the oldest Upper Paleolithic modern humans from Eastern Europe, showing post-mortem treatment of the dead as well. Conclusion/Significance These findings are essential for the debate on the spread of modern humans in Europe during the Upper Paleolithic, as well as their cultural behaviors. PMID:21698105
Energy efficiency in urban management: Russian and world experience
NASA Astrophysics Data System (ADS)
Pryadko, Igor
2017-10-01
The article discusses the role of energetics in creating a comfortable and safe environment of modern megacities, and the problem is considered in the socio-economic aspect. The object is the energy security of the city, and the subject is the influence of urban society on the formation of energy security. In particular, the problems are raised: ecological problems of urban energy supply, the condition of surface layer of the atmosphere near electric power lines. The author assesses the actions, implemented by the urban authorities in Mytischi, in the southwestern areas of New Moscow. The author assesses these sample areas on the basis of Ch. Landry’s concept of self-training, designated for municipal authorities and urban communities, and offers several successfully implemented self-study cases and in the light of modern methods of ensuring energy security. The forecasts of creation of energy-safe space, made by modern sociologist-urbanist Leo Hollis, are taken into account. The author also considers some of the economic aspects of biosphere safety. In particular, he insists that biosphere safety, convenience, and comfort have developed into competitive advantages in the housing market.
A framework for secure and decentralized sharing of medical imaging data via blockchain consensus.
Patel, Vishal
2018-04-01
The electronic sharing of medical imaging data is an important element of modern healthcare systems, but current infrastructure for cross-site image transfer depends on trust in third-party intermediaries. In this work, we examine the blockchain concept, which enables parties to establish consensus without relying on a central authority. We develop a framework for cross-domain image sharing that uses a blockchain as a distributed data store to establish a ledger of radiological studies and patient-defined access permissions. The blockchain framework is shown to eliminate third-party access to protected health information, satisfy many criteria of an interoperable health system, and readily generalize to domains beyond medical imaging. Relative drawbacks of the framework include the complexity of the privacy and security models and an unclear regulatory environment. Ultimately, the large-scale feasibility of such an approach remains to be demonstrated and will depend on a number of factors which we discuss in detail.
Romania and the New Cold War Security Challenges
2017-06-09
social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic , political...and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The
Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari
2008-11-01
This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.
Forensic and homeland security applications of modern portable Raman spectroscopy.
Izake, Emad L
2010-10-10
Modern detection and identification of chemical and biological hazards within the forensic and homeland security contexts may well require conducting the analysis in field while adapting a non-contact approach to the hazard. Technological achievements on both surface and resonance enhancement Raman scattering re-developed Raman spectroscopy to become the most adaptable spectroscopy technique for stand-off and non-contact analysis of hazards. On the other hand, spatially offset Raman spectroscopy proved to be very valuable for non-invasive chemical analysis of hazards concealed within non-transparent containers and packaging. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Critical Issues of Web-Enabled Technologies in Modern Organizations.
ERIC Educational Resources Information Center
Khosrow-Pour, Mehdi; Herman, Nancy
2001-01-01
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
Austrian Security Strategy: Need For Reformulation Due To Security Developments
2016-02-14
migration from Africa and the Middle East, and reality has overtaken the security strategy. The terrorist attacks in Paris and the sexual assaults on women...legitimate use of physical force” i.e., a state is a system based on the legitimate “relation of domination of man over man.”6, 7 Strategy is...called peace dividend to stimulate the economy and invest in infrastructure projects. Modern security policy must be assessed in all areas, since
A cooperative model for IS security risk management in distributed environment.
Feng, Nan; Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.
Financial Fraud and Child Abuse
ERIC Educational Resources Information Center
Little, Allison Dare
2014-01-01
A modern form of abuse of children by parents and foster parents is to use the identity of children in their care for their own financial benefit, such as accessing their unused social security numbers to secure credit. This article reviews examples and implications of this identity theft.
Information Technology Security Training Requirements: A Role- and Performance-Based Model
1998-04-01
Journal, Vol.9, no. 2, pp. 18-20, 1995. Kearsley, Greg. Andragogy (M. Knowles), Washington, DC: George Washington University, 1996. Knowles, M.S...The Modern Practice of Adult Education: Andragogy vs. Pedagogy, New York: Association Press, 1970. Information Technology Security Training
Climate Change, Instability and a Full Spectrum Approach to Conflict Prevention in Africa
2009-10-23
commander to follow. 15. SUBJECT TERMS Climate Change, Global Warming , Security Cooperation, Stability, Instability, Stabilization, Security...note that global warming could also create similar impacts on resources.19 In modern times disputes over natural resources have erupted into conflict...16. Center for Naval Analysis, National Security and the Threat of Climate Change, 18. 17. Michael T. Klare, ― Global Warming Battlefields: How
Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA)
2009-12-01
Tainting, tagged, metadata, architecture, hardware, processor, microkernel , zero-kernel, co-design 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF... microkernels (e.g., [27]) embraced the idea that it was beneficial to reduce the ker- nel, separating out services as separate processes isolated from...limited adoption. More recently Tanenbaum [72] notes the security virtues of microkernels and suggests the modern importance of security makes it
The Role of the National Guard in Homeland Security
2007-05-01
Fulcrum Publishing, 1996), 19. 22Ibid., 20. 23Thomas Andrew Bailey and Paul B. Ryan, The Lusitania Disaster: An Episode in Modern Warfare and...Bailey, Thomas Andrew, and Paul B. Ryan. The Lusitania Disaster: An Episode in Modern Warfare and Diplomacy. New York, NY: Free Press, 1975. Ball
Individualizing Japan: searching for its origin in first modernity.
Suzuki, Munenori; Ito, Midori; Ishida, Mitsunori; Nihei, Norihiro; Maruyama, Masao
2010-09-01
Since the mid-1990s Japanese society has entered a period of major change. The previous patterns of social order and social integration have collapsed, and it has become increasingly difficult to envision a stable life course for oneself. The 'secure' foundation has been weakening and anxiety has spread at an accelerated pace. Japan could enter the age of second modernity, or reflexive modernization. In Japan's first modernity, the mechanism responsible for risk management, an integrated society, and stabilized social order, was, first, private corporations that guaranteed long-term stability for employees and their families (company-centrism) and, second, land development rapidly implemented under the guidance of bureaucrats (developmentalism). From the 1990s, these systems were fundamentally destroyed by globalization and neoliberal policies. Private corporations limited the groups that could benefit from the seniority wage system, undermining in-house welfare benefits. The government abandoned its role of improving the industrial and economic conditions of surrounding areas through offering public works projects. After these risk-stabilizing mechanisms were gone, two problems became conspicuous - poverty among young workers in urban areas and the collapse of the local community in marginal areas. As the seniority wage system and lifetime employment were substitutes for the public social security system, public measures to deal with poverty remain inadequate. Now, the individualization of the family has advanced somewhat under compulsion as the rate of unmarried people and the divorce rate have climbed. The Japanese have a tendency to seek 'self-realization'; at the same time, they also want 'secure employment'. Thus, they are torn between individualization and the desire for security. What is now necessary is a more stable system that will ensure them adequate material and spiritual 'elbowroom' to allow them to make their own choices. © London School of Economics and Political Science 2010.
A Cooperative Model for IS Security Risk Management in Distributed Environment
Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626
Project #, May 23, 2017. The EPA OIG plans to begin fieldwork for an audit of the U.S. Chemical Safety and Hazard Investigation Board’s (CSB’s) compliance with the Federal Information Security Modernization Act of 2014 (FISMA).
Fortress America: The Aesthetics of Homeland Security in the Public Realm
2017-09-01
people in a bombing attack on a federal building in Oklahoma City. Americans were stunned by this first modern domestic terrorist attack. The bombing ...Order 12977, signed by President Clinton six months after the bombing , created the Interagency Security Committee (ISC) to address physical security...barricades installed shortly after the Oklahoma City bombing . Later in the article, Brown quotes Stephen Kliment, editor of the Architectural Record
Making Schools Safe: The Role of the Modern Business Officer.
ERIC Educational Resources Information Center
Stephens, Ronald D.
1990-01-01
School business officials are held responsible for school safety. After conducting a school security audit, the following strategies are recommended: establishing a local school security task force; forming a comprehensive crisis management plan; establishing a school communication network; and providing school staff with inservice training on…
ERIC Educational Resources Information Center
Jokela, Paivi; Karlsudd, Peter
2007-01-01
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thornbury, Matthew
Electrorefining (ER) is a major part of efforts at the Y-12 National Security Complex to revolutionize the reprocessing and purification of enriched uranium (EU). Successful implementation of ER could drastically reduce the operational costs and footprint, hazardous materials use, and waste generation.
Designing, Implementing, and Evaluating Secure Web Browsers
ERIC Educational Resources Information Center
Grier, Christopher L.
2009-01-01
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
17 CFR 240.16a-7 - Transactions effected in connection with a distribution.
Code of Federal Regulations, 2010 CFR
2010-04-01
... good faith in the distribution of such block of securities; or (ii) A security purchased in good faith... the transaction is engaged in the business of distributing securities and is participating in good faith, in the ordinary course of such business, in the distribution of such block of securities; and (2...
Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)
2012-03-01
SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY
The Arabian Gulf and Security Policy: The Past as Present, the Present as Future
2009-04-01
permeates the Green Zone. Recent cooperation between the Maliki government and Sunni groups represents the tactical “divide-and-conquer” approach to... Kegan Paul, 2005), 76-77. 42. Zahlan, Modern Gulf States, 65. 43. Peck, Gulf Arab States, 38. 44. Zahlan, Modern Gulf States, 67. 70 JSOU Report
Is there a Greater Role for Prime Numbers in our Schools?
ERIC Educational Resources Information Center
Cairns, Grant
2005-01-01
Prime numbers play an extremely important role in modern mathematics. Apart from still being the object of intense research activity, their applications in banking and security underline a key phenomenon: in the modern world, useful applications of mathematics often come from very "pure" abstract theories. Curiously, despite their undeniable…
The Educational Challenge of Unraveling the Fantasies of Ontological Security
ERIC Educational Resources Information Center
Stein, Sharon; Hunt, Dallas; Suša, Rene; de Oliveira Andreotti, Vanessa
2017-01-01
In this article we address the current context of intensified racialized state securitization by tracing its roots to the naturalized colonial architectures of everyday modern life--which we present through the metaphor of "the house modernity built." While contemporary crises are often perceived to derive from external threats to the…
Cyberspace modernization. An interest protocol planning advisory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.; McLane, Victor N.
A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less
17 CFR 270.22c-1 - Pricing of redeemable securities for distribution, redemption and repurchase.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Pricing of redeemable securities for distribution, redemption and repurchase. 270.22c-1 Section 270.22c-1 Commodity and Securities... 1940 § 270.22c-1 Pricing of redeemable securities for distribution, redemption and repurchase. (a) No...
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
Goryczka, Slawomir; Xiong, Li
2016-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir’s secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy. PMID:28919841
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy.
Goryczka, Slawomir; Xiong, Li
2017-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir's secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy.
Biometrics and ID Cards — Enablers for Personal Security
NASA Astrophysics Data System (ADS)
Reisen, Andreas
The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.
Design and Implementation of a Secure Modbus Protocol
NASA Astrophysics Data System (ADS)
Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto
The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.
Business continuity strategies for cyber defence: battling time and information overload.
Streufert, John
2010-11-01
Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.
Modernizing Selection and Promotion Procedures in the State Employment Security Service Agency.
ERIC Educational Resources Information Center
Derryck, Dennis A.; Leyes, Richard
The purpose of this feasibility study was to discover the types ofselection and promotion models, strategies, and processes that must be employed if current State Employment Security Service Agency selection practices are to be made more directly relevant to the various populations currently being served. Specifically, the study sought to…
Cybersecurity Education: Bridging the Gap between Hardware and Software Domains
ERIC Educational Resources Information Center
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher
2014-01-01
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
12 CFR 201.110 - Goods held by persons employed by owner.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Board has taken into consideration the changes that have occurred in commercial law and practice since 1933. Modern commercial law, embodied in the Uniform Commercial Code, refers to “perfecting security interests” rather than “securing title” to goods. The Board believes that if, under State law, the issuance...
2006-07-01
group Aum Shinrikyo on the Tokyo subway system, which resulted in 10 deaths, is regarded by many as the dawn of the era of modern WMD terrorism...organizations have become truly global in character. Al Qaeda, for example, is franchising operations around the world either directly or indirectly
A Model for an Information Security Risk Management (ISRM) Framework for Saudi Arabian Organisations
ERIC Educational Resources Information Center
Alshareef, Naser
2016-01-01
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Secure key storage and distribution
Agrawal, Punit
2015-06-02
This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.
13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...
13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...
"A Hedge against the Future": The Post-Cold War Rhetoric of Nuclear Weapons Modernization
ERIC Educational Resources Information Center
Taylor, Bryan C.
2010-01-01
Rhetoric has traditionally played an important role in constituting the nuclear future, yet that role has changed significantly since the declared end of the Cold War. Viewed from the perspectives of nuclear criticism and postmodern theories of risk and security, current rhetoric of US nuclear modernization demonstrates how contingencies of voice…
Bahrain-Iran Relations in Modern Times
2014-09-01
IN MODERN TIMES by Mohamed A. Al Khalifa September 2014 Thesis Co-Advisors: James Russell Mohammed Hafez THIS PAGE INTENTIONALLY... Russell Thesis Advisor Mohammed Hafez Thesis Advisor Mohammed Hafez Chair, Department of National Security Affairs iii THIS PAGE...advisors, associate professor James Russell , associate professor and chair Mohammed Hafez, and assistant professor Abbas Khadim at the Department of
Sufi, Fahim; Khalil, Ibrahim
2009-04-01
With cardiovascular disease as the number one killer of modern era, Electrocardiogram (ECG) is collected, stored and transmitted in greater frequency than ever before. However, in reality, ECG is rarely transmitted and stored in a secured manner. Recent research shows that eavesdropper can reveal the identity and cardiovascular condition from an intercepted ECG. Therefore, ECG data must be anonymized before transmission over the network and also stored as such in medical repositories. To achieve this, first of all, this paper presents a new ECG feature detection mechanism, which was compared against existing cross correlation (CC) based template matching algorithms. Two types of CC methods were used for comparison. Compared to the CC based approaches, which had 40% and 53% misclassification rates, the proposed detection algorithm did not perform any single misclassification. Secondly, a new ECG obfuscation method was designed and implemented on 15 subjects using added noises corresponding to each of the ECG features. This obfuscated ECG can be freely distributed over the internet without the necessity of encryption, since the original features needed to identify personal information of the patient remain concealed. Only authorized personnel possessing a secret key will be able to reconstruct the original ECG from the obfuscated ECG. Distribution of the would appear as regular ECG without encryption. Therefore, traditional decryption techniques including powerful brute force attack are useless against this obfuscation.
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
Implementing security in a distributed web-based EHCR.
Sucurovic, Snezana
2007-01-01
In many countries there are initiatives for building an integrated patient-centric electronic health record. There are also initiatives for transnational integrations. These growing demands for integration result from the fact that it can provide improving healthcare treatments and reducing the cost of healthcare services. While in European highly developed countries computerisation in healthcare sector began in the 1970s and reached a high level, some developing countries, and Serbia among them, have started computerisation recently. This is why MEDIS (MEDical Information System) is aimed at integration itself from the very beginning instead of integration of heterogeneous information systems on a middle layer or using HL7 protocol. The implementation of a national healthcare information system requires using standards as integrated and widely accepted solutions. Therefore, we have started building MEDIS to meet the requirements of CEN ENV 13606 and CEN ENV 13729 standards. The prototype version has a distributed component-based architecture with modern security solutions applied. MEDIS has been implemented as a federated system where the central server hosts basic EHCR information about a patient, and clinical servers contain their own part of patients' EHCR. At present, there is an initial version of prototype planned to be deployed at first in a small community. In particular, open source API for X.509 authentication and authorisation has been developed. Our project meets the requirements for education in health informatics, including appropriate knowledge and skills on EHCR. The points included in this article have been presented on several national conferences and widely discussed. MEDIS has explored a federated, component-based EHCR architecture and related security aspects. In its initial version it shows acceptable performances and administrative simplicity. It emphasizes the importance of using standards in building EHCR in our country, in order to prepare it for future integrations.
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
NASA Astrophysics Data System (ADS)
Naik, R. Lalu; Reddy, P. Chenna
2015-12-01
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of research reports by brokers or dealers about securities other than those they are distributing... research reports by brokers or dealers about securities other than those they are distributing. (a... research reports about securities of an issuer shall be deemed for purposes of sections 2(a)(10) and 5(c...
Quantum information to the home
NASA Astrophysics Data System (ADS)
Choi, Iris; Young, Robert J.; Townsend, Paul D.
2011-06-01
Information encoded on individual quanta will play an important role in our future lives, much as classically encoded digital information does today. Combining quantum information carried by single photons with classical signals encoded on strong laser pulses in modern fibre-to-the-home (FTTH) networks is a significant challenge, the solution to which will facilitate the global distribution of quantum information to the home and with it a quantum internet [1]. In real-world networks, spontaneous Raman scattering in the optical fibre would induce crosstalk between the high-power classical channels and a single-photon quantum channel, such that the latter is unable to operate. Here, we show that the integration of quantum and classical information on an FTTH network is possible by performing quantum key distribution (QKD) on a network while simultaneously transferring realistic levels of classical data. Our novel scheme involves synchronously interleaving a channel of quantum data with the Raman scattered photons from a classical channel, exploiting the periodic minima in the instantaneous crosstalk and thereby enabling secure QKD to be performed.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-08
... east of the proposed new break-bulk terminal to improve efficiency and security. New entrance and exit... storm water outfalls into the harbor. New safety and security improvements would be constructed. FOR...) 366-0714; or email: [email protected] . Persons who use a telecommunications device for the deaf...
2016 Emerging Technology Domains Risk Survey
2016-04-05
2016 Emerging Technology Domains Risk Survey Christopher King Dan Klinedinst Todd Lewellen Garret Wassermann April 2016 TECHNICAL REPORT...Unlimited [Checkoway 2011] Checkoway, Stephen; McCoy, Damon; Kantor, Brian; Anderson, Danny; Shacham, Hovav; Savage, Stefan. Comprehensive Experimental ...Koscher 2010] Koscher, Karl et al. “ Experimental Security Analysis of a Modern Automobile,” 447-462. IEEE Symposium on Security and Privacy
Global Food Security Problems in the Modern World Economy
ERIC Educational Resources Information Center
Abdulkadyrova, Madina A.; Dikinov, Andzor H.; Tajmashanov, Hassan È.; Shidaev, Lomali A.; Shidaeva, Eliza A.
2016-01-01
Importance: Food problem at the present stage of development of mankind is that due to improper and overly intensive use of natural resources, increasing demand for livestock products, increasing per capita food consumption and other factors, there has been a steady rise in food prices, represents a threat to food security in the countries with…
Simple proof of security of the BB84 quantum key distribution protocol
Shor; Preskill
2000-07-10
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
[Modern foreign car safety systems and their forensic-medical significance].
Iakunin, S A
2007-01-01
The author gives a characteristic of active and passive security systems installed in cars of foreign production. These security systems significantly modify the classic car trauma character decreasing frequency of occurrence and dimensions of specific and typical injuries. A new approach based on the theory of probability to estimate these injuries is required. The most common active and passive security systems are described in the article; their principles of operation and influence on the trauma character are estimated.
The Security Email Based on Smart Card
NASA Astrophysics Data System (ADS)
Lina, Zhang; Jiang, Meng Hai.
Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Amalia; Chayanie, N. I.
2018-03-01
Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2 ), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2 ) and θ(n), respectively.
Towards An Engineering Discipline of Computational Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mili, Ali; Sheldon, Frederick T; Jilani, Lamia Labed
2007-01-01
George Boole ushered the era of modern logic by arguing that logical reasoning does not fall in the realm of philosophy, as it was considered up to his time, but in the realm of mathematics. As such, logical propositions and logical arguments are modeled using algebraic structures. Likewise, we submit that security attributes must be modeled as formal mathematical propositions that are subject to mathematical analysis. In this paper, we approach this problem by attempting to model security attributes in a refinement-like framework that has traditionally been used to represent reliability and safety claims. Keywords: Computable security attributes, survivability, integrity,more » dependability, reliability, safety, security, verification, testing, fault tolerance.« less
Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Josserand, Terry Michael; Young, Leone; Chamberlin, Edwin Phillip
The Nuclear Security Enterprise, managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the Nuclear Security Enterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon data yields four summary observations thatmore » estimators and analysts of the Nuclear Security Enterprise will find useful.« less
ERIC Educational Resources Information Center
Anaso, George Nwaorah; Nwabudike, Christopher Eziafa
2014-01-01
An in-depth investigation was conducted on the possibility of literature employed to enhance cohesion, sustainable unity, national stability, and security of lives and property in the contemporary Nigeria. These three elements--unity, national stability, and security of lives and property are considered the key pillars of a modern state, the…
A Flight Investigation of Exhaust-heat De-icing
NASA Technical Reports Server (NTRS)
Jones, Alun R; Rodert, Lewis A
1940-01-01
The National Advisory Committee for Aeronautics conducted exhaust-heat de-icing tests in flight to provide data needed in the application of this method. The capacity to extract heat from the exhaust gas for de-icing purposes, the quantity of heat required, and other factors were examined. The results indicate that a wing-heating system employing a spanwise exhaust tube within the leading edge of the wing removed 30 to 35 percent of the heat from exhaust gas entering the wing. Data are given from which the heat required for ice prevention can be calculated. Sample calculations have been made on the basis of existing engine power/wing area ratios to show that sufficient heating can be obtained for ice protection on modern transportation airplanes, provided that uniform distribution of the heat can be secured.
Capacity Building and Sustainment: Focusing on the End-State for Homeland Security
2007-03-01
Basic Writings of John Stuart Mill : On Liberty, The Subjection of Women & Utilitarianism (New York: The Modern Library, 2002), 234. 297 Council on...Writings of John Stuart Mill : On Liberty, The Subjection of Women & Utilitarianism . New York: The Modern Library, 2002. Palmer, Robert R., Bell I...and the basis for capacity development. Prioritizing development needs 296 John Stuart Mill , The
ERIC Educational Resources Information Center
Kennedy, Mike
2003-01-01
Offers ten suggestions for schools and universities to maximize their budgets: energy upgrades, security technology, maintenance management systems, partnerships, modernized washrooms, windows, facilities assessment, outsourcing, alternative fuels, and building commissioning. (EV)
Diagnosing water security in the rural North with an environmental security framework.
Penn, Henry J F; Loring, Philip A; Schnabel, William E
2017-09-01
This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.
A Survey of Image Encryption Algorithms
NASA Astrophysics Data System (ADS)
Kumari, Manju; Gupta, Shailender; Sardana, Pranshul
2017-12-01
Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature.
SuperIdentity: Fusion of Identity across Real and Cyber Domains
DOE Office of Scientific and Technical Information (OSTI.GOV)
Black, Sue; Creese, Sadie; Guest, Richard
Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factorsmore » being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.« less
Performance of device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Cao, Zhu; Zhao, Qi; Ma, Xiongfeng
2016-07-01
Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .
17 CFR 242.101 - Activities by distribution participants.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Activities by distribution participants. 242.101 Section 242.101 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES...
Maritime Cyber Security University Research
2016-05-01
traffic so vital to the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously...Abstract (MAXIMUM 200 WORDS) Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping...integrity of the entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime
Maritime Cyber Security University Research: Phase 1
2016-05-01
the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously examined. System...Report: Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping traffic so vital to...entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime infrastructure. 17. Key
All Possible Wars? Toward a Consensus View of the Future Security Environment, 2001-2025
2000-01-01
technology that the truly unanticipated seems to be crowded out. Predictions from “our future as post-modern cyborgs ” to “the future of God,” would...Hables Grey, “Our Future as Post-Modern Cyborgs ,” in Didsbury, 20–40, and Robert B. Mellert, “The Future of God,” in Didsbury, 76–82. 305 See discussion in
2007-07-01
deployed several police-type assistance missions. The UN’s Food and Agriculture Organization (FAO), has, in the broadest of senses, a "security" mandate...inasmuch as food shortages in the world ineluctably are a direct cause of insecurity, which, in turn, is likely to require response by "security... safety impacts of shipping on coastal states 5. Yale University Press (1962) 57 6.3 Modern challenges preventing achievement of desired end states * Flag
Undetectable Firearms Modernization Act
Rep. Israel, Steve [D-NY-3
2013-04-10
House - 04/30/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 11 2011-01-01 2011-01-01 false Refinancing of existing secured debt-distribution and power supply borrowers. 1717.857 Section 1717.857 Agriculture Regulations of the Department of... Private Financing § 1717.857 Refinancing of existing secured debt—distribution and power supply borrowers...
Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program
2012-12-01
distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure
Secure multi-party communication with quantum key distribution managed by trusted authority
Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen
2013-07-09
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Secure multi-party communication with quantum key distribution managed by trusted authority
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
2015-01-06
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Modernizing confidence-building measures for the Biological Weapons Convention.
Koblentz, Gregory D; Chevrier, Marie Isabelle
2011-09-01
The Seventh Review Conference of the Biological Weapons Convention in December 2011 provides an opportunity to modernize the treaty to better address the challenges of the 21st century. The key to this modernization is to redesign the treaty's Confidence-Building Measures (CBMs), the only formal mechanism for increasing transparency and demonstrating compliance with the treaty, to address changes in the global scientific, health, and security environments since the end of the Cold War. The scope of the CBMs should be expanded beyond state-run biological warfare programs to encompass a broader array of threats to global security, such as biological terrorism, laboratory accidents, dual-use research, and disease pandemics. Modernizing the CBM mechanism to take into account these new risks would extend the transparency-enhancing benefits of CBMs to a range of new and important topics, such as biosafety, laboratory biosecurity, and dual-use research oversight; make the CBMs and the treaty itself more relevant to the concerns and priorities of more states; and build on progress made during the recent series of intersessional meetings. To accomplish this, the CBMs need to be revised to shift their focus from hardware, the dual-use capabilities relevant to the treaty, to software, the political and legal institutions that govern the development and use of these capabilities. A more modern CBM mechanism should encourage greater participation in the confidence-building process, improve international cooperation against the full spectrum of biological risks, and promote the goal of universal membership in the treaty.
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations.
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is “frankencerts,” synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired—a low-risk, often ignored error—but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations. PMID:25404868
FISA Transparency and Modernization Act
Rep. Rogers, Mike J. [R-MI-8
2014-03-25
House - 04/16/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Randomness determines practical security of BB84 quantum key distribution.
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-10
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Randomness determines practical security of BB84 quantum key distribution
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-01-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359
Randomness determines practical security of BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
A layered trust information security architecture.
de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon
2014-12-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.
Security for Multimedia Space Data Distribution over the Internet
NASA Technical Reports Server (NTRS)
Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)
1995-01-01
Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.
Secure multi-party communication with quantum key distribution managed by trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less
Modern methods of surveyor observations in opencast mining under complex hydrogeological conditions.
NASA Astrophysics Data System (ADS)
Usoltseva, L. A.; Lushpei, V. P.; Mursin, VA
2017-10-01
The article considers the possibility of linking the modern methods of surveying security of open mining works to improve industrial safety in the Primorsky Territory, as well as their use in the educational process. Industrial Safety in the management of Surface Mining depends largely on the applied assessment methods and methods of stability of pit walls and slopes of dumps in the complex mining and hydro-geological conditions.
China’s Strategic Modernization: Implications for the United States,
1999-09-01
20. See for example, Wang Qingsong, Xiandai Junyong Gaojishu (Modern Military-Use High Technology), Beijing : AMS Press, 1993, pp. 251-254; Li , pp... Beijing : Jincheng Publishing House, 1996, pp. 148-164. Also see Cai 75 Delu and Li Ruifeng, "Electronic Security Technologies and Standards," Zhongguo...CAMA, 1996, Vol. 3, No. 6. Yang is from the Beijing Institute of Special Electromachinery ( Beijing Teshu Jidian Yanjiusuo). 66. Huang Tung, " M
Trade-Off or Convergence? The Role of Food Security in the Evolution of Food Discourse in Italy
ERIC Educational Resources Information Center
Brunori, Gianluca; Malandrin, Vanessa; Rossi, Adanella
2013-01-01
In this paper we analyse the role that "food security" has played in the evolution of the food discourse in Italy, a country with a strong and internationally recognized food culture. We identify three phases of this evolution: in the first phase, from the end of the Second World War to the end of the 1980s, the "modernization"…
Tadesse, T.; Haile, M.; Senay, G.; Wardlow, B.D.; Knutson, C.L.
2008-01-01
Reducing the impact of drought and famine remains a challenge in sub-Saharan Africa despite ongoing drought relief assistance in recent decades. This is because drought and famine are primarily addressed through a crisis management approach when a disaster occurs, rather than stressing preparedness and risk management. Moreover, drought planning and food security efforts have been hampered by a lack of integrated drought monitoring tools, inadequate early warning systems (EWS), and insufficient information flow within and between levels of government in many sub-Saharan countries. The integration of existing drought monitoring tools for sub-Saharan Africa is essential for improving food security systems to reduce the impacts of drought and famine on society in this region. A proactive approach emphasizing integration requires the collective use of multiple tools, which can be used to detect trends in food availability and provide early indicators at local, national, and regional scales on the likely occurrence of food crises. In addition, improving the ability to monitor and disseminate critical drought-related information using available modern technologies (e.g., satellites, computers, and modern communication techniques) may help trigger timely and appropriate preventive responses and, ultimately, contribute to food security and sustainable development in sub-Saharan Africa. ?? 2008 United Nations.
Cascade-based attacks on complex networks
NASA Astrophysics Data System (ADS)
Motter, Adilson E.; Lai, Ying-Cheng
2002-12-01
We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.
GPRA Modernization Act of 2010
Sen. Carper, Thomas R. [D-DE
2010-09-28
Senate - 09/28/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Urban Area Security Initiative Modernization Act of 2011
Rep. Stivers, Steve [R-OH-15
2011-12-16
House - 12/28/2011 Referred to the Subcommittee on Emergency Preparedness, Response and Communications. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Vehicle registration compliance in Wisconsin : [summary].
DOT National Transportation Integrated Search
2015-03-01
The Wisconsin Department of Transportation (WisDOT) conducted an investigation : to improve its passenger vehicle registration processes, with the goals to modernize : techniques, reduce costs, enhance security and maximize compliance. WisDOTs : D...
Cloud based emergency health care information service in India.
Karthikeyan, N; Sukanesh, R
2012-12-01
A hospital is a health care organization providing patient treatment by expert physicians, surgeons and equipments. A report from a health care accreditation group says that miscommunication between patients and health care providers is the reason for the gap in providing emergency medical care to people in need. In developing countries, illiteracy is the major key root for deaths resulting from uncertain diseases constituting a serious public health problem. Mentally affected, differently abled and unconscious patients can't communicate about their medical history to the medical practitioners. Also, Medical practitioners can't edit or view DICOM images instantly. Our aim is to provide palm vein pattern recognition based medical record retrieval system, using cloud computing for the above mentioned people. Distributed computing technology is coming in the new forms as Grid computing and Cloud computing. These new forms are assured to bring Information Technology (IT) as a service. In this paper, we have described how these new forms of distributed computing will be helpful for modern health care industries. Cloud Computing is germinating its benefit to industrial sectors especially in medical scenarios. In Cloud Computing, IT-related capabilities and resources are provided as services, via the distributed computing on-demand. This paper is concerned with sprouting software as a service (SaaS) by means of Cloud computing with an aim to bring emergency health care sector in an umbrella with physical secured patient records. In framing the emergency healthcare treatment, the crucial thing considered necessary to decide about patients is their previous health conduct records. Thus a ubiquitous access to appropriate records is essential. Palm vein pattern recognition promises a secured patient record access. Likewise our paper reveals an efficient means to view, edit or transfer the DICOM images instantly which was a challenging task for medical practitioners in the past years. We have developed two services for health care. 1. Cloud based Palm vein recognition system 2. Distributed Medical image processing tools for medical practitioners.
Indicators of economic security of the region: a risk-based approach to assessing and rating
NASA Astrophysics Data System (ADS)
Karanina, Elena; Loginov, Dmitri
2017-10-01
The article presents the results of research of theoretical and methodical problems of strategy development for economic security of a particular region, justified by the composition of risk factors. The analysis of those risk factors is performed. The threshold values of indicators of economic security of regions were determined using the methods of socioeconomic statistics. The authors concluded that in modern Russian conditions it is necessary to pay great attention to the analysis of the composition and level of indicators of economic security of the region and, based on the materials of this analysis, to formulate more accurate decisions concerning the strategy of socio-economic development.
Distributed intrusion detection system based on grid security model
NASA Astrophysics Data System (ADS)
Su, Jie; Liu, Yahui
2008-03-01
Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.
Security of Distributed-Phase-Reference Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Moroder, Tobias; Curty, Marcos; Lim, Charles Ci Wen; Thinh, Le Phuc; Zbinden, Hugo; Gisin, Nicolas
2012-12-01
Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.
17 CFR 230.144 - Persons deemed not to be engaged in a distribution and therefore not underwriters.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Persons deemed not to be engaged in a distribution and therefore not underwriters. 230.144 Section 230.144 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General...
Software To Secure Distributed Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines
Acquire: an open-source comprehensive cancer biobanking system.
Dowst, Heidi; Pew, Benjamin; Watkins, Chris; McOwiti, Apollo; Barney, Jonathan; Qu, Shijing; Becnel, Lauren B
2015-05-15
The probability of effective treatment of cancer with a targeted therapeutic can be improved for patients with defined genotypes containing actionable mutations. To this end, many human cancer biobanks are integrating more tightly with genomic sequencing facilities and with those creating and maintaining patient-derived xenografts (PDX) and cell lines to provide renewable resources for translational research. To support the complex data management needs and workflows of several such biobanks, we developed Acquire. It is a robust, secure, web-based, database-backed open-source system that supports all major needs of a modern cancer biobank. Its modules allow for i) up-to-the-minute 'scoreboard' and graphical reporting of collections; ii) end user roles and permissions; iii) specimen inventory through caTissue Suite; iv) shipping forms for distribution of specimens to pathology, genomic analysis and PDX/cell line creation facilities; v) robust ad hoc querying; vi) molecular and cellular quality control metrics to track specimens' progress and quality; vii) public researcher request; viii) resource allocation committee distribution request review and oversight and ix) linkage to available derivatives of specimen. © The Author 2015. Published by Oxford University Press.
Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis
NASA Astrophysics Data System (ADS)
Mesjasz, Czeslaw
The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.
Criminal Code Modernization and Simplification Act of 2013
Rep. Sensenbrenner, F. James, Jr. [R-WI-5
2013-05-07
House - 06/20/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Secure distribution for high resolution remote sensing images
NASA Astrophysics Data System (ADS)
Liu, Jin; Sun, Jing; Xu, Zheng Q.
2010-09-01
The use of remote sensing images collected by space platforms is becoming more and more widespread. The increasing value of space data and its use in critical scenarios call for adoption of proper security measures to protect these data against unauthorized access and fraudulent use. In this paper, based on the characteristics of remote sensing image data and application requirements on secure distribution, a secure distribution method is proposed, including users and regions classification, hierarchical control and keys generation, and multi-level encryption based on regions. The combination of the three parts can make that the same remote sensing images after multi-level encryption processing are distributed to different permission users through multicast, but different permission users can obtain different degree information after decryption through their own decryption keys. It well meets user access control and security needs in the process of high resolution remote sensing image distribution. The experimental results prove the effectiveness of the proposed method which is suitable for practical use in the secure transmission of remote sensing images including confidential information over internet.
Distributed generation of shared RSA keys in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Liu, Yi-Liang; Huang, Qin; Shen, Ying
2005-12-01
Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.
Study on the early warning mechanism for the security of blast furnace hearths
NASA Astrophysics Data System (ADS)
Zhao, Hong-bo; Huo, Shou-feng; Cheng, Shu-sen
2013-04-01
The campaign life of blast furnace (BF) hearths has become the limiting factor for safety and high efficiency production of modern BFs. However, the early warning mechanism of hearth security has not been clear. In this article, based on heat transfer calculations, heat flux and erosion monitoring, the features of heat flux and erosion were analyzed and compared among different types of hearths. The primary detecting elements, mathematical models, evaluating standards, and warning methods were discussed. A novel early warning mechanism with the three-level quantificational standards was proposed for BF hearth security.
Zhao, Zhenguo; Shi, Wenbo
2014-01-01
Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.
Wang, Yue-Wen
2009-01-01
The food security issue was addressed by the development of "modern agriculture" in the last century. But food safety issues and environment degradation were the consequences suffered as a result. Climate change has been recognized as the result of release of stored energy in fossil fuel into the atmosphere. Homogeneous crop varieties, machinery, pesticides and fertilizers are the foundation of uniform commodities in modern agriculture. Fossil fuels are used to manufacture fertilizers and pesticides as well as the energy source for agricultural machinery, thus characterizes modern agriculture. Bio-fuel production and the possibility of the agriculture system as a form of energy input are discussed.
Border Security, Economic Opportunity, and Immigration Modernization Act
Rep. Garcia, Joe [D-FL-26
2013-10-02
House - 03/26/2014 Motion to Discharge Committee filed by Mr. Garcia. Petition No: 113-9. (All Actions) Notes: On 3/26/2014, a motion was filed to discharge the Committees on the Judiciary, Foreign Affairs, Homeland Security, Ways and Means, Armed Services, Natural Resources, Agriculture, Education and the Workforce, Energy and Commerce, Oversight and Government Reform, the Budget, Science... Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
1989-10-27
a divided Europe became one-sided, and we severed our ties with the advanced world. As a strategy of modernization, socialism from then on was...earn their living in peace, and ensure a secure future for their children. We want to provide greater social security, with special attention to the...meantime, we call the legal community’s attention to further attempts related to NEXT 2000, and to local NEXT 2000 affairs in progress. "Precisely
Role of U.S. Security Assistance in Modernizing the Portuguese Armed Forces: A Historical Analysis.
1986-09-01
Portuguese Air Force Fiscal Year 1986 IMET/FMS Training Program Security Assistance Management Manual * "Portuguese Navy: A Naval Fleet that is...of the techniques of fiscal management and, within the limits that he had set for the regime, his program of economic recovery succeeded .... What...1984). Currency: Escudo * Agriculture: generally developed; 8.8,% of GDP; main crops - grains, potatoes, olives, grapes (wine); deficit foods - sugar
Modernization of the Cassini Ground System
NASA Technical Reports Server (NTRS)
Razo, Gus; Fujii, Tammy J.
2014-01-01
The Cassini Spacecraft and its ground system have been operational for over 16 years. Modernization presents several challenges due to the personnel, processes, and tools already invested and embedded into the current ground system structure. Every mission's ground system has its own unique complexities and challenges, involving various organizational units. As any mission from its inception to its execution, schedules are always tight. This forces GDS engineers to implement a working ground system that is not necessarily fully optimized. Ground system challenges increase as technology evolves and cyber threats become more sophisticated. Cassini's main challenges were due to its ground system existing before many security requirements were levied on the multi-mission tools and networks. This caused a domino effect on Cassini GDS tools that relied on outdated technological features. In the aerospace industry reliable and established technology is preferred over innovative yet less proven technology. Loss of data for a spacecraft mission can be catastrophic; therefore, there is a reluctance to make changes and updates to the ground system. Nevertheless, all missions and associated teams face the need to modernize their processes and tools. Systems development methods from well-known system analysis and design principles can be applied to many missions' ground systems. Modernization should always be considered, but should be done in such a way that it does not affect flexibility nor interfere with established practices. Cassini has accomplished a secure and efficient ground data system through periodic updates. The obstacles faced while performing the modernization of the Cassini ground system will be outlined, as well as the advantages and challenges that were encountered.
A New Approach to Understanding Information Assurance
NASA Astrophysics Data System (ADS)
Blyth, Andrew; Williams, Colin; Bryant, Ian; Mattinson, Harvey
The growth of technologies such as ubiquitous and the mobile computing has resulted in the need for a rethinking of the security paradigm. Over the past forty years technology has made fast steps forward, yet most organisations still view security in terms of Confidentiality, Integrity and Availability (CIA). This model of security has expanded to include Non-Repudiation and Authentication. However this thinking fails to address the social, ethical and business requirements that the modern use of computing has generated. Today computing devices are integrated into every facet of business with the result that security technologies have struggled to keep pace with the rate of change. In this paper we will argue that the currently view that most organisations/stakeholders have of security is out-of-date, or in some cases wrong, and that the new view of security needs to be rooted in business impact and business function.
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Integrating security in a group oriented distributed system
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth; Gong, LI
1992-01-01
A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Jianhui
2015-09-01
Grid modernization is transforming the operation and management of electric distribution systems from manual, paper-driven business processes to electronic, computer-assisted decisionmaking. At the center of this business transformation is the distribution management system (DMS), which provides a foundation from which optimal levels of performance can be achieved in an increasingly complex business and operating environment. Electric distribution utilities are facing many new challenges that are dramatically increasing the complexity of operating and managing the electric distribution system: growing customer expectations for service reliability and power quality, pressure to achieve better efficiency and utilization of existing distribution system assets, and reductionmore » of greenhouse gas emissions by accommodating high penetration levels of distributed generating resources powered by renewable energy sources (wind, solar, etc.). Recent “storm of the century” events in the northeastern United States and the lengthy power outages and customer hardships that followed have greatly elevated the need to make power delivery systems more resilient to major storm events and to provide a more effective electric utility response during such regional power grid emergencies. Despite these newly emerging challenges for electric distribution system operators, only a small percentage of electric utilities have actually implemented a DMS. This paper discusses reasons why a DMS is needed and why the DMS may emerge as a mission-critical system that will soon be considered essential as electric utilities roll out their grid modernization strategies.« less
Conflict Containment in the Balkans: Testing Extended Deterrence.
1995-03-01
STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited. 13. ABSTRACT This thesis critically analyzes a prominent theoretical...Containment 15. NUMBER OF in the Balkans; Deterrence; Coercive Diplomacy; Balance of Forces. PAGES: 161 16. PRICE CODE 17. SECURITY CLASSIFI- 18. SECURITY...Department of National Security Affai sAccesion For NTIS CRA&I DTtC TAB Unannounced Justifca ........... By- Distribution Availability Codes Avail and/or Dist
Code of Federal Regulations, 2011 CFR
2011-04-01
... of research reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity... ACT OF 1933 General § 230.139 Publications or distributions of research reports by brokers or dealers... section, a broker's or dealer's publication or distribution of a research report about an issuer or any of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... of research reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity... ACT OF 1933 General § 230.139 Publications or distributions of research reports by brokers or dealers... section, a broker's or dealer's publication or distribution of a research report about an issuer or any of...
The application of algorithm in taxi security system
NASA Astrophysics Data System (ADS)
Luo, Chengyu
2017-08-01
With the booming of the society and economy today, Taxis and private cars have gradually become one of the most popular tools in transportation for their low price and convenience. However, because of the breakdown in the security system, a few accidents occurred due to the illegal taxi. The unreliable security management has attributed to the lack of trust in taxi companies and relevant regulatory authorities, which considered to be the reason why people are worried about it. Accordingly, we put forward a design for a taxi security system, making use of modern technology such as NFC, iBeacon, GPS combined with algorithms, automatically recognize the taxi we take, and reflecting basic information of taxi and driver on our mobile phone.
A Layered Trust Information Security Architecture
de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon
2014-01-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Towards a National Space Weather Predictive Capability
NASA Astrophysics Data System (ADS)
Fox, N. J.; Lindstrom, K. L.; Ryschkewitsch, M. G.; Anderson, B. J.; Gjerloev, J. W.; Merkin, V. G.; Kelly, M. A.; Miller, E. S.; Sitnov, M. I.; Ukhorskiy, A. Y.; Erlandson, R. E.; Barnes, R. J.; Paxton, L. J.; Sotirelis, T.; Stephens, G.; Comberiate, J.
2014-12-01
National needs in the area of space weather informational and predictive tools are growing rapidly. Adverse conditions in the space environment can cause disruption of satellite operations, communications, navigation, and electric power distribution grids, leading to a variety of socio-economic losses and impacts on our security. Future space exploration and most modern human endeavors will require major advances in physical understanding and improved transition of space research to operations. At present, only a small fraction of the latest research and development results from NASA, NOAA, NSF and DoD investments are being used to improve space weather forecasting and to develop operational tools. The power of modern research and space weather model development needs to be better utilized to enable comprehensive, timely, and accurate operational space weather tools. The mere production of space weather information is not sufficient to address the needs of those who are affected by space weather. A coordinated effort is required to support research-to-applications transition efforts and to develop the tools required those who rely on this information. In this presentation we will review datasets, tools and models that have resulted from research by scientists at JHU/APL, and examine how they could be applied to support space weather applications in coordination with other community assets and capabilities.
Towards Integrating Distributed Energy Resources and Storage Devices in Smart Grid.
Xu, Guobin; Yu, Wei; Griffith, David; Golmie, Nada; Moulema, Paul
2017-02-01
Internet of Things (IoT) provides a generic infrastructure for different applications to integrate information communication techniques with physical components to achieve automatic data collection, transmission, exchange, and computation. The smart grid, as one of typical applications supported by IoT, denoted as a re-engineering and a modernization of the traditional power grid, aims to provide reliable, secure, and efficient energy transmission and distribution to consumers. How to effectively integrate distributed (renewable) energy resources and storage devices to satisfy the energy service requirements of users, while minimizing the power generation and transmission cost, remains a highly pressing challenge in the smart grid. To address this challenge and assess the effectiveness of integrating distributed energy resources and storage devices, in this paper we develop a theoretical framework to model and analyze three types of power grid systems: the power grid with only bulk energy generators, the power grid with distributed energy resources, and the power grid with both distributed energy resources and storage devices. Based on the metrics of the power cumulative cost and the service reliability to users, we formally model and analyze the impact of integrating distributed energy resources and storage devices in the power grid. We also use the concept of network calculus, which has been traditionally used for carrying out traffic engineering in computer networks, to derive the bounds of both power supply and user demand to achieve a high service reliability to users. Through an extensive performance evaluation, our data shows that integrating distributed energy resources conjointly with energy storage devices can reduce generation costs, smooth the curve of bulk power generation over time, reduce bulk power generation and power distribution losses, and provide a sustainable service reliability to users in the power grid.
Towards Integrating Distributed Energy Resources and Storage Devices in Smart Grid
Xu, Guobin; Yu, Wei; Griffith, David; Golmie, Nada; Moulema, Paul
2017-01-01
Internet of Things (IoT) provides a generic infrastructure for different applications to integrate information communication techniques with physical components to achieve automatic data collection, transmission, exchange, and computation. The smart grid, as one of typical applications supported by IoT, denoted as a re-engineering and a modernization of the traditional power grid, aims to provide reliable, secure, and efficient energy transmission and distribution to consumers. How to effectively integrate distributed (renewable) energy resources and storage devices to satisfy the energy service requirements of users, while minimizing the power generation and transmission cost, remains a highly pressing challenge in the smart grid. To address this challenge and assess the effectiveness of integrating distributed energy resources and storage devices, in this paper we develop a theoretical framework to model and analyze three types of power grid systems: the power grid with only bulk energy generators, the power grid with distributed energy resources, and the power grid with both distributed energy resources and storage devices. Based on the metrics of the power cumulative cost and the service reliability to users, we formally model and analyze the impact of integrating distributed energy resources and storage devices in the power grid. We also use the concept of network calculus, which has been traditionally used for carrying out traffic engineering in computer networks, to derive the bounds of both power supply and user demand to achieve a high service reliability to users. Through an extensive performance evaluation, our data shows that integrating distributed energy resources conjointly with energy storage devices can reduce generation costs, smooth the curve of bulk power generation over time, reduce bulk power generation and power distribution losses, and provide a sustainable service reliability to users in the power grid1. PMID:29354654
Finite-key analysis for measurement-device-independent quantum key distribution.
Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong
2014-04-29
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.
NASA Astrophysics Data System (ADS)
Areeda, J. S.; Smith, J. R.; Lundgren, A. P.; Maros, E.; Macleod, D. M.; Zweizig, J.
2017-01-01
Gravitational-wave observatories around the world, including the Laser Interferometer Gravitational-Wave Observatory (LIGO), record a large volume of gravitational-wave output data and auxiliary data about the instruments and their environments. These data are stored at the observatory sites and distributed to computing clusters for data analysis. LigoDV-web is a web-based data viewer that provides access to data recorded at the LIGO Hanford, LIGO Livingston and GEO600 observatories, and the 40 m prototype interferometer at Caltech. The challenge addressed by this project is to provide meaningful visualizations of small data sets to anyone in the collaboration in a fast, secure and reliable manner with minimal software, hardware and training required of the end users. LigoDV-web is implemented as a Java Enterprise Application, with Shibboleth Single Sign On for authentication and authorization, and a proprietary network protocol used for data access on the back end. Collaboration members with proper credentials can request data be displayed in any of several general formats from any Internet appliance that supports a modern browser with Javascript and minimal HTML5 support, including personal computers, smartphones, and tablets. Since its inception in 2012, 634 unique users have visited the LigoDV-web website in a total of 33 , 861 sessions and generated a total of 139 , 875 plots. This infrastructure has been helpful in many analyses within the collaboration including follow-up of the data surrounding the first gravitational-wave events observed by LIGO in 2015.
Privacy Act Modernization for the Information Age Act of 2011
Sen. Akaka, Daniel K. [D-HI
2011-10-18
Senate - 10/18/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Integrated Public Alert and Warning System Modernization Act of 2012
Sen. Collins, Susan M. [R-ME
2012-04-19
Senate - 04/19/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register Modernization Act
Rep. Issa, Darrell E. [R-CA-49
2014-03-11
Senate - 07/15/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Integrated Public Alert and Warning System Modernization Act of 2014
Sen. Begich, Mark [D-AK
2014-07-24
Senate - 07/24/2014 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
6. September 1971 DETAIL VIEW OF CHAIN PADLOCK AND KEY ...
6. September 1971 DETAIL VIEW OF CHAIN PADLOCK AND KEY TO SECURE DOOR TO MAIN CELL BLOCK, NOTE STANDARD MODERN PADLOCK FOR SIZE COMPARISON - Jefferson County Jail & Sheriff's Office, Courthouse Square, Madison, Jefferson County, IN
Modern U.S. Civil - Military Relations: Wielding the Terrible Swift Sword
1997-07-01
M ¢ X AIE X ~ , £ P ~ X ’ - " 5 7 , f" )dern U.S 2ivil - Mili tary Relations : Wie ld ing the Terr ible Swift Sword David E. Johnson...JUL 1997 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Modern U.S. Civil - Military Relations : Wielding the Terrible Swift...1995, Secretary of Defense Will iam I. Perry testified before the House International Relations and National Security committees on the commitment of
How can the West Better Assist Partner Nations in Establishing Internal Security
2017-03-31
Force: The Art of War in the Modern World (London: Penguin Books, 2005), 5-6; Herfried Münkler, The New Wars, trans. Patrick Camiller (Cambridge...role. The organizations will not be special forces as understood as elite units, the 48 distillation of martial spirit, but forces which are...keeping,” (June 27, 1992) http://www.un- documents.net/a47-277.htm Smith, Rupert. The Utility of Force: The Art of War in the Modern World. London
New security infrastructure model for distributed computing systems
NASA Astrophysics Data System (ADS)
Dubenskaya, J.; Kryukov, A.; Demichev, A.; Prikhodko, N.
2016-02-01
At the paper we propose a new approach to setting up a user-friendly and yet secure authentication and authorization procedure in a distributed computing system. The security concept of the most heterogeneous distributed computing systems is based on the public key infrastructure along with proxy certificates which are used for rights delegation. In practice a contradiction between the limited lifetime of the proxy certificates and the unpredictable time of the request processing is a big issue for the end users of the system. We propose to use unlimited in time hashes which are individual for each request instead of proxy certificate. Our approach allows to avoid using of the proxy certificates. Thus the security infrastructure of distributed computing system becomes easier for development, support and use.
NASA Astrophysics Data System (ADS)
Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov
2018-03-01
The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.
Cloud Based Electronic Health Record Applications are Essential to Expeditionary Patient Care
2017-05-01
security46 and privacy concerns47). Privacy/Security Risks of Cloud Computing A quantitative study based on the preceding literature review...to medical IT wherever there is a Wi-Fi connection and a computing device (desktop, laptop , tablet, phone, etc.). In 2015 the DoD launched MiCare, a...Hosting Services: a Study on Students’ Acceptance,” Computers in Human Behavior, 2013. Takai, Teri. DoD CIO’s 10-Point Plan for IT Modernization
[Accesibility and effectivity in Mexico].
García-Peña, Carmen; González-González, César
2011-01-01
This is an analysis of two of the dimensions of a health system: accessibility and effectiveness, taking account the objectives of a health system (improving the health of the population, provide appropriate treatment for users of health services and ensure financial security for health) cannot be achieved exclusively by a well-functioning health system and the provision of medical services, being that the health status is explained by many factors and social determinants that deal with the conditions of people and their health behaviors and the level of individual co-responsibility. Despite the advances in the Mexican health system which has greatly improved the health conditions of the population, there is a lag in investment in health, with the major investment challenges as such, coordination between all levels, distribution of human, technological and financial resources, the autonomy of professional practice, the innovation of attention schemes, and modernization of trade unions.
Smart Grid Status and Metrics Report Appendices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Balducci, Patrick J.; Antonopoulos, Chrissi A.; Clements, Samuel L.
A smart grid uses digital power control and communication technology to improve the reliability, security, flexibility, and efficiency of the electric system, from large generation through the delivery systems to electricity consumers and a growing number of distributed generation and storage resources. To convey progress made in achieving the vision of a smart grid, this report uses a set of six characteristics derived from the National Energy Technology Laboratory Modern Grid Strategy. The Smart Grid Status and Metrics Report defines and examines 21 metrics that collectively provide insight into the grid’s capacity to embody these characteristics. This appendix presents papersmore » covering each of the 21 metrics identified in Section 2.1 of the Smart Grid Status and Metrics Report. These metric papers were prepared in advance of the main body of the report and collectively form its informational backbone.« less
Zhao, Zhenguo; Shi, Wenbo
2014-01-01
Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications. PMID:25025083
Introduction: Cybersecurity and Software Assurance Minitrack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burns, Luanne; George, Richard; Linger, Richard C
Modern society is dependent on software systems of remarkable scope and complexity. Yet methods for assuring their security and functionality have not kept pace. The result is persistent compromises and failures despite best efforts. Cybersecurity methods must work together for situational awareness, attack prevention and detection, threat attribution, minimization of consequences, and attack recovery. Because defective software cannot be secure, assurance technologies must play a central role in cybersecurity approaches. There is increasing recognition of the need for rigorous methods for cybersecurity and software assurance. The goal of this minitrack is to develop science foundations, technologies, and practices that canmore » improve the security and dependability of complex systems.« less
The evolution of transmission security functions in modern military wideband radios
NASA Astrophysics Data System (ADS)
Matyszkiel, R.; Kaniewski, P.; Kustra, M.; Jach, J.
2017-04-01
Rapid development of advanced military command and control systems results in a dynamic growth in demand for data rate. One of the methods that make it possible to deal with the problem of limited capacity of military wireless systems is the use of broadband radios. Another one is the increase in the capacity of narrowband radios by implementing advanced modulation systems. Apart from remarkable benefits, such as the increase in system bit rate, there are also certain limitations since such radios are more sensitive to radio-electronic countermeasures, and the operation in the broad band makes it easier for the enemy to detect the radio emission. In such a situation, it is essential to define again and implement the transmission security functions into modern radios consistently. In this article, some current NATO activities are discussed, regarding the definitions of transmission security functions and the way of implementing them in radios, while paying special attention to a new element, that is to AIE radio cryptography (On Air Encryption). In the paper, the authors present an exemplary implementation of the functions in the Cognitive Radio Demonstrator using R-450C radio, the results of the examinations as well as the conclusions.
Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.
2016-01-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566
Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M
2016-07-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-29
... Lottery Services, Inc., Sino-Bon Entertainment, Inc., Tamir Biotechnology, Inc., and Techmedia Advertising... concerning the securities of Techmedia Advertising, Inc. because it has not filed any periodic reports since...
Cybersecurity for a Modern Grid - Video Text Version | Energy Systems
got the facilities and the capability, and the people that really understand where the grid is evolving. I think many people are focused on securing today's grid...we're gonna be focused on
Federal Workers' Compensation Modernization and Improvement Act
Rep. Kline, John [R-MN-2
2011-07-08
Senate - 11/30/2011 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2011 CFR
2011-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2014 CFR
2014-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2013 CFR
2013-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2012 CFR
2012-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Distribution of information...
2017-12-01
poses a threat to regional security and economic stability—major U.S. national interests. Distributed maritime capability is demonstrated by applying...regional security, economic stability, fisheries enforcement 15. NUMBER OF PAGES 95 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...a dominant aggressor in the South China Sea that poses a threat to regional security and economic stability—major U.S. national interests
Unconditional security of quantum key distribution over arbitrarily long distances
Lo; Chau
1999-03-26
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. The proof is reduced from a noisy quantum scheme to a noiseless quantum scheme and then from a noiseless quantum scheme to a noiseless classical scheme, which can then be tackled by classical probability theory.
Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H
2014-03-28
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.
Security of a single-state semi-quantum key distribution protocol
NASA Astrophysics Data System (ADS)
Zhang, Wei; Qiu, Daowen; Mateus, Paulo
2018-06-01
Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.
Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bonior, Jason D; Evans, Philip G; Sheets, Gregory S
2017-01-01
Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.
Technologies for distributed defense
NASA Astrophysics Data System (ADS)
Seiders, Barbara; Rybka, Anthony
2002-07-01
For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.
Bioenergy and African transformation.
Lynd, Lee R; Sow, Mariam; Chimphango, Annie Fa; Cortez, Luis Ab; Brito Cruz, Carlos H; Elmissiry, Mosad; Laser, Mark; Mayaki, Ibrahim A; Moraes, Marcia Afd; Nogueira, Luiz Ah; Wolfaardt, Gideon M; Woods, Jeremy; van Zyl, Willem H
2015-01-01
Among the world's continents, Africa has the highest incidence of food insecurity and poverty and the highest rates of population growth. Yet Africa also has the most arable land, the lowest crop yields, and by far the most plentiful land resources relative to energy demand. It is thus of interest to examine the potential of expanded modern bioenergy production in Africa. Here we consider bioenergy as an enabler for development, and provide an overview of modern bioenergy technologies with a comment on application in an Africa context. Experience with bioenergy in Africa offers evidence of social benefits and also some important lessons. In Brazil, social development, agricultural development and food security, and bioenergy development have been synergistic rather than antagonistic. Realizing similar success in African countries will require clear vision, good governance, and adaptation of technologies, knowledge, and business models to myriad local circumstances. Strategies for integrated production of food crops, livestock, and bioenergy are potentially attractive and offer an alternative to an agricultural model featuring specialized land use. If done thoughtfully, there is considerable evidence that food security and economic development in Africa can be addressed more effectively with modern bioenergy than without it. Modern bioenergy can be an agent of African transformation, with potential social benefits accruing to multiple sectors and extending well beyond energy supply per se. Potential negative impacts also cut across sectors. Thus, institutionally inclusive multi-sector legislative structures will be more effective at maximizing the social benefits of bioenergy compared to institutionally exclusive, single-sector structures.
Comparing particle-size distributions in modern and ancient sand-bed rivers
NASA Astrophysics Data System (ADS)
Hajek, E. A.; Lynds, R. M.; Huzurbazar, S. V.
2011-12-01
Particle-size distributions yield valuable insight into processes controlling sediment supply, transport, and deposition in sedimentary systems. This is especially true in ancient deposits, where effects of changing boundary conditions and autogenic processes may be detected from deposited sediment. In order to improve interpretations in ancient deposits and constrain uncertainty associated with new methods for paleomorphodynamic reconstructions in ancient fluvial systems, we compare particle-size distributions in three active sand-bed rivers in central Nebraska (USA) to grain-size distributions from ancient sandy fluvial deposits. Within the modern rivers studied, particle-size distributions of active-layer, suspended-load, and slackwater deposits show consistent relationships despite some morphological and sediment-supply differences between the rivers. In particular, there is substantial and consistent overlap between bed-material and suspended-load distributions, and the coarsest material found in slackwater deposits is comparable to the coarse fraction of suspended-sediment samples. Proxy bed-load and slackwater-deposit samples from the Kayenta Formation (Lower Jurassic, Utah/Colorado, USA) show overlap similar to that seen in the modern rivers, suggesting that these deposits may be sampled for paleomorphodynamic reconstructions, including paleoslope estimation. We also compare grain-size distributions of channel, floodplain, and proximal-overbank deposits in the Willwood (Paleocene/Eocene, Bighorn Basin, Wyoming, USA), Wasatch (Paleocene/Eocene, Piceance Creek Basin, Colorado, USA), and Ferris (Cretaceous/Paleocene, Hanna Basin, Wyoming, USA) formations. Grain-size characteristics in these deposits reflect how suspended- and bed-load sediment is distributed across the floodplain during channel avulsion events. In order to constrain uncertainty inherent in such estimates, we evaluate uncertainty associated with sample collection, preparation, analytical particle-size analysis, and statistical characterization in both modern and ancient settings. We consider potential error contributions and evaluate the degree to which this uncertainty might be significant in modern sediment-transport studies and ancient paleomorphodynamic reconstructions.
Secret sharing based on quantum Fourier transform
NASA Astrophysics Data System (ADS)
Yang, Wei; Huang, Liusheng; Shi, Runhua; He, Libao
2013-07-01
Secret sharing plays a fundamental role in both secure multi-party computation and modern cryptography. We present a new quantum secret sharing scheme based on quantum Fourier transform. This scheme enjoys the property that each share of a secret is disguised with true randomness, rather than classical pseudorandomness. Moreover, under the only assumption that a top priority for all participants (secret sharers and recovers) is to obtain the right result, our scheme is able to achieve provable security against a computationally unbounded attacker.
Joint the Center for Applied Scientific Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gamblin, Todd; Bremer, Timo; Van Essen, Brian
The Center for Applied Scientific Computing serves as Livermore Lab’s window to the broader computer science, computational physics, applied mathematics, and data science research communities. In collaboration with academic, industrial, and other government laboratory partners, we conduct world-class scientific research and development on problems critical to national security. CASC applies the power of high-performance computing and the efficiency of modern computational methods to the realms of stockpile stewardship, cyber and energy security, and knowledge discovery for intelligence applications.
Research on Influence of Cloud Environment on Traditional Network Security
NASA Astrophysics Data System (ADS)
Ming, Xiaobo; Guo, Jinhua
2018-02-01
Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.
Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jason Wright
Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrainedmore » computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.« less
Technology for low-cost PIR security sensors
NASA Astrophysics Data System (ADS)
Liddiard, Kevin C.
2008-03-01
Current passive infrared (PIR) security sensors employing pyroelectric detectors are simple, cheap and reliable, but have several deficiencies. These sensors, developed two decades ago, are essentially short-range moving-target hotspot detectors. They cannot detect slow temperature changes, and thus are unable to respond to radiation stimuli indicating potential danger such as overheating electrical appliances and developing fires. They have a poor optical resolution and limited ability to recognize detected targets. Modern uncooled thermal infrared technology has vastly superior performance but as yet is too costly to challenge the PIR security sensor market. In this paper microbolometer technology will be discussed which can provide enhanced performance at acceptable cost. In addition to security sensing the technology has numerous applications in the military, industrial and domestic markets where target range is short and low cost is paramount.
A Study of United States Air Force Medical Central Processing and Distribution Systems.
1981-06-01
5 M t2-8 13. IILL .i 2 5 I C. N SECURITY CLASSIFICATION OF THIS PAGE N,. LC, t,7EPORT DOCUMENTATION P AD-A 195 485 o Is. REPORT SECURITY...CLASSIFICATION lb. RlIKILIIV MAKKINib Unc lassif led 2a. SECURITY CLASSIFICATION AUTHORITY 3 DISTRIBUTION /AVAILABILITY OF REPORT Approved for public release...8217b, DECLASSIFICATION I DOWNGRADING SCHEDULE Distribution unlimited 4. PERFORMING ORGANIZATION REPORT NUMBER(S) 5. MONITORING ORGANIZATION REPORT NUMBER
Graphs for information security control in software defined networks
NASA Astrophysics Data System (ADS)
Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.
2017-07-01
Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.
Approximation in Optimal Control and Identification of Large Space Structures.
1985-01-01
I ease I Cr ’. ’. -4 . r*_...1- UN(D aSIFIED SECURITY CLAS.’ICATION OF fHIS P^.GE REPORT DOCUMENTATION PAGE 1 REPORT SECURITY CLASSIFICATION 1...RESTRICTIVE MARKINGS UNCLASSIFIED 2 SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; distribution 2b...NOS. PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. NO Bolling AFB DC 20332-6448 61102F 2304 Al 11. TITLE IlnRCiude Security Claas.ifcation
A Progress Report on Information Privacy and Data Security.
ERIC Educational Resources Information Center
Salton, Gerard
1980-01-01
Describes the role of information privacy in modern society, examines recent legal cases to illustrate how privacy cases are adjudicated and to identify the limits of available privacy protection, and raises issues regarding techniques for insuring data confidentiality. (FM)
Fifty Years of Silent Service: A Peek Inside the CIA Library.
ERIC Educational Resources Information Center
Newlen, Robert R.
1998-01-01
Describes the CIA (Central Intelligence Agency) library. Highlights include security measures, a day in the life of two CIA librarians, sample reference questions, collection development, the Historical Intelligence Collection, the CIA Web site, and library modernization. (JAK)
Notification: Fieldwork Notification Letter to CSB Chairperson Vanessa Allen Sutherland
Project #OA-FY16-0230, August 11, 2016. The EPA OIG plans to begin fieldwork for an audit of the U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Modernization Act of 2014.
IEEE TRANSACTIONS ON CYBERNETICS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig R. RIeger; David H. Scheidt; William D. Smart
2014-11-01
MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures
Assessing staff attitudes towards information security in a European healthcare establishment.
Furnell, S M; Gaunt, P N; Holben, R F; Sanders, P W; Stockel, C T; Warren, M J
1996-01-01
Information security is now recognized as an important consideration in modern healthcare establishments (HCEs), with a variety of guidelines and standards currently available to enable the environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. This paper establishes that the staff culture of the organization is of particular importance in determining the level and types of security that will be accepted. This culture will be based upon staff awareness of and attitudes towards security and it is, therefore, important to have a clear idea of what these attitudes are. To this end, two surveys have been conducted within a reference environment to establish the attitudes of general users and technical staff, allowing the results to be fed back to HCE management to enable security policy to be appropriately defined. These results indicated that, although the establishment had participated in a European healthcare security initiative, staff attitudes and awareness were still weak in some areas.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jim Alves-Foss
2011-08-01
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less
Security of electronic mental health communication and record-keeping in the digital age.
Elhai, Jon D; Frueh, B Christopher
2016-02-01
The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.
17 CFR Appendix B to Part 190 - Special Bankruptcy Distributions
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Special Bankruptcy Distributions B Appendix B to Part 190 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... purposes of this distributional rule, XM accounts will be deemed to be commodity interest accounts and...
Bai, Ming; Jarvis, Karl; Wang, Shu-Yong; Song, Ke-Qing; Wang, Yan-Ping; Wang, Zhi-Liang; Li, Wen-Zhu; Wang, Wei; Yang, Xing-Ke
2010-09-22
Modern grylloblattids are one of the least diverse of the modern insect orders. The thorax changes in morphology might be associated with the changes of the function of the forelegs, wing loss, changes in behavior and adaptation to habitat. As temperature is the main barrier for migration of modern grylloblattids, the range of each species is extremely limited. The potential distribution areas of grylloblattids remain unclear. A second new species of ice crawlers (Insecta: Grylloblattodea), Grylloblattella cheni Bai, Wang et Yang sp. nov., is described from China. The distribution map and key to species of Grylloblattella are given. A comparison of the thorax of extant and extinct Grylloblattodea is presented, with an emphasis on the pronotum using geometric morphometric analysis, which may reflect thorax adaptation and the evolution of Grylloblattodea. Potential global distribution of grylloblattids is inferred. Highly diversified pronota of extinct Grylloblattodea may reflect diverse habitats and niches. The relatively homogeneous pronota of modern grylloblattids might be explained by two hypotheses: synapomorphy or convergent evolution. Most fossils of Grylloblattodea contain an obviously longer meso- and metathorax than prothorax. The length of the meso- and metathorax of modern grylloblattids is normally shorter than the prothorax. This may be associated with the wing loss, which is accompanied by muscle reduction and changes to the thoracic skeleton system. Threats to grylloblattids and several conservation comments are also provided.
76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... Schemes Provide Security''. Distributed data architectures, such as cloud computing, offer very attractive... locating your data in the cloud, and by breaking it up and replicating different segments throughout the...
Field test of quantum key distribution in the Tokyo QKD Network.
Sasaki, M; Fujiwara, M; Ishizuka, H; Klaus, W; Wakui, K; Takeoka, M; Miki, S; Yamashita, T; Wang, Z; Tanaka, A; Yoshino, K; Nambu, Y; Takahashi, S; Tajima, A; Tomita, A; Domeki, T; Hasegawa, T; Sakai, Y; Kobayashi, H; Asai, T; Shimizu, K; Tokura, T; Tsurumaru, T; Matsui, M; Honjo, T; Tamaki, K; Takesue, H; Tokura, Y; Dynes, J F; Dixon, A R; Sharpe, A W; Yuan, Z L; Shields, A J; Uchikoga, S; Legré, M; Robyr, S; Trinkler, P; Monat, L; Page, J-B; Ribordy, G; Poppe, A; Allacher, A; Maurhart, O; Länger, T; Peev, M; Zeilinger, A
2011-05-23
A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to demonstrate the world-first secure TV conferencing over a distance of 45km. The network includes a commercial QKD product for long-term stable operation, and application interface to secure mobile phones. Detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.
NASA Astrophysics Data System (ADS)
Nagel, David J.
2000-11-01
The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
2013-01-01
We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions. PMID:23936164
Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad
2013-01-01
We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.
Sports Venue Security: Public Policy Options for Sear 4-5 Events
2014-06-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited SPORTS VENUE...Thesis 4. TITLE AND SUBTITLE SPORTS VENUE SECURITY: PUBLIC POLICY OPTIONS FOR SEAR 4–5 EVENTS 5. FUNDING NUMBERS 6. AUTHOR(S) James M. Gehring...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Although the United States made considerable advances in improving sport venue security
Security model for picture archiving and communication systems.
Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K
2000-05-01
The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.
ERIC Educational Resources Information Center
Seita, John
2014-01-01
Secure, trusting bonds are essential if young people are to grow, learn, and thrive. But millions of modern youth are disconnected, struggling in overstressed families, depersonalized schools, and violent communities. Those most vulnerable because of maltreatment display behavior that increases their alienation from caring adults. How do adults…
Resurrecting Letters of Marque and Reprisal to Address Modern Threats
2013-03-01
history 4 and economics. Unfortunately, bringing maritime pirates and cyber criminals to justice has proven difficult under current norms of... cyber criminals have cost companies and consumers hundreds of millions of dollars and valuable intellectual property.79 The National Security Strategy
Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks
Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu
2017-01-01
Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users’ medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs’ applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs’ deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models. PMID:28475110
Threat, security and attitude formation among the young
NASA Astrophysics Data System (ADS)
Radin, Furio
1985-12-01
The perception of threat to security on the part of young people reflects a central aspect of the societal phenomenon of attitude formation, whose primary function is, ideally, to meet the need for security. In all modern societies, however, the process of socialization — which by its very nature is educational in that it prepares individuals to function as members of society — operates on the principle of systematically frustrating this need by employing a system of reward and punishment based on competition. This system creates a fundamental insecurity and a corresponding attitude (de)formation in the individual, which is exploited by the state in order to consolidate the power of the dominant groups. Due to this fundamental insecurity, the individual is incapable of coping rationally with threat and seeks pseudo-security, e.g., in conformity. Threat — particularly global threat — is perceived as an external factor over which the individual has no control, i.e., it is perceived as falling exclusively within the province of those in power, whose control is further strengthened by this perception. Since the essential damage to the individual's attitude system has been done by the time he leaves school, this undesirable condition of modern societies can only be rectified by a socialization process in general — and an educational process in particular — which cultivates in the individual the development of critical judgment, free self-realization and the spirit of co-operation instead of competition.
Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu
2017-05-05
Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users' medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs' applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs' deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models.
Code of Federal Regulations, 2013 CFR
2013-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Code of Federal Regulations, 2012 CFR
2012-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Code of Federal Regulations, 2014 CFR
2014-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Institutional Support | Grid Modernization | NREL
the challenges posed by grid modernization. Photo of two people standing in front of a display showing results from a grid study. The demand for objective technical assistance and information on grid related to grid modernization and increasing deployment of distributed energy and renewable resources. As
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Distribution of âRisk... brokers regarding retail forex transactions. 5.5 Section 5.5 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.5 Distribution of “Risk...
Leverrier, Anthony; Grangier, Philippe
2009-05-08
We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.
26 CFR 1.731-2 - Partnership distributions of marketable securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... allocated to Security X under section 732(a) plus $25 gain recognized under section 737). (k) Effective date... the excess, if any, of— (i) The distributee partner's distributive share of the net gain, if any...; over (ii) The distributee partner's distributive share of the net gain, if any, which is attributable...
26 CFR 1.731-2 - Partnership distributions of marketable securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... allocated to Security X under section 732(a) plus $25 gain recognized under section 737). (k) Effective date... the excess, if any, of— (i) The distributee partner's distributive share of the net gain, if any...; over (ii) The distributee partner's distributive share of the net gain, if any, which is attributable...
26 CFR 1.731-2 - Partnership distributions of marketable securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... allocated to Security X under section 732(a) plus $25 gain recognized under section 737). (k) Effective date... the excess, if any, of— (i) The distributee partner's distributive share of the net gain, if any...; over (ii) The distributee partner's distributive share of the net gain, if any, which is attributable...
26 CFR 1.731-2 - Partnership distributions of marketable securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... allocated to Security X under section 732(a) plus $25 gain recognized under section 737). (k) Effective date... the excess, if any, of— (i) The distributee partner's distributive share of the net gain, if any...; over (ii) The distributee partner's distributive share of the net gain, if any, which is attributable...
26 CFR 1.731-2 - Partnership distributions of marketable securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... allocated to Security X under section 732(a) plus $25 gain recognized under section 737). (k) Effective date... the excess, if any, of— (i) The distributee partner's distributive share of the net gain, if any...; over (ii) The distributee partner's distributive share of the net gain, if any, which is attributable...
Application distribution model and related security attacks in VANET
NASA Astrophysics Data System (ADS)
Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian
2013-03-01
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
Network-based reading system for lung cancer screening CT
NASA Astrophysics Data System (ADS)
Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio
2006-03-01
This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-06-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
Scalable Trust of Next-Generation Management (STRONGMAN)
2004-10-01
remote logins might be policy controlled to allow only strongly encrypted IPSec tunnels to log in remotely, to access selected files, etc. The...and Angelos D. Keromytis. Drop-in Security for Distributed and Portable Computing Elements. Emerald Journal of Internet Research. Electronic...Security and Privacy, pp. 17-31, May 1999. [2] S. M. Bellovin. Distributed Firewalls. ; login : magazine, special issue on security, November 1999. [3] M
Study of Software Tools to Support Systems Engineering Management
2015-06-01
Management 15. NUMBER OF PAGES 137 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS...AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) According to a...PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298
Security of medical multimedia.
Tzelepi, S; Pangalos, G; Nikolacopoulou, G
2002-09-01
The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.
Implementing healthcare information security: standards can help.
Orel, Andrej; Bernik, Igor
2013-01-01
Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.
Plant vasculature-mediated signaling involved in early phosphate stress response
USDA-ARS?s Scientific Manuscript database
Depletion of finite global rock phosphate (Pi) reserves will impose major limitations on future agricultural productivity and food security. Hence, modern breeding programs seek to develop Pi-efficient crops with sustainable yields under reduced Pi fertilizer inputs. In this regard, although the lon...
development to improve the nation's electrical grid infrastructure, making it more flexible, reliable Standard, IEEE 1547 Blue cover page of report with hexagon shapes over electric grid Basic Research Needs Controls Power Systems Design and Studies Security and Resilience Institutional Support NREL grid research
Rearchitecting IT: Simplify. Simplify
ERIC Educational Resources Information Center
Panettieri, Joseph C.
2006-01-01
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Secure detection in quantum key distribution by real-time calibration of receiver
NASA Astrophysics Data System (ADS)
Marøy, Øystein; Makarov, Vadim; Skaar, Johannes
2017-12-01
The single-photon detectionefficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits the photon receiver’s imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key generation rate. The estimation is done by testing gated detectors using a randomly activated photon source inside the receiver unit. This estimate gives a secure rate for any detector with non-unity single-photon detection efficiency, both inherit or due to blinding. By adding extra optical components to the receiver, we make sure that the key is extracted from photon states for which our estimate is valid. The result is a quantum key distribution scheme that is secure against any attack that exploits detector imperfections.
High speed and adaptable error correction for megabit/s rate quantum key distribution.
Dixon, A R; Sato, H
2014-12-02
Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.
High speed and adaptable error correction for megabit/s rate quantum key distribution
Dixon, A. R.; Sato, H.
2014-01-01
Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90–94% of the ideal secure key rate over all fibre distances from 0–80 km. PMID:25450416
Cloaking data in optical networks
NASA Astrophysics Data System (ADS)
Klein, Avi; Shahal, Shir; Masri, Gilad; Duadi, Hamootal; Fridman, Moti
2018-01-01
Modern networks implement multi-layer encryption architecture to increase network security, stability, and robustness. We developed a new paradigm for optical encryption based on the strengths of optics over electronics and according to temporal optics principles. We developed a highly efficient all-optical encryption scheme for modern networks. Our temporal encryption scheme exploits the strength of optics over electronics. Specifically, we utilize dispersion together with nonlinear interaction for mixing neighboring bits with a private key. Our system encrypts the entire network traffic without any latency, encrypt the signal itself, exploit only one non- linear interaction, it is energetically efficient with low ecologic footprint, and can be added to current networks without replacing the hardware such as the lasers, the transmitters, the routers, the amplifiers or the receivers. Our method can replace current slow encryption methods or can be added to increase the security of existing systems. In this paper, we elaborate on the theoretical models of the system and how we evaluate the encryption strength with this numerical tools.
Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.
Feng, Zhi; Wen, Guanghui; Hu, Guoqiang
2017-05-01
This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.
ERIC Educational Resources Information Center
Li, Jianyi; Nie, Lanying; Li, Zeyu; Lin, Lijun; Tang, Lei; Ouyang, Jun
2012-01-01
Anatomical corrosion casts of human specimens are useful teaching aids. However, their use is limited due to ethical dilemmas associated with their production, their lack of perfect reproducibility, and their consumption of original specimens in the process of casting. In this study, new approaches with modern distribution of complex anatomical…
Fundamental quantitative security in quantum key generation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yuen, Horace P.
2010-12-15
We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.
Bai, Ming; Jarvis, Karl; Wang, Shu-Yong; Song, Ke-Qing; Wang, Yan-Ping; Wang, Zhi-Liang; Li, Wen-Zhu; Wang, Wei; Yang, Xing-Ke
2010-01-01
Modern grylloblattids are one of the least diverse of the modern insect orders. The thorax changes in morphology might be associated with the changes of the function of the forelegs, wing loss, changes in behavior and adaptation to habitat. As temperature is the main barrier for migration of modern grylloblattids, the range of each species is extremely limited. The potential distribution areas of grylloblattids remain unclear. A second new species of ice crawlers (Insecta: Grylloblattodea), Grylloblattella cheni Bai, Wang et Yang sp. nov., is described from China. The distribution map and key to species of Grylloblattella are given. A comparison of the thorax of extant and extinct Grylloblattodea is presented, with an emphasis on the pronotum using geometric morphometric analysis, which may reflect thorax adaptation and the evolution of Grylloblattodea. Potential global distribution of grylloblattids is inferred. Highly diversified pronota of extinct Grylloblattodea may reflect diverse habitats and niches. The relatively homogeneous pronota of modern grylloblattids might be explained by two hypotheses: synapomorphy or convergent evolution. Most fossils of Grylloblattodea contain an obviously longer meso- and metathorax than prothorax. The length of the meso- and metathorax of modern grylloblattids is normally shorter than the prothorax. This may be associated with the wing loss, which is accompanied by muscle reduction and changes to the thoracic skeleton system. Threats to grylloblattids and several conservation comments are also provided. PMID:20877572
Education, Inequality and Life Chances: A Report on the Netherlands [and] Discussion Paper.
ERIC Educational Resources Information Center
Tinbergen, Jan
Six chapters compose this report on the Netherlands: (1) some general characteristics of the Netherlands; (2) some notes on the history of income distribution and social security; (3) income distribution and social security around 1973; (4) opinions on income distribution, opportunities, and equality in Holland; (5) some forecasts on future income…
Security and privacy issues of personal health.
Blobel, Bernd; Pharow, Peter
2007-01-01
While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.
Security Verification of Secure MANET Routing Protocols
2012-03-22
SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF
[European health systems and the integration problem of modern societies].
Lüschen, G
2000-04-01
With reference to the national health systems in Germany and the UK we must acknowledge that it was in particular Bismarck's Reform, originally directed toward a solidarity among the socially weak, which entailed in its development a marked redistribution via progressive health fees and standardized health services. In view of Alfred Marshall's original expectations this has resulted in a specific integration of the socially weak and with some difference for nationally tax-financed and social security financed health systems to a genuine contribution towards integration of modern society. An open research question is whether as a consequence of solidarity and integration through health systems there is a decline of social inequality for health. Equally open is the question as to the socio-structural and economic consequences the expansion of modern health systems has.
Paths to Victory: Lessons from Modern Insurgencies
2013-01-01
result, the gov- ernment in Zagreb soon garnered the perception of a competent and The Cases 61 capable state. While the Croats fought valiantly...exhibited enough positive practices on balance to prevail and secure the country’s independence with its capital in Zagreb . Afghanistan (Post-Soviet), 1992
The Use of Maslow's Model in History
ERIC Educational Resources Information Center
Hubbs, Hugh
1978-01-01
Explains how Abraham Maslow's theory of the hierarchy of human needs can explain the success of medieval society which lasted 300 years. Based on sequential fulfillment of physical needs, security, affiliation, esteem, and self-fulfillment, the model can also illustrate how modern governments satisfy citizens' needs. (AV)
Flexible session management in a distributed environment
NASA Astrophysics Data System (ADS)
Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor
2010-04-01
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.
A Dynamic Framework for Water Security
NASA Astrophysics Data System (ADS)
Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu
2017-04-01
Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.
Quantum key distribution with hacking countermeasures and long term field trial.
Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J
2017-05-16
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
Yigzaw, Kassaye Yitbarek; Michalas, Antonis; Bellika, Johan Gustav
2017-01-03
Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N - 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bachner, Katherine M.; Mladineo, Stephen V.
The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support themore » Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.« less
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.
2018-03-01
MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.
Sweetening Android Lemon Markets: Measuring and Curbing Malware in Application Marketplaces
2012-06-08
the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick -and- mortar stores for...mechanism for modern mobile devices but are also emerging as a viable alternative to brick -and- mortar stores for personal computers. While most...through the Apple App Store , thereby entirely forgoing the traditional distribution channel – packaged opti- cal media sold in brick -and- mortar
Code of Federal Regulations, 2010 CFR
2010-07-01
... Labor SECURITY REGULATIONS Introduction to Security Regulations § 14.2 Policy. The interests of the...) Safeguarding national security information. Some official information within the Federal Government is directly..., therefore, be subject to security constraints, and limited in term of its distribution. (b) Exemption from...
Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Huang, Ming-Qi; Zhang, Wei-Jun; Chen, Si-Jing; Zhang, Lu; You, Li-Xing; Wang, Zhen; Liu, Yang; Lu, Chao-Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Chen, Teng-Yun; Pan, Jian-Wei
2016-01-01
Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.
Prototype of smart office system using based security system
NASA Astrophysics Data System (ADS)
Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.
2018-05-01
Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.
A SOPC-BASED Evaluation of AES for 2.4 GHz Wireless Network
NASA Astrophysics Data System (ADS)
Ken, Cai; Xiaoying, Liang
In modern systems, data security is needed more than ever before and many cryptographic algorithms are utilized for security services. Wireless Sensor Networks (WSN) is an example of such technologies. In this paper an innovative SOPC-based approach for the security services evaluation in WSN is proposed that addresses the issues of scalability, flexible performance, and silicon efficiency for the hardware acceleration of encryption system. The design includes a Nios II processor together with custom designed modules for the Advanced Encryption Standard (AES) which has become the default choice for various security services in numerous applications. The objective of this mechanism is to present an efficient hardware realization of AES using very high speed integrated circuit hardware description language (Verilog HDL) and expand the usability for various applications. As compared to traditional customize processor design, the mechanism provides a very broad range of cost/performance points.
Ensuring the security and availability of a hospital wireless LAN system.
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-01-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
Meeting EHR security requirements: SeAAS approach.
Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian
2010-01-01
In the last few years, Electronic Health Record (EHR) systems have received a great attention in the literature, as well as in the industry. They are expected to lead to health care savings, increase health care quality and reduce medical errors. This interest has been accompanied by the development of different standards and frameworks to meet EHR challenges. One of the most important initiatives that was developed to solve problems of EHR is IHE (Integrating the Healthcare Enterprise), which adapts the distributed approach to store and manage healthcare data. IHE aims at standardizing the way healthcare systems exchange information in distributed environments. For this purpose it defines several so called Integration Profiles that specify the interactions and the interfaces (Transactions) between various healthcare systems (Actors) or entities. Security was considered also in few profiles that tackled the main security requirements, mainly authentication and audit trails. The security profiles of IHE currently suffer two drawbacks. First, they apply end point security methodology, which has been proven recently to be insufficient and cumbersome in distributed and heterogeneous environment. Second, the current security profiles for more complex security requirements are oversimplified, vague and do not consider architectural design. This recently changed to some extend e.g., with the introduction of newly published white papers regarding privacy [5] and access control [9]. In order to solve the first problem we utilize results of previous studies conducted in the area of security-aware IHE-based systems and the state-of-the-art Security-as-a-Service approach as a convenient methodology to group domain-wide security needs and overcome the end point security shortcomings.
NASA Astrophysics Data System (ADS)
Diamanti, Eleni; Takesue, Hiroki; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa
2006-12-01
We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 µm single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.
Research Support for the Laboratory for Lightwave Technology
1992-12-31
34 .. . ."/ 12a. DISTRIBUTION AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE UNLIMITED 13. ABSTRACT (Mawimum 200words) 4 SEE ATTACHED ABSTRACT DT I 14. SUBJECT...8217TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT...temperature ceramic nano- phase single crystal oxides that may be produced at a high rate . The synthesis of both glasses and ceramics using novel techniques
Economy Over Security: Why Crises Fail to Impact Economic Behavior in East Asia
2017-12-01
SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST ASIA by Aaron R. Sipos December 2017 Thesis Advisor: Michael Glosny Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ECONOMY OVER SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST...release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) This study examines changes in economic behavior in
Collins, Robert J; Amiri, Ryan; Fujiwara, Mikio; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Sasaki, Masahide; Andersson, Erika; Buller, Gerald S
2017-06-12
Ensuring the integrity and transferability of digital messages is an important challenge in modern communications. Although purely mathematical approaches exist, they usually rely on the computational complexity of certain functions, in which case there is no guarantee of long-term security. Alternatively, quantum digital signatures offer security guaranteed by the physical laws of quantum mechanics. Prior experimental demonstrations of quantum digital signatures in optical fiber have typically been limited to operation over short distances and/or operated in a laboratory environment. Here we report the experimental transmission of quantum digital signatures over channel losses of up to 42.8 ± 1.2 dB in a link comprised of 90 km of installed fiber with additional optical attenuation introduced to simulate longer distances. The channel loss of 42.8 ± 1.2 dB corresponds to an equivalent distance of 134.2 ± 3.8 km and this represents the longest effective distance and highest channel loss that quantum digital signatures have been shown to operate over to date. Our theoretical model indicates that this represents close to the maximum possible channel attenuation for this quantum digital signature protocol, defined as the loss for which the signal rate is comparable to the dark count rate of the detectors.
Planning Considerations for Secure Network Protocols
1999-03-01
distribution / management ) requirements needed to support network security services are examined. The thesis concludes by identifying tactical user network requirements and suggests security issues to be considered in concert with network
Cryptography for Big Data Security
2015-07-13
Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S) Distribution A: Public Release Ariel Hamlin1 Nabil...Email: arkady@ll.mit.edu ii Contents 1 Cryptography for Big Data Security 1 1.1 Introduction...48 Chapter 1 Cryptography for Big Data Security 1.1 Introduction With the amount
17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.
Code of Federal Regulations, 2014 CFR
2014-04-01
... communications network; or (4) Exercises of securities. The exercise of any option, warrant, right, or any... communications network; or (7) Transactions in Rule 144A securities. Transactions in securities eligible for... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Activities by issuers and...
17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.
Code of Federal Regulations, 2013 CFR
2013-04-01
... communications network; or (4) Exercises of securities. The exercise of any option, warrant, right, or any... communications network; or (7) Transactions in Rule 144A securities. Transactions in securities eligible for... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Activities by issuers and...
17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.
Code of Federal Regulations, 2011 CFR
2011-04-01
... communications network; or (4) Exercises of securities. The exercise of any option, warrant, right, or any... communications network; or (7) Transactions in Rule 144A securities. Transactions in securities eligible for... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Activities by issuers and...
17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.
Code of Federal Regulations, 2010 CFR
2010-04-01
... communications network; or (4) Exercises of securities. The exercise of any option, warrant, right, or any... communications network; or (7) Transactions in Rule 144A securities. Transactions in securities eligible for... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Activities by issuers and...
The Language Situation in Iceland
ERIC Educational Resources Information Center
Hilmarsson-Dunn, Amanda; Kristinsson, Ari Pall
2010-01-01
Purist language policies in Iceland have preserved and modernized Icelandic up until the present time. However, the impact of globalization and global English has led to the perception that the language is less secure than in the past and has prompted efforts by policy makers towards greater protection of Icelandic. This monograph presents the…
ERIC Educational Resources Information Center
Yao, Grace; Cheng, Yen-Pi; Cheng, Chiao-Pi
2009-01-01
The AsiaBarometer survey of 1,006 respondents shows that in Taiwan, people have access to modern utilities and digital media, signs of materialistic achievement, and yet are more concerned with physical security and financial safety than with personal growth. Regardless of their demographic backgrounds and value priorities, the Taiwanese, like…
ERIC Educational Resources Information Center
Maxwell, Lesli A.
2007-01-01
The excesses of the modern prom often require principals to play the roles of police, fashion arbiters, and even parents. In the midst of the 2007 junior and senior prom season, school leaders attest to a mounting list of policies, regulations, and security measures they are enforcing for the year's big social event. Indeed, the prom, a…
Securing the Internet Control Plane
ERIC Educational Resources Information Center
Benton, Kevin
2017-01-01
The Internet carries traffic between billions of devices every day and modern societies depend on the resiliency of the routing technology behind it to work around the frequent link outages caused by natural disasters, equipment failures, destruction of cables, and even wars. However, the routing technology behind all of this, the Border Gateway…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-07
... collection techniques or the use of other forms of information technology; and (e) the annual cost burden to... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... existing collection of information. SUMMARY: As part of its continuing effort to reduce paperwork and...
Bridging Ends to Means: Achieving a Viable Peace in Afghanistan
2010-04-01
the Global War on Terror. No price should be too high to guarantee national security; yet, as the statistics suggest, the fiscal situation has...Studies AY10 Coursebook , edited by Sharon McBride, 351-356. Maxwell AFB, AL: Air University Press, October 2009. Saikal, Amin. Modern Afghanistan
Toward Improved Security and Privacy in Modern Healthcare
ERIC Educational Resources Information Center
Pagano, Matthew Wallach
2013-01-01
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
ERIC Educational Resources Information Center
Schwartz, Edward
The purpose of this eight-unit course is to explore the values and issues of modern urban neighborhoods. It focuses on how community leaders can apply the broad principle of justice to problems of security, reciprocity, and fellowship that face most neighborhoods today. The course is intended for use by community leaders in building community…
NASA Technical Reports Server (NTRS)
1975-01-01
The use of information from space systems in the operation of extractive industries, particularly in exploration for mineral and fuel resources was reviewed. Conclusions and recommendations reported are based on the fundamental premise that survival of modern industrial society requires a continuing secure flow of resources for energy, construction and manufacturing, and for use as plant foods.
Research Staff | Energy Systems Integration Facility | NREL
Research Staff Research Staff NREL's Energy Systems Integration directorate includes the Power investments in advanced energy research, and the security and resilience team under the DOE's multi-lab effort to modernize the nation's electrical grid. juan.torres@nrel.gov | 303-275-3094 ESI Research
Intelligence Studies, Universities and Security
ERIC Educational Resources Information Center
Glees, Anthony
2015-01-01
This article offers a critical assessment of academic intelligence studies in higher education. It argues that universities (and academics) should value this subject far more highly than they currently do. Doing so will enhance better public understanding of an increasingly important and unique device in modern governance. It will also improve the…
Undetectable Firearms Modernization Act of 2013
Rep. Israel, Steve [D-NY-3
2013-12-03
House - 01/27/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Notes: For further action, see H.R.3626, which became Public Law 113-57 on 12/9/2013. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
12 CFR 333.101 - Prior consent not required.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Income Security Act of 1974 (26 U.S.C. 408), Self-Employed Retirement Plans established pursuant to the Self-Employed Individuals Retirement Act of 1962 (26 U.S.C. 401), Roth Individual Retirement Accounts... Prescription Drug Improvement, and Modernization Act of 2003 (26 U.S.C. 223), and other similar accounts...
12 CFR 333.101 - Prior consent not required.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Income Security Act of 1974 (26 U.S.C. 408), Self-Employed Retirement Plans established pursuant to the Self-Employed Individuals Retirement Act of 1962 (26 U.S.C. 401), Roth Individual Retirement Accounts... Prescription Drug Improvement, and Modernization Act of 2003 (26 U.S.C. 223), and other similar accounts...
12 CFR 333.101 - Prior consent not required.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Income Security Act of 1974 (26 U.S.C. 408), Self-Employed Retirement Plans established pursuant to the Self-Employed Individuals Retirement Act of 1962 (26 U.S.C. 401), Roth Individual Retirement Accounts... Prescription Drug Improvement, and Modernization Act of 2003 (26 U.S.C. 223), and other similar accounts...
12 CFR 333.101 - Prior consent not required.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Income Security Act of 1974 (26 U.S.C. 408), Self-Employed Retirement Plans established pursuant to the Self-Employed Individuals Retirement Act of 1962 (26 U.S.C. 401), Roth Individual Retirement Accounts... Prescription Drug Improvement, and Modernization Act of 2003 (26 U.S.C. 223), and other similar accounts...
12 CFR 333.101 - Prior consent not required.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Income Security Act of 1974 (26 U.S.C. 408), Self-Employed Retirement Plans established pursuant to the Self-Employed Individuals Retirement Act of 1962 (26 U.S.C. 401), Roth Individual Retirement Accounts... Prescription Drug Improvement, and Modernization Act of 2003 (26 U.S.C. 223), and other similar accounts...
A Course in Natural Science and National Security in the Nuclear Age.
ERIC Educational Resources Information Center
Blumberg, Avrom A.
1983-01-01
Topics and instructional strategies for an upper-level, problem-oriented science and society course at De Paul University are described. Objectives and grading procedures for "Problems in Modern Warfare, Arms Control, and Disarmament" are also described. Course syllabus, bibliography, and sample quizzes/examinations are available from…
For an anthropology of eating disorders. A pornographic vision of the self.
Stanghellini, G
2005-06-01
In reading the considerations of the leading contemporary sociologists, attentive observers of the metamorphosis of identity in the post-modern age, a game came to my mind: "what if I mixed up quotes from these scholars' papers with extracts from patients' clinical reports, especially people suffering from so-called "eating disorders"? The objective of this game is to show how difficult it is to pick out the clinical fragments from the sociologists' descriptions of the "never ending task of assembling our Self". The game is to try to separate psychopathology from the Late Modern physiology of identity. The great psychopathologists from the last century offered us two major meaning organizers of identity and its disorders: the Freudian and the Jaspersian. Freud's notion of the "discontents with civilization" served to explain that widespread sense of malaise that characterizes the modern condition. As civilization has been built on our restraining our drives, civilized man ended up "trading in a part of his chances for happiness for a bit of security". Security is guaranteed by our submitting to norms of civilized living together. Neurosis, that feeling that permeates modern human beings who neither belong to themselves nor to others, is the agonizing result. The Jaspersian concept of the Ego consciousness is mainly based on the Kantian Self, the identity pole of subjectivity, standing above the stream of changing experience. It is a necessary condition for coherent experience. Also the Jaspersian Self presupposes coherence, since its main features include identity through time, a sense of unity and one of demarcation from the external world, and a feeling of being actively involved in one's own experiences and performances. In late modernity, identity is a task. Post-modern people have the task and necessity to be perpetually constructing themselves. Being, Self, are organized in a reflexive way. Individuals are forced to choose their own life style among a multitude of alternatives. Are the Freudian and the Kantian/Jaspersian models of the Self now still proving to be suitable for an adequate psychopathological analysis?
On the pursuit of a nuclear development capability: The case of the Cuban nuclear program
NASA Astrophysics Data System (ADS)
Benjamin-Alvarado, Jonathan Calvert
1998-09-01
While there have been many excellent descriptive accounts of modernization schemes in developing states, energy development studies based on prevalent modernization theory have been rare. Moreover, heretofore there have been very few analyses of efforts to develop a nuclear energy capability by developing states. Rarely have these analyses employed social science research methodologies. The purpose of this study was to develop a general analytical framework, based on such a methodology to analyze nuclear energy development and to utilize this framework for the study of the specific case of Cuba's decision to develop nuclear energy. The analytical framework developed focuses on a qualitative tracing of the process of Cuban policy objectives and implementation to develop a nuclear energy capability, and analyzes the policy in response to three models of modernization offered to explain the trajectory of policy development. These different approaches are the politically motivated modernization model, the economic and technological modernization model and the economic and energy security model. Each model provides distinct and functionally differentiated expectations for the path of development toward this objective. Each model provides expected behaviors to external stimuli that would result in specific policy responses. In the study, Cuba's nuclear policy responses to stimuli from domestic constraints and intensities, institutional development, and external influences are analyzed. The analysis revealed that in pursuing the nuclear energy capability, Cuba primarily responded by filtering most of the stimuli through the twin objectives of economic rationality and technological advancement. Based upon the Cuban policy responses to the domestic and international stimuli, the study concluded that the economic and technological modernization model of nuclear energy development offered a more complete explanation of the trajectory of policy development than either the politically-motivated or economic and energy security models. The findings of this case pose some interesting questions for the general study of energy programs in developing states. By applying the analytical framework employed in this study to a number of other cases, perhaps the understanding of energy development schemes may be expanded through future research.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Chen; Wang, Jianhui; Ton, Dan
Recent severe power outages caused by extreme weather hazards have highlighted the importance and urgency of improving the resilience of the electric power grid. As the distribution grids still remain vulnerable to natural disasters, the power industry has focused on methods of restoring distribution systems after disasters in an effective and quick manner. The current distribution system restoration practice for utilities is mainly based on predetermined priorities and tends to be inefficient and suboptimal, and the lack of situational awareness after the hazard significantly delays the restoration process. As a result, customers may experience an extended blackout, which causes largemore » economic loss. On the other hand, the emerging advanced devices and technologies enabled through grid modernization efforts have the potential to improve the distribution system restoration strategy. However, utilizing these resources to aid the utilities in better distribution system restoration decision-making in response to extreme weather events is a challenging task. Therefore, this paper proposes an integrated solution: a distribution system restoration decision support tool designed by leveraging resources developed for grid modernization. We first review the current distribution restoration practice and discuss why it is inadequate in response to extreme weather events. Then we describe how the grid modernization efforts could benefit distribution system restoration, and we propose an integrated solution in the form of a decision support tool to achieve the goal. The advantages of the solution include improving situational awareness of the system damage status and facilitating survivability for customers. The paper provides a comprehensive review of how the existing methodologies in the literature could be leveraged to achieve the key advantages. The benefits of the developed system restoration decision support tool include the optimal and efficient allocation of repair crews and resources, the expediting of the restoration process, and the reduction of outage durations for customers, in response to severe blackouts due to extreme weather hazards.« less
Security evaluation of the quantum key distribution system with two-mode squeezed states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Osaki, M.; Ban, M.
2003-08-01
The quantum key distribution (QKD) system with two-mode squeezed states has been demonstrated by Pereira et al. [Phys. Rev. A 62, 042311 (2000)]. They evaluate the security of the system based on the signal to noise ratio attained by a homodyne detector. In this paper, we discuss its security based on the error probability individually attacked by eavesdropper with the unambiguous or the error optimum detection. The influence of the energy loss at transmission channels is also taken into account. It will be shown that the QKD system is secure under these conditions.
Wallner, Barbara; Vogl, Claus; Shukla, Priyank; Burgstaller, Joerg P.; Druml, Thomas; Brem, Gottfried
2013-01-01
The paternally inherited Y chromosome displays the population genetic history of males. While modern domestic horses (Equus caballus) exhibit abundant diversity within maternally inherited mitochondrial DNA, no significant Y-chromosomal sequence diversity has been detected. We used high throughput sequencing technology to identify the first polymorphic Y-chromosomal markers useful for tracing paternal lines. The nucleotide variability of the modern horse Y chromosome is extremely low, resulting in six haplotypes (HT), all clearly distinct from the Przewalski horse (E. przewalskii). The most widespread HT1 is ancestral and the other five haplotypes apparently arose on the background of HT1 by mutation or gene conversion after domestication. Two haplotypes (HT2 and HT3) are widely distributed at high frequencies among modern European horse breeds. Using pedigree information, we trace the distribution of Y-haplotype diversity to particular founders. The mutation leading to HT3 occurred in the germline of the famous English Thoroughbred stallion “Eclipse” or his son or grandson and its prevalence demonstrates the influence of this popular paternal line on modern sport horse breeds. The pervasive introgression of Thoroughbred stallions during the last 200 years to refine autochthonous breeds has strongly affected the distribution of Y-chromosomal variation in modern horse breeds and has led to the replacement of autochthonous Y chromosomes. Only a few northern European breeds bear unique variants at high frequencies or fixed within but not shared among breeds. Our Y-chromosomal data complement the well established mtDNA lineages and document the male side of the genetic history of modern horse breeds and breeding practices. PMID:23573227
Code of Federal Regulations, 2010 CFR
2010-04-01
... dealer publishes or distributes research reports on the types of securities in question in the regular course of its business; and (4) The issuer is not, and during the past three years neither the issuer nor...
CORBASec Used to Secure Distributed Aerospace Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.
Steven L. Voelker; Michael C. Stambaugh; J. Renée Brooks; Frederick C. Meinzer; Barbara Lachenbruch; Richard P. Guyette
2017-01-01
To test tree growth-sensitivity to temperature under different ambient CO2 concentrations, we determined stem radial growth rates as they relate to variation in temperature during the last deglacial period, and compare these to modern tree growth rates as they relate to spatial variation in temperature across the modern species distributional...
1996-07-01
UNCLASSIFIED AD NUMBER ADB216343 NEW LIMITATION CHANGE TO Approved for public release, distribution unlimited FROM Distribution authorized to U.S...PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF...ABSTRACT ,Unclassified Unclassified Unclassified Limited NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-1 8 DISCLAIMER
Yasuhara, Moriaki; Kato, Masako; Ikeya, Noriyuki; Seto, Koji
2007-01-01
Seventy-three ostracode species from 38 genera were recovered from the 55 surface sediment samples in Lützow-Holm Bay, northeastern Antarctica. We investigated bathymetric and geographic distributions of modern benthic ostracode species in the bay and compared this fauna with published modern and fossil ostracode data of Antarctic and southern South American regions. The results show: (1) Four biotopes and three sub-biotopes are recognized based on Q-mode cluster analysis, which suggest distributions of modern ostracodes are mainly controlled by water-mass structure, ice scouring, and light availability. (2) Comparison between the Lützow-Holm Bay fauna and other ostracode faunas from Antarctica and southern South America shows high endemism and homogeneity of Antarctic ostracode fauna, suggesting in situ evolution of most extant Antarctic species. (3) Most species are endemic to the Antarctica, a few species also inhabit South American waters.
Attribute based encryption for secure sharing of E-health data
NASA Astrophysics Data System (ADS)
Charanya, R.; Nithya, S.; Manikandan, N.
2017-11-01
Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Ravindra; Reilly, James T.; Wang, Jianhui
Deregulation of the electric utility industry, environmental concerns associated with traditional fossil fuel-based power plants, volatility of electric energy costs, Federal and State regulatory support of “green” energy, and rapid technological developments all support the growth of Distributed Energy Resources (DERs) in electric utility systems and ensure an important role for DERs in the smart grid and other aspects of modern utilities. DERs include distributed generation (DG) systems, such as renewables; controllable loads (also known as demand response); and energy storage systems. This report describes the role of aggregators of DERs in providing optimal services to distribution networks, through DERmore » monitoring and control systems—collectively referred to as a Distributed Energy Resource Management System (DERMS)—and microgrids in various configurations.« less
Two-Person Control: A Brief History and Modern Industry Practices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pedersen, Robert Douglas
Physical asset protection is the principal objective of many security and safeguard measures. One well-known means of asset protection is two-person control. This paper reviews literature regarding two-person control to gain insight into its origin, first demonstrated uses, and its presence in several modern industries. This literature review of two-person control is intended to benefit people and organizations with a desire to understand its origins and how the practice has evolved over time, as well as give some insight into the flexibility of this safeguarding technique. The literature review is focused in four main sections: (1) defining two-person control, (2)more » early history, (3) two-person control in modern industry, and (4) a theory on how two- person control entered modern industry. ACKNOWLEDGEMENTS The author would like to thank Jarret Lafleur and Scott Paap of Sandia National Laboratories, California's Systems Analysis & Engineering organization for the opportunity to work on this project. Jarret Lafleur provided very constructive and helpful feedback through all stages of the work. Amanda Thompson of the Sandia California Technical Library maintained a great spirit and always had a quick document turnaround that very much helped out this project's completion. Additionally, yet perhaps most importantly, the author would like to thank his wife and daughter, along with the rest of his family, for continued support over the years. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525.« less
33 CFR 106.265 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...
Pricing the Future in the Seventeenth Century: Calculating Technologies in Competition.
Deringer, William
Time is money. But how much? What is money in the future worth to you today? This question of "present value" arises in myriad economic activities, from valuing financial securities to real estate transactions to governmental cost-benefit analysis-even the economics of climate change. In modern capitalist practice, one calculation offers the only "rational" way to answer: compound-interest discounting. In the early modern period, though, economic actors used at least two alternative calculating technologies for thinking about present value, including a vernacular technique called years purchase and discounting by simple interest. All of these calculations had different strengths and affordances, and none was unquestionably better or more "rational" than the others at the time. The history of technology offers distinct resources for understanding such technological competitions, and thus for understanding the emergence of modern economic temporality.
NASA Astrophysics Data System (ADS)
Massa, C.; Beilman, D. W.; Nichols, J. E.; Elison Timm, O.
2016-12-01
Holocene peat deposits from the Hawaiian Islands provide a unique opportunity to resolve millennial to centennial-scale climate variability over the central Pacific region, where data remain scarce. Because both extratropical and tropical modes of climate variability have a strong influence on modern rainfall over the archipelago, hydroclimate proxies from peat would provide valuable information about past Pacific climate changes. The few terrestrial records studied, based on pollen or leaf wax biomarkers, showed evidence for substantial vegetation changes that have been linked to a drying trend over the Holocene. Leaf wax n-alkanes, as well as their stable isotopic compositions (δ13C and δD), are indeed increasingly used to reconstruct past hydroclimate conditions. The interpretation of n-alkanes as biomarkers requires however a thorough knowledge of their distribution in modern plants that contribute to sediments, but in Hawaii the modern vegetation is understudied compared to proxy applications. Here we report results from a preliminary investigation of n-alkanes distributions in dominant modern plant litter collected at a bog site at the summit of the Waianae mountains on the Island of Oahu. We compared n-alkane distributions among species and plant groups in order to test whether taxa or plant functional types (mosses, ferns, woody plants, and sedges) can be discriminated from their n-alkane profiles. Results showed that general plant groups were difficult to distinguish based on individual n-alkanes abundances, chain lengths, or ratios. At the species level, the sedge Machaerina augustifolia, was largely dominated by n-C29 ( 60%), suggesting some chain lengths could be useful as proxies for identifying the contribution of sedges to sedimentary records. Woody plant average chain length was highly variable but overall was not shorter (even slightly higher) than in other terrestrial plants, as it is often assumed. A sedimentary profile from this site shows variation and an overall decrease in n-alkane chain length over the Holocene, but patterns across common modern plants suggest that caution should be exercised when ascribing n-alkane distribution parameters to a specific group of tropical vegetation.
Intrusion Detection in Database Systems
NASA Astrophysics Data System (ADS)
Javidi, Mohammad M.; Sohrabi, Mina; Rafsanjani, Marjan Kuchaki
Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.
NASA Astrophysics Data System (ADS)
Ivanov, A. V.; Reva, I. L.; Babin, A. A.
2018-04-01
The article deals with influence of various ways to place vibration transmitters on efficiency of rooms safety for negotiations. Standing for remote vibration listening of window glass, electro-optical channel, the most typical technical channel of information leakage, was investigated. The modern system “Sonata-AB” of 4B model is used as an active protection tool. Factors influencing on security tools configuration efficiency have been determined. The results allow utilizer to reduce masking interference level as well as parasitic noise with keeping properties of room safety.
75 FR 11583 - The Chile Fund, Inc.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-11
... in Chilean equity and debt securities. Applicant states that under normal circumstances it invests at...'') on an in-kind basis with a pro rata distribution of the Fund's portfolio securities (with exceptions... Fund to avoid a cascade of distributions, required to preserve its tax status, that would reduce the...
The U.S. EPA’s Technology Testing and Evaluation Program has been charged by EPA to evaluate the performance of commercially available water security-related technologies. Multi-parameter water monitors for distributions systems have been evaluated as such a water security techn...
NASA Astrophysics Data System (ADS)
Aguado, Alejandro; Hugues-Salas, Emilio; Haigh, Paul Anthony; Marhuenda, Jaume; Price, Alasdair B.; Sibson, Philip; Kennard, Jake E.; Erven, Chris; Rarity, John G.; Thompson, Mark Gerard; Lord, Andrew; Nejabati, Reza; Simeonidou, Dimitra
2017-04-01
We demonstrate, for the first time, a secure optical network architecture that combines NFV orchestration and SDN control with quantum key distribution (QKD) technology. A novel time-shared QKD network design is presented as a cost-effective solution for practical networks.
13 CFR 107.1400 - Dividends or partnership distributions on 4 percent Preferred Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Dividends or partnership distributions on 4 percent Preferred Securities. 107.1400 Section 107.1400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...
Perin, Jamie; Amouzou, Agbessi; Walker, Neff
2017-11-07
Increased contraceptive use has been associated with a decrease in high parity births, births that occur close together in time, and births to very young or to older women. These types of births are also associated with high risk of under-five mortality. Previous studies have looked at the change in the level of contraception use and the average change in these types of high-risk births. We aim to predict the distribution of births in a specific country when there is a change in the level and method of modern contraception. We used data from full birth histories and modern contraceptive use from 207 nationally representative Demographic and Health Surveys covering 71 countries to describe the distribution of births in each survey based on birth order, preceding birth space, and mother's age at birth. We estimated the ecologic associations between the prevalence and method-mix of modern contraceptives and the proportion of births in each category. Hierarchical modelling was applied to these aggregated cross sectional proportions, so that random effects were estimated for countries with multiple surveys. We use these results to predict the change in type of births associated with scaling up modern contraception in three different scenarios. We observed marked differences between regions, in the absolute rates of contraception, the types of contraceptives in use, and in the distribution of type of birth. Contraceptive method-mix was a significant determinant of proportion of high-risk births, especially for birth spacing, but also for mother's age and parity. Increased use of modern contraceptives is especially predictive of reduced parity and more births with longer preceding space. However, increased contraception alone is not associated with fewer births to women younger than 18 years or a decrease in short-spaced births. Both the level and the type of contraception are important factors in determining the effects of family planning on changes in distribution of high-risk births. The best predictions for how birth risk changes with increased modern contraception and for different contraception methods allow for more nuanced predictions specific to each country and can aid better planning for the scaling up of modern contraception.
Mechanical Verification of Cryptographic Protocols
NASA Astrophysics Data System (ADS)
Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie
Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.
Variations in global thunderstorm activity inferred from the OTD records
NASA Astrophysics Data System (ADS)
Nickolaenko, A. P.; Hayakawa, M.; Sekiguchi, M.
2006-03-01
We use the data on the planetary distribution of thunderstorms collected by optical transient detector (OTD) to derive the properties of global electric activity. Processing of optical data indicates that modern observations from space confirm the general concept of thunderstorm distribution and motion. Close similarity is demonstrated between the World Meteorological Organization data and modern records including Carnegie curve. Departures noted might be caused by thunderstorms redistribution owing to climate change; the issue deserves a special examination.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230 and 270 [Release No. 33-9503; IC-30845...; Applications Regarding Joint Enterprises or Arrangements and Certain Profit-Sharing Plans AGENCY: Securities and Exchange Commission. ACTION: Final rule; technical amendments. SUMMARY: The Securities and...
NASA Astrophysics Data System (ADS)
McNabb, Justin; Surge, Donna
2015-04-01
Shells of the marine bivalve, Astarte, are uniquely suited to investigate links between environmental/climate change and biological consequences because of their change in size and biogeographic distribution through time. For example, are there corresponding changes in lifespan and biogeographic distribution depending on warm vs. cold climate states? Does warm vs. cold climate state result in longer or shorter lifespans? Early studies of Astarte have documented a decrease in shell size through geologic time. Modern specimens are much smaller than those from the mid Pliocene at similar latitudes. Astarte had a wide latitudinal and cosmopolitan distribution in the western North Atlantic during the Oligocene to Pliocene. During the early Pleistocene, most of the warm-water species became extinct, and today, their biogeographic distribution is mostly restricted to the northern Pacific, Atlantic, and Arctic Oceans. To answer questions linking biological consequences and climate change, we must first decipher ontogenetic changes in shell growth of modern specimens. Preliminary data using isotope sclerochronology identified slowed shell growth from late summer to winter in modern specimens from the White Sea, Russia, possibly triggered by increasing freshwater input and decreasing temperatures. Here, we present new data examining the reproducibility of isotopic time series and season of slowed growth among modern individuals collected at the same time from the same population.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
Collective attacks and unconditional security in continuous variable quantum key distribution.
Grosshans, Frédéric
2005-01-21
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.
Evolution of low-profile and lightweight electrical connectors for soldier-worn applications
NASA Astrophysics Data System (ADS)
Gans, Eric; Lee, Kang; Jannson, Tomasz; Walter, Kevin
2011-06-01
In addition to military radios, modern warfighters carry cell phones, GPS devices, computers, and night-vision aids, all of which require electrical cables and connectors for data and power transmission. Currently each electrical device operates via independent cables using conventional cable and connector technology. Conventional cables are stiff and difficult to integrate into a soldier-worn garment. Conventional connectors are tall and heavy, as they were designed to ensure secure connections to bulkhead-type panels, and being tall, represent significant snag-hazards in soldier-worn applications. Physical Optics Corporation has designed a new, lightweight and low-profile electrical connector that is more suitable for body-worn applications and operates much like a standard garment snap. When these connectors are mated, the combined height is <0.3 in. - a significant reduction from the 2.5 in. average height of conventional connectors. Electrical connections can be made with one hand (gloved or bare) and blindly (without looking). Furthermore, POC's connectors are integrated into systems that distribute data or power from a central location on the soldier's vest, reducing the length and weight of the cables necessary to interconnect various mission-critical electronic systems. The result is a lightweight power/data distribution system offering significant advantages over conventional electrical connectors in soldier-worn applications.
Estimating past precipitation and temperature from fossil ostracodes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, A.J.; Forester, R.M.
1994-12-31
The fossil records of certain aquatic organisms provide a way of obtaining meaningful estimates of past temperature and precipitation. These estimates of past environmental conditions are derived from multivariate statistical methods that are in turn based on the modern biogeographic distributions and environmental tolerances of the biota of interest. These estimates are helpful in conducting slimate studies as part of the Yucca Mountain site characterization. Ostracodes are microscopic crustaceans that produce bivalved calcite shells which are easily fossilized in the sediments of the lakes and wetlands in which the animals lived. The modern biogeographic distribution and environmental conditions of livingmore » ostracodes are the basis for the interpretation of the past environmental conditions of the fossil ostracodes. The major assumption in this method of interpretation is that the environmental tolerances of ostracodes have not changed substantially over thousands of years. Two methods using these modern analogs to determine past environmental conditions are the modern analog method and the range method. The range method also considers the information provided by fossil ostracode assemblages that have no modern analog in today`s world.« less
Distribution Management System Volt/VAR Evaluation | Grid Modernization |
NREL Distribution Management System Volt/VAR Evaluation Distribution Management System Volt/VAR Evaluation This project involves building a prototype distribution management system testbed that links a GE Grid Solutions distribution management system to power hardware-in-the-loop testing. This setup is
Retro-Innovation of 21st Century Education as a Resource for Ensuring National Security
ERIC Educational Resources Information Center
Kislyakov, P. A.
2015-01-01
This article presents an analysis of modernization of the education system in the Russian Federation from the viewpoint of both Western liberal and traditional conservative (Russian) ideologies and related retro-innovations. We describe negative trends in how individuals develop and define themselves against the backdrop of liberalization,…
"Engage": Equipping Airmen as Global Ambassadors
ERIC Educational Resources Information Center
Dyrud, Felisa M.
2010-01-01
The reality of a modern-day expeditionary military force with goals of establishing security and enabling nation-building in some of the most volatile areas of the world means that effective cross-cultural partnership has never been so crucial. Air Force and Department of Defense leadership at the highest levels has long acknowledged the…
Alex Wiedenhoeft
2014-01-01
Wood is perhaps the quintessential material used in most human cultures. In prehistoric times, it was employed, either directly or indirectly, to provide most human needs: warmth, shelter, and nearly all manner of tools suitable for procuring food, water and security (Beeckman, 2003). In modern times it continues to play important roles in human cultures (Radkau, 2012...
ERIC Educational Resources Information Center
Hall, Jacqueline Huynh
2011-01-01
In today's modern business world, most organizations use information as a critical business asset to gain competitive advantage and create market value. Increasingly, an organization's ability to protect information assets plays a critical role in its ability to meet regulatory compliance requirements, increase customer trust, preserve brand…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-26
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration 21 CFR Part 807 [Docket No... in the Public Health Security and Bioterrorism Preparedness and Response Act of 2002, the Medical Device User Fee and Modernization Act of 2002, and Title II of the Food and Drug Administration...
Democratic Life Skill 1: Guiding Children to Find a Place
ERIC Educational Resources Information Center
Gartrell, Dan
2012-01-01
"Democratic life skills" are social-emotional capacities that children need to be productive citizens and healthy individuals in a modern, diverse society. The construct for these skills comes from many sources. One helpful source is Maslow's concept of two coexisting sets of motivational needs in each individual: one set for security, belonging,…
2006-06-16
Weapons of the Waffen -SS: From Small Arms to Tanks (Wellingsborough: Patrick Stephens, Limited, 1988), 106. 47 McCarthy, 29. 48 Schnieder,193-197. 49...book of the German army in the twentieth century). Freiburg, Germany: Podzun- Pallas, 1990. Quarrie, Bruce, Weapons of the Waffen -SS: From Small Arms
Boosting Financial Literacy in America: A Role for State Colleges and Universities. Perspectives
ERIC Educational Resources Information Center
Harnisch, Thomas L.
2010-01-01
Given the overarching ramifications that financial literacy plays in the modern economy, this paper contends that a renewed emphasis on financial literacy is central to individual, family and communal economic security. New responsibilities and opportunities given to consumers, such as retirement planning, have increased the need for more…
Juan Torres - Associate Laboratory Director, Energy Systems Integration |
Facility (ESIF) to strengthen the security and resilience of the nation's electrical grid. He leads NREL's Laboratories as an electrical engineer, in several management positions, and most recently as deputy to the effort to modernize the nation's electrical grid. Torres holds a bachelor's degree in electronics
ERIC Educational Resources Information Center
Goulah, Jason
2008-01-01
In this article, the author responds to the Modern Language Association's report, "Foreign Languages and Higher Education: New Structures for a Changed World" (2007) by arguing for an explicit and interdisciplinary transformative world language learning approach toward environmental and cultural sustainability and economic and political…
2011-03-01
performance and the extensive studies connecting perceptive measures to actual performance (Bommer, Johnson, Rich, Podsakoff , & MacKenzie, 1995; Brewer, 2005...theory of modern politics. London: Polity. Bommer, W. H., Johnson, J. L., Rich, G., Podsakoff , P. M., & MacKenzie, S. B. (1995). On the
Final Report of NATO/SPS Pilot Study on Clean Products and Processes (Phase I and II)
Early in 1998 the NATO Committee for Challenges to Modern Society (SPS) (Science for Peace and Security) approved the Pilot Study on Clean Products and Processes for an initial period of five years. The pilot was to provide a forum for member country representatives to discuss t...
The Design and Realization of Net Testing System on Campus Network
ERIC Educational Resources Information Center
Ren, Zhanying; Liu, Shijie
2005-01-01
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Highway Construction in the U.S.: Costs, Benefits, Dependence
ERIC Educational Resources Information Center
Childress, Vincent W.
2013-01-01
Few people truly recognize the influence of modern transportation on society. In the United States, that includes the influence of highways that allow the citizenry to travel freely, the strength of the economy, and the country's national security. In all cases, the geography of the United States influenced the evolution of transportation and…
Modern strategy for operational excellence: building agile and adaptive organizations.
Gerwitz, Raymond J
2016-10-01
Healthcare security leaders who serve in an industry built on traditional and static protection and response protocols must become more agile and adaptive in planning and responding to evolving threat and risk profiles, the author states. In this article, he tells how to use operational excellence to continuously improve performance.
78 FR 42957 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... Drug Coverage; Use: Section 1860D-4(g)(1) of the Social Security Act, requires that Part D plan... and D Universal Audit Guide; Use: Under the Medicare Prescription Drug, Improvement, and Modernization... requirements. In 2010 the explosive growth of these sponsoring organizations forced us to develop an audit...
2012-06-10
and white light) and the longitudinal extent of the SEP event in the heliosphere. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...The STEREO SECCHI data are pro- duced by a consortium of RAL (UK), NRL (USA), LMSAL (USA), GSFC (USA), MPS (Germany), CSL (Belgium), IOTA (France
Improving Patient Safety in Hospitals through Usage of Cloud Supported Video Surveillance.
Dašić, Predrag; Dašić, Jovan; Crvenković, Bojan
2017-04-15
Patient safety in hospitals is of equal importance as providing treatments and urgent healthcare. With the development of Cloud technologies and Big Data analytics, it is possible to employ VSaaS technology virtually anywhere, for any given security purpose. For the listed benefits, in this paper, we give an overview of the existing cloud surveillance technologies which can be implemented for improving patient safety. Modern VSaaS systems provide higher elasticity and project scalability in dealing with real-time information processing. Modern surveillance technologies can prove to be an effective tool for prevention of patient falls, undesired movement and tempering with attached life supporting devices. Given a large number of patients who require constant supervision, a cloud-based monitoring system can dramatically reduce the occurring costs. It provides continuous real-time monitoring, increased overall security and safety, improved staff productivity, prevention of dishonest claims and long-term digital archiving. Patient safety is a growing issue which can be improved with the usage of high-end centralised surveillance systems allowing the staff to focus more on treating health issues rather that keeping a watchful eye on potential incidents.
Waska, Robert
2016-09-01
Working to establish analytic contact (Waska, 2007) with a patient involves the verbal act of interpretation. But, how one interprets and what we try to hold in words is not the same with each patient. Each patient requires, invites, provokes and responds to a unique mixture of interpretive elements or approaches. The projective identification process that is so often the bedrock of the transference, and therefore the catalyst of the counter-transference, forms the psychological climate between patient and analyst. Case material is used to explore a Modern Kleinian interpretive approach with both a very entrenched depressive position (Klein, 1935, 1940) patient and a very primitive paranoid-schizoid (Klein, 1946) patient. Both these individuals desired relief from their symptoms of anxiety, anger, emptiness, and guilt. But, their unbearable unconscious phantasies offered pathological security that they were familiar with and therefore they preferred the known internal trauma and chaos to facing the unknown and undefined reality of self and other that change, grief, and growth would bring.
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano
2018-05-01
We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.
Methodology of shooting training using modern IT techniques
NASA Astrophysics Data System (ADS)
Gudzbeler, Grzegorz; Struniawski, Jarosław
2017-08-01
Mastering, improvement, shaping and preservation of skills of safe, efficient and effective use of the firearm requires the use of relevant methodology of conducting the shooting training. However reality of police trainings does not usually allow for intensive training shooting with the use of ammunition. An alternative solution is the use of modern training technologies. Example of this is the "Virtual system of improvement tactics of intervention services responsible for security and shooting training." Introduction of stimulator to police trainings will enable complete stuff preparation to achieve its tasks, creating potential of knowledge and experience in many areas, far exceeding the capabilities of conventional training.
Quantum key distribution network for multiple applications
NASA Astrophysics Data System (ADS)
Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.
2017-09-01
The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.
Long-distance continuous-variable quantum key distribution by controlling excess noise
NASA Astrophysics Data System (ADS)
Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua
2016-01-01
Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.
Long-distance continuous-variable quantum key distribution by controlling excess noise.
Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua
2016-01-13
Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.
Long-distance continuous-variable quantum key distribution by controlling excess noise
Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua
2016-01-01
Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network. PMID:26758727
Thomas, Kathryn A.; Guertin, Patricia P.; Gass, Leila
2012-01-01
The authors developed spatial models of the predicted modern-day suitable habitat (SH) of 166 dominant and indicator plant species of the southwestern United States (herein referred to as the Southwest) and then conducted a coarse assessment of potential future changes in the distribution of their suitable habitat under three climate-change scenarios for two time periods. We used Maxent-based spatial modeling to predict the modern-day and future scenarios of SH for each species in an over 342-million-acre area encompassing all or parts of six states in the Southwest--Arizona, California, Colorado, Nevada, New Mexico, and Utah. Modern-day SH models were predicted by our using 26 annual and monthly average temperature and precipitation variables, averaged for the years 1971-2000. Future SH models were predicted for each species by our using six climate models based on application of the average of 16 General Circulation Models to Intergovernmental Panel on Climate Change emission scenarios B1, A1B, and A2 for two time periods, 2040 to 2069 and 2070 and 2100, referred to respectively as the 2050 and 2100 time periods. The assessment examined each species' vulnerability to loss of modern-day SH under future climate scenarios, potential to gain SH under future climate scenarios, and each species' estimated risk as a function of both vulnerability and potential gains. All 166 species were predicted to lose modern-day SH in the future climate change scenarios. In the 2050 time period, nearly 30 percent of the species lost 75 percent or more of their modern-day suitable habitat, 21 species gained more new SH than their modern-day SH, and 30 species gained less new SH than 25 percent of their modern-day SH. In the 2100 time period, nearly half of the species lost 75 percent or more of their modern-day SH, 28 species gained more new SH than their modern-day SH, and 34 gained less new SH than 25 percent of their modern-day SH. Using nine risk categories we found only two species were in the least risk category, while 20 species were in the highest risk category. The assessment showed that species respond independently to predicted climate change, suggesting that current plant assemblages may disassemble under predicted climate change scenarios. This report presents the results for each species in tables (Appendix A) and maps (14 for each species) in Appendix B.
2014-01-01
Background Traditional agrosystems are the places were crop species have evolved and continue to evolve under a combination of human and environmental pressures. A better knowledge of the mechanisms underlying the dynamics of crop diversity in these agrosystems is crucial to sustain food security and farmers’ self-reliance. It requires as a first step, anchoring a description of the available diversity in its geographical, environmental, cultural and socio-economic context. Methods We conducted interviews with farmers cultivating durum wheat in two contrasted traditional agrosystems of Morocco in the Pre-Rif (163 farmers) and in the oases of the Atlas Mountains (110 farmers). We documented the varietal diversity of durum wheat, the main characteristics of the farms, the farming and seed management practices applied to durum wheat, and the farmers’ perception of their varieties. Results As expected in traditional agrosystems, farmers largely practiced diversified subsistence agriculture on small plots and relied on on-farm seed production or informal seed exchange networks. Heterogeneity nevertheless prevailed on many variables, especially on the modernization of practices in the Pre-Rif region. Fourteen (resp. 11) traditional and 5 (resp. 3) modern varieties were identified in the Pre-Rif region (resp. in the Atlas Mountains). The majority of farmers grew a single variety, and most traditional varieties were distributed in restricted geographical areas. At the farm level, more than half of the varieties were renewed in the last decade in the Pre-Rif, a more rapid renewal than in the Atlas Mountain. Modern varieties were more prevalent in the Pre-Rif region and were integrated in the traditional practices of seed production, selection and exchange. They were clearly distinguished by the farmers from the landraces, the last ones being appreciated for their quality traits. Conclusions The surveyed traditional agrosystems constitute open, dynamic and heterogeneous entities. We suggest that competing factors could favour or limit the cultivation of improved varieties and the erosion of original durum wheat diversity. This first description opens the way to focused further investigations, including complementing variety names with cultural, genetic and phenotypic information and unravelling the multidimensional factors and consequences of modern variety adoption. PMID:25027694
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prescott, Ryan; Marger, Bernard L.; Chiu, Ailsa
During the second iteration of the US NDC Modernization Elaboration phase (E2), the SNL US NDC Modernization project team completed follow-on COTS surveys & exploratory prototyping related to the Object Storage & Distribution (OSD) mechanism, and the processing control software infrastructure. This report summarizes the E2 prototyping work.
Person or Platform: A New Look at Selecting the Air and Missile Defense Commander
2016-05-13
29 Christopher Moran, Lieutenant Commander, USN and Ryan Heilmann, Lieutenant, USN, “The Elephant in the Room: E-2D and Distributed...Lethality,” Center for International Maritime Security (blog), February 25, 2016, http://cimsec.org/the- elephant -in-the-room-e-2d-and-distributed...Ryan Heilmann, Lieutenant, USN. “The Elephant in the Room: E-2D and Distributed Lethality.” Center for International Maritime Security (blog
The Operator Shell: A means of privilege distribution under Unix
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neuman, M.; Christoph, G.
1994-03-01
The Operator Shell (Osh) is a setuid root, security enhanced, restricted shell for providing fine-grain distribution of system privileges for a wide range of usages and requirements. Osh offers a marked improvement over other Unix privilege distribution systems in its ability to specify access to both commands and files, auditing features, and familiar interface. This paper describes the design, features, security considerations, internals, and applications of the Operator Shell.
Study on Mergers. A Rationale for Conglomerate Mergers
1978-11-01
acquired firms gain on the average. ([32], p. 175). The key variable explaining this distribution of costs and benefits is the "premium over the market...displays a wide variety of alternatives ( securities of shares) for the investor to distribute his budget. The investor is assumed to be a price-taker...any cash dividend or other cash distribution ). A portfolio is any combination of securities in the hands of an investor. At the extremes, a
Towards a National Space Weather Predictive Capability
NASA Astrophysics Data System (ADS)
Fox, N. J.; Ryschkewitsch, M. G.; Merkin, V. G.; Stephens, G. K.; Gjerloev, J. W.; Barnes, R. J.; Anderson, B. J.; Paxton, L. J.; Ukhorskiy, A. Y.; Kelly, M. A.; Berger, T. E.; Bonadonna, L. C. M. F.; Hesse, M.; Sharma, S.
2015-12-01
National needs in the area of space weather informational and predictive tools are growing rapidly. Adverse conditions in the space environment can cause disruption of satellite operations, communications, navigation, and electric power distribution grids, leading to a variety of socio-economic losses and impacts on our security. Future space exploration and most modern human endeavors will require major advances in physical understanding and improved transition of space research to operations. At present, only a small fraction of the latest research and development results from NASA, NOAA, NSF and DoD investments are being used to improve space weather forecasting and to develop operational tools. The power of modern research and space weather model development needs to be better utilized to enable comprehensive, timely, and accurate operational space weather tools. The mere production of space weather information is not sufficient to address the needs of those who are affected by space weather. A coordinated effort is required to support research-to-applications transition efforts and to develop the tools required those who rely on this information. In this presentation we will review the space weather system developed for the Van Allen Probes mission, together with other datasets, tools and models that have resulted from research by scientists at JHU/APL. We will look at how these, and results from future missions such as Solar Probe Plus, could be applied to support space weather applications in coordination with other community assets and capabilities.
[Medical data security in medico-legal opinioning].
Susło, Robert; Swiatek, Barbara
2005-01-01
Medical data security can be approached in medico-legal opinioning in three main situations: security of medical data, on which the opinion should be based, opinioning itself and whether the medical data security was properly ensured and ensuring medical data security during medico-legal opinion giving. The importance of medical data security, during collecting, processing and storing, as well in medical as in legal institutions, is of major importance for the possibility of providing a proper medico-legal opinion. Theoretically speeking, it is possible to give a proper medico-legal opinion using incorrect data, but the possibility is low. When the expert is given improper, unreadable, incomplete or even bogus in part or in the whole medical data it is extremely possible, that he fails in giving his opinion. The term "medical data" was defined and subsequently there was a brief review of medical data storing methods made and specific threats bound with them, based on modern literature. The authors also pointed out possible methods of preventing the threats. They listed Polish as well as international regulations and laws concerning the problem, accenting the importance of preserving medical data for the purposes of medico-legal opinioning.
1999-02-01
Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be
Tracking the majority: households, older workers, and retirement during the Great Depression.
Moen, J R; Gratton, B
2000-01-01
Well into the 20th century, elderly people relied on traditional means of support, such as children's financial contributions or continued labor force activity. After the institution of Social Security in the late 1930s, retirement--permanent withdrawal from the labor force with financial arrangements made for support--became an expected part of the life cycle of men 65 years and older in the United States. This research explores the extent of retirement and methods to finance it in the period just before Social Security became available. The 1935-1936 Study of Consumer Purchases (SCP) contains information on demographic and economic conditions for 5,975 households. The SCP is a rich but underutilized source of data on household behavior. The data allow two definitions of labor force activity to be constructed; descriptive statistics identify factors associated with retirement. Alternative sources of support, such as pensions and investment income, have been thought to be relatively insignificant before the 1940s. This article shows that retirement in the modern sense appeared before state provision of support for aged persons. SCP data indicate considerable reliance on such financial instruments, a particularly noteworthy result given Depression conditions. Pension and investment income also helps identify persons who might report a gainful occupation but appear to have withdrawn from labor force activity, meeting a modern definition of retirement. The SCP, collected just as Social Security was enacted, reveals that nonfamilial sources of income like pensions and investments had begun to underwrite retirement without dependence on family members. Many older persons relied on these instruments for support in old age, and many did not have children present in their households. These results constitute evidence for an independent, nonfamily-based retirement before governmental provision of assistance through Social Security.
China's approach to control of HIV. Modern use of tradition in a public security system.
Anderson, A F
1995-01-01
HIV/AIDS control policy in China focuses on high risk populations. The public security system is intricately intertwined with the Chinese government's HIV control activities. The government can justify its control of high risk activities because prostitution, related trafficking in females, drug abuse, and drug trafficking are elements of the Six Evils: social problems considered to be pre-revolutionary, influenced by decadent western morality, and incompatible with modernization. Public security campaigns involve arresting tens of thousands of people annually in the combined efforts against HIV and the social evils. Instigators of crime are given punitive prison sentences. For their victims, however, incarceration leans toward treatment. The moral-rehabilitative philosophy is the normative foundation of the Chinese criminal justice process. Confucian thought holds that teaching the disobedient person proper social conduct, not punishment, will effect endless change. So correction officials use patient persuasion and re-education with most criminals. The public security system coercively collects drug abusers for as much as three months of counseling and detoxification (methadone or clonidine). The police detain prostitutes for 6 months to 2 years for re-education, including legal indoctrination, labor, and prevention of sexually transmitted diseases. Family members and community groups participate in treatment and aftercare. All drug abusers and prostitutes undergo HIV testing. HIV-positive offenders are separated from HIV-negative offenders. Pimps, panderers, or traffickers in females or drugs are either executed or put in prison for at least 10 years. A weakness of China's approach is its exclusive focus on high-risk groups rather than on high-risk practices. This approach assumes HIV will be restricted to these groups. Police will likely increase its punitive and regressive responses to group members as its approach fails to prevent HIV transmission.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Solis, John Hector
In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less
Addressing social resistance in emerging security technologies
Mitchener-Nissen, Timothy
2013-01-01
In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
.... Each applicant also distributed preferred shares of Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to holders of applicants' Auction Rate Preferred Shares, DARTS, or Auction... distributed Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to the holders of...
Operation of remote mobile sensors for security of drinking water distribution systems.
Perelman, By Lina; Ostfeld, Avi
2013-09-01
The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. Copyright © 2013 Elsevier Ltd. All rights reserved.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.
Zhang, Guomei; Sun, Hao
2016-12-16
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks
Zhang, Guomei; Sun, Hao
2016-01-01
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282
Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types
ERIC Educational Resources Information Center
Grossklags, Jens
2009-01-01
Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…
Internet Portal For A Distributed Management of Groundwater
NASA Astrophysics Data System (ADS)
Meissner, U. F.; Rueppel, U.; Gutzke, T.; Seewald, G.; Petersen, M.
The management of groundwater resources for the supply of German cities and sub- urban areas has become a matter of public interest during the last years. Negative headlines in the Rhein-Main-Area dealt with cracks in buildings as well as damaged woodlands and inundated agriculture areas as an effect of varying groundwater levels. Usually a holistic management of groundwater resources is not existent because of the complexity of the geological system, the large number of involved groups and their divergent interests and a lack of essential information. The development of a network- based information system for an efficient groundwater management was the target of the project: ?Grundwasser-Online?[1]. The management of groundwater resources has to take into account various hydro- geological, climatic, water-economical, chemical and biological interrelations [2]. Thus, the traditional approaches in information retrieval, which are characterised by a high personnel and time expenditure, are not sufficient. Furthermore, the efficient control of the groundwater cultivation requires a direct communication between the different water supply companies, the consultant engineers, the scientists, the govern- mental agencies and the public, by using computer networks. The presented groundwater information system consists of different components, especially for the collection, storage, evaluation and visualisation of groundwater- relevant information. Network-based technologies are used [3]. For the collection of time-dependant groundwater-relevant information, modern technologies of Mobile Computing have been analysed in order to provide an integrated approach in the man- agement of large groundwater systems. The aggregated information is stored within a distributed geo-scientific database system which enables a direct integration of simu- lation programs for the evaluation of interactions in groundwater systems. Thus, even a prognosis for the evolution of groundwater states can be given. In order to gener- ate reports automatically, technologies are utilised. The visualisation of geo-scientific databases in the internet considering their geographic reference is performed with internet map servers. According to the communication of the map server with the un- derlying geo-scientific database, it is necessary that the demanded data can be filtered interactively in the internet browser using chronological and logical criteria. With re- gard to public use the security aspects within the described distributed system are of 1 major importance. Therefore, security methods for the modelling of access rights in combination with digital signatures have been analysed and implemented in order to provide a secure data exchange and communication between the different partners in the network 2
One Step Quantum Key Distribution Based on EPR Entanglement.
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-06-30
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
ERIC Educational Resources Information Center
Herrenden-Harker, B. D.
1997-01-01
Presents a modern Periodic Table based on the electron distribution in the outermost shell and the order of filling of the sublevels within the shells. Enables a student to read off directly the electronic configuration of the element and the order in which filling occurs. (JRH)
Microgrid Controls | Grid Modernization | NREL
Systems Integration Facility. Microgrid Controller Interaction with Distribution Management Systems This project investigates the interaction of distribution management systems with local controllers, including microgrid controllers. The project is developing integrated control and management systems for distribution
[Towards universal nomenclature for urgent surgical care].
Liakhovs'kyĭ, V I; Dem'ianiuk, D H; Kravtsiv, M I; Borkunov, A L; Sapun, L V
2013-06-01
In a modern professional literature the diseases, which undoubtedly threaten the patient's health and life, are called an urgent, special, emergent, fixed-date, etc. Not rare these terms are used simultaneously. Such a plurality of names of a quite dangerous state causes sometimes in these conditions uncertainty to seek help of a specialists and loss of a time. Modern dictionaries of a foreign languages words, of a foreign languages words in Ukrainian language, medical, big explanatory dictionary of a modern Ukrainian language definitely explains, that these terms are synonyms. All of them mean unconditional, timing. And every expression may be used in this context. The above mentioned suggestions and thoughts do not promote a secure fixing in the citizens consciousness the undoubtedness, the disease consequences danger, a threat to health and life. To deposit this in their awareness it is possible not by amorphous depiction, but using a singular, brief, firm term - an urgent.
Teijink, J A W; van Herwaarden, J A; van den Berg, J C; Overtoom, T C; Moll, F L
2004-06-01
In the treatment of coronary artery disease, peripheral loss of a coronary stent is an unusual complication. We present the case of a patient who suggested that his right leg claudication was caused by a slipped coronary stent 2 years previously. The patient was convinced about this unusual finding based on an airport security check. Examination proved him to be right. However, the ability to detect an object using eddy currents is dependent on the object's permeability and its conductivity. Ferrous (iron) content is not the critical factor. Modern implant materials and processing techniques result in implants that are difficult to magnetize i.e. their permeability is very low. In addition their conductivity is very low. This enables modern implants to escape detection at airports. For this reason the event at the airport, as described by our patient, is considered coincidental.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lu Hua; Department of Mathematics and Physics, Hubei University of Technology, Wuhan 430068; Fung, Chi-Hang Fred
2011-10-15
In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD protocol with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD protocol against generalmore » attacks.« less
2013-09-01
2012.0002- IR -EP7-A 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE A...extremist web forums is directed at Western audiences and supports Homeland attacks. (U.S. Department of Homeland Security Office of Intelligence and...23 In this context, “before the event.” 24 Yung and Benichou’s paper originally was presented at the 5th Fire
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation
NASA Astrophysics Data System (ADS)
Buhrman, Harry; Christandl, Matthias; Schaffner, Christian
2012-10-01
A fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other’s input than what is implied by the value of the function. In this Letter, we show that any quantum protocol for the computation of a classical deterministic function that outputs the result to both parties (two-sided computation) and that is secure against a cheating Bob can be completely broken by a cheating Alice. Whereas it is known that quantum protocols for this task cannot be completely secure, our result implies that security for one party implies complete insecurity for the other. Our findings stand in stark contrast to recent protocols for weak coin tossing and highlight the limits of cryptography within quantum mechanics. We remark that our conclusions remain valid, even if security is only required to be approximate and if the function that is computed for Bob is different from that of Alice.
Complete insecurity of quantum protocols for classical two-party computation.
Buhrman, Harry; Christandl, Matthias; Schaffner, Christian
2012-10-19
A fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other's input than what is implied by the value of the function. In this Letter, we show that any quantum protocol for the computation of a classical deterministic function that outputs the result to both parties (two-sided computation) and that is secure against a cheating Bob can be completely broken by a cheating Alice. Whereas it is known that quantum protocols for this task cannot be completely secure, our result implies that security for one party implies complete insecurity for the other. Our findings stand in stark contrast to recent protocols for weak coin tossing and highlight the limits of cryptography within quantum mechanics. We remark that our conclusions remain valid, even if security is only required to be approximate and if the function that is computed for Bob is different from that of Alice.
Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications
NASA Astrophysics Data System (ADS)
Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu
2007-11-01
Since the security of all modern cryptographic techniques relies on unpredictable and irreproducible digital keys generated by random-number generators (RNGs), the realization of high-quality RNG is essential for secure communications. In this report, a new RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating silicon single-electron transistor (SET) having nearby an electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, stochastic single-electron capture/emission processes to/from the electron pocket are detected with high sensitivity by the SET, and result in giant random telegraphic signals (GRTS) on the SET current. It is experimentally demonstrated that the single-electron RNG generates extremely high-quality random digital sequences at room temperature, in spite of its simple configuration. Because of its small-size and low-power properties, the single-electron RNG is promising as a key nanoelectronic device for future ubiquitous computing systems with highly secure mobile communication capabilities.
Secure quantum key distribution using continuous variables of single photons.
Zhang, Lijian; Silberhorn, Christine; Walmsley, Ian A
2008-03-21
We analyze the distribution of secure keys using quantum cryptography based on the continuous variable degree of freedom of entangled photon pairs. We derive the information capacity of a scheme based on the spatial entanglement of photons from a realistic source, and show that the standard measures of security known for quadrature-based continuous variable quantum cryptography (CV-QKD) are inadequate. A specific simple eavesdropping attack is analyzed to illuminate how secret information may be distilled well beyond the bounds of the usual CV-QKD measures.
Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex
2011-04-15
In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.
Privacy and security in teleradiology.
Ruotsalainen, Pekka
2010-01-01
Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi
2018-01-01
Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.
Optical image encryption using multilevel Arnold transform and noninterferometric imaging
NASA Astrophysics Data System (ADS)
Chen, Wen; Chen, Xudong
2011-11-01
Information security has attracted much current attention due to the rapid development of modern technologies, such as computer and internet. We propose a novel method for optical image encryption using multilevel Arnold transform and rotatable-phase-mask noninterferometric imaging. An optical image encryption scheme is developed in the gyrator transform domain, and one phase-only mask (i.e., phase grating) is rotated and updated during image encryption. For the decryption, an iterative retrieval algorithm is proposed to extract high-quality plaintexts. Conventional encoding methods (such as digital holography) have been proven vulnerably to the attacks, and the proposed optical encoding scheme can effectively eliminate security deficiency and significantly enhance cryptosystem security. The proposed strategy based on the rotatable phase-only mask can provide a new alternative for data/image encryption in the noninterferometric imaging.
Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture
NASA Astrophysics Data System (ADS)
Jurčević, M.; Hegeduš, H.; Golub, M.
2010-01-01
Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.
Motion/imagery secure cloud enterprise architecture analysis
NASA Astrophysics Data System (ADS)
DeLay, John L.
2012-06-01
Cloud computing with storage virtualization and new service-oriented architectures brings a new perspective to the aspect of a distributed motion imagery and persistent surveillance enterprise. Our existing research is focused mainly on content management, distributed analytics, WAN distributed cloud networking performance issues of cloud based technologies. The potential of leveraging cloud based technologies for hosting motion imagery, imagery and analytics workflows for DOD and security applications is relatively unexplored. This paper will examine technologies for managing, storing, processing and disseminating motion imagery and imagery within a distributed network environment. Finally, we propose areas for future research in the area of distributed cloud content management enterprises.
ERIC Educational Resources Information Center
Hungerford, Thomas L.
2006-01-01
The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…
17 CFR 240.10b-17 - Untimely announcements of record dates.
Code of Federal Regulations, 2010 CFR
2010-04-01
... distribution and if that security is a right or a warrant, the subscription price, (e) In any other property... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Untimely announcements of record dates. 240.10b-17 Section 240.10b-17 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
High-Speed Large-Alphabet Quantum Key Distribution Using Photonic Integrated Circuits
2014-01-28
polarizing beam splitter, TDC: time-to-digital converter. Extra&loss& photon/bin frame size QSER secure bpp ECC secure&key&rate& none& 0.0031 64 14...to-digital converter. photon/frame frame size QSER secure bpp ECC secure&key& rate& 1.3 16 9.5 % 2.9 layered LDPC 7.3&Mbps& Figure 24: Operating
Additional Security Considerations for Grid Management
NASA Technical Reports Server (NTRS)
Eidson, Thomas M.
2003-01-01
The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.
Practical challenges in quantum key distribution
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...
2016-11-08
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Information Operations & Security
2012-03-05
Fred B. Schneider, Cornell The Promise of Security Metrics • Users: Purchasing decisions – Which system is the better value? • Builders ...Engineering University of Maryland, College Park DISTRIBUTION A: Approved for public release; distribution is unlimited. Digital Multimedia Anti...fingerprints for multimedia content: • Determine the time and place of recordings • Detect tampering in the multimedia content; bind video and
Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bovino, F. A.; Colla, A. M.; Castagnoli, G.
2003-09-01
We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.
Practical challenges in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BioMETRX, Inc., Biopure Corp. (n/k/a PBBPC, Inc.), Distributed Energy Systems Corp., Fortified Holdings Corp., Knobias, Inc., and One IP Voice... concerning the securities of BioMETRX, Inc. because it has not filed any periodic reports since the period...
Experimental Measurement-Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-01
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Experimental measurement-device-independent quantum key distribution.
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-27
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Authenticated multi-user quantum key distribution with single particles
NASA Astrophysics Data System (ADS)
Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen
2016-03-01
Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.
ERIC Educational Resources Information Center
Pickett, Justin T.; Mears, Daniel P.; Stewart, Eric A.; Gertz, Marc
2013-01-01
In "The Culture of Control: Crime and Social Order in Contemporary Society," David Garland linked contemporary crime control policies and welfare reforms to a cultural formation that he termed the "crime complex of late modernity." According to Garland, once established, the crime complex exerts a contemporaneous effect on…
ERIC Educational Resources Information Center
Samier, Eugenie
2015-01-01
The United Arab Emirates (UAE) is a small state transitioning from traditional communities into a modern society. This is a complex process: it involves instilling a national identity over tribal structures; modernising and technologising while retaining Islam; ensuring a high level of security while allowing for a liberal and relatively free…
Surface Transportation Security Priority Assessment
2010-03-01
intercity buses), and pipelines, and related infrastructure (including roads and highways), that are within the territory of the United States...Modernizing the information technology infrastructure used to vet the identity of travelers and transportation workers Using terrorist databases to...examination of persons travelling , surface transportation modes tend to operate in a much more open environment, making it difficult to screen workers
ERIC Educational Resources Information Center
Lopez-Calix, Jose; Melo, Alberto
Since his inauguration in July 2001, Peruvian President Alejandro Toledo has proposed to take actions in the areas of macroeconomic stabilization; reopening of country's access to international financial markets; budget modernization and state decentralization; social policy; revamping of the armed forces, police, and internal security services;…
Cybersecurity: Authoritative Reports and Resources
2013-04-17
Consumer Credit Cybersecurity: An Overview of Risks to Critical Infrastructure July 26, 2011 Energy and Commerce Oversight and Investigations...require greater protection for sensitive consumer data and timely notification in case of breach June 15, 2011 Energy and Commerce Commerce ...Financial Sector June 21, 2011 Commerce , Science and Transportation Privacy and Data Security: Protecting Consumers in the Modern World June 29, 2011
Risk Literacy: Concepts and Pedagogical Implications for Early Childhood Education
ERIC Educational Resources Information Center
Nikiforidou, Zoi
2017-01-01
Taking risks and enjoying challenges are fundamental to the lives of young children from a developmental and evolutionary point of view. However, in modern societies, increasing concern about dangers and injuries has led to the escalation in regulation and provisions for the safety of young children. This intent to establish secure and risk-free…
2015 Enterprise Strategic Vision
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-08-01
This document aligns with the Department of Energy Strategic Plan for 2014-2018 and provides a framework for integrating our missions and direction for pursuing DOE’s strategic goals. The vision is a guide to advancing world-class science and engineering, supporting our people, modernizing our infrastructure, and developing a management culture that operates a safe and secure enterprise in an efficient manner.
Integrating Unmanned Aircraft Systems into Modern Policing in An Urban Environment
2012-09-01
University of Phoenix , 1994 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND...PERSPECTIVE.................................................. 23 C. “ LIGHT ” UAS OPERATIONAL EXEMPTIONS ................................. 27 D...activity) utilizing a FLIR device capable of thermal imaging detection to determine if Kyllo was using powerful light to cultivate marijuana.37 The
ERIC Educational Resources Information Center
Sjoberg, Ola
2010-01-01
This article argues that unemployment benefits are providing a crucial but often overlooked function by reducing the insecurity associated with modern labor markets. Because job insecurity is associated with concerns about future financial security, economic support during unemployment may lessen the negative effects of job insecurity on employed…
Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari
2002-01-01
The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.
Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).
Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie
2017-10-30
Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.
A HUMAN FACTORS META MODEL FOR U.S. NUCLEAR POWER PLANT CONTROL ROOM MODERNIZATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Joe, Jeffrey C.
Over the last several years, the United States (U.S.) Department of Energy (DOE) has sponsored human factors research and development (R&D) and human factors engineering (HFE) activities through its Light Water Reactor Sustainability (LWRS) program to modernize the main control rooms (MCR) of commercial nuclear power plants (NPP). Idaho National Laboratory (INL), in partnership with numerous commercial nuclear utilities, has conducted some of this R&D to enable the life extension of NPPs (i.e., provide the technical basis for the long-term reliability, productivity, safety, and security of U.S. NPPs). From these activities performed to date, a human factors meta model formore » U.S. NPP control room modernization can now be formulated. This paper discusses this emergent HFE meta model for NPP control room modernization, with the goal of providing an integrated high level roadmap and guidance on how to perform human factors R&D and HFE for those in the U.S. nuclear industry that are engaging in the process of upgrading their MCRs.« less
[Research of regional medical consumables reagent logistics system in the modern hospital].
Wu, Jingjiong; Zhang, Yanwen; Luo, Xiaochen; Zhang, Qing; Zhu, Jianxin
2013-09-01
To explore the modern hospital and regional medical consumable reagents logistics system management. The characteristics of regional logistics, through cooperation between medical institutions within the region, and organize a wide range of special logistics activities, to make reasonable of the regional medical consumable reagents logistics. To set the regional management system, dynamic management systems, supply chain information management system, after-sales service system and assessment system. By the research of existing medical market and medical resources, to establish the regional medical supplies reagents directory and the initial data. The emphasis is centralized dispatch of medical supplies reagents, to introduce qualified logistics company for dispatching, to improve the modern hospital management efficiency, to costs down. Regional medical center and regional community health service centers constitute a regional logistics network, the introduction of medical consumable reagents logistics services, fully embodies integrity level, relevance, purpose, environmental adaptability of characteristics by the medical consumable reagents regional logistics distribution. Modern logistics distribution systems can increase the area of medical consumables reagent management efficiency and reduce costs.
Data security issues arising from integration of wireless access into healthcare networks.
Frenzel, John C
2003-04-01
The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.
Risk Perception as the Quantitative Parameter of Ethics and Responsibility in Disaster Study
NASA Astrophysics Data System (ADS)
Kostyuchenko, Yuriy; Movchan, Dmytro
2014-05-01
Intensity of impacts of natural disasters is increasing with climate and ecological changes spread. Frequency of disasters is increasing, and recurrence of catastrophes characterizing by essential spatial heterogeneity. Distribution of losses is fundamentally non-linear and reflects complex interrelation of natural, social and environmental factor in the changing world on multi scale range. We faced with new types of risks, which require a comprehensive security concept. Modern understanding of complex security, and complex risk management require analysis of all natural and social phenomena, involvement of all available data, constructing of advanced analytical tools, and transformation of our perception of risk and security issues. Traditional deterministic models used for risk analysis are difficult applicable for analysis of social issues, as well as for analysis of multi scale multi-physics phenomena quantification. Also parametric methods are not absolutely effective because the system analyzed is essentially non-ergodic. The stochastic models of risk analysis are applicable for quantitative analysis of human behavior and risk perception. In framework of risk analysis models the risk perception issues were described. Risk is presented as the superposition of distribution (f(x,y)) and damage functions (p(x,y)): P →δΣ x,yf(x,y)p(x,y). As it was shown risk perception essentially influents to the damage function. Basing on the prospect theory and decision making under uncertainty on cognitive bias and handling of risk, modification of damage function is proposed: p(x,y|α(t)). Modified damage function includes an awareness function α(t), which is the system of risk perception function (rp) and function of education and log-term experience (c) as: α(t) → (c - rp). Education function c(t) describes the trend of education and experience. Risk perception function rp reflects security concept of human behavior, is the basis for prediction of socio-economic and socio-ecological processes. Also there is important positive feedback of risk perception function to distribution function. Risk perception is essentially depends of short-term recent events impact in multi agent media. This is managed function. The generalized view of awareness function is proposed: α(t) = δΣ ic - rpi. Using this form separate parameters has been calculated. For example, risk perception function is about 15-55% of awareness function depends of education, age and social status of people. Also it was estimated that fraction of awareness function in damage function, and so in function of risk is about 15-20%. It means that no less than 8-12% of direct losses depend of short-term responsible behavior of 'information agents': social activity of experts, scientists, correct discussions on ethical issues in geo-sciences and media. Other 6-9% of losses are connected with level of public and professional education. This area is also should be field of responsibility of geo-scientists.
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Looking for a correlation between terrestrial age and noble gas record of H chondrites
NASA Astrophysics Data System (ADS)
Loeken, Th.; Schultz, L.
1994-07-01
On the basis of statistically significant concentration differences of some trace elements, it has been suggested that H chondrites found in Antarctica and Modern Falls represent members of different extraterrestrial populations with different thermal histories. It was also concluded that H chondrites found in Victoria Land (Allan Hills) differ chemically from those found in Queen Maud Land (Yamato Mountains), an effect that could be based on the different terrestrial age distribution of both groups. This would imply a change of the meteoroid flux hitting the Earth on a timescale that is comparable to typical terrestrial ages of Antarctic chondrites. A comparison of the noble gas record of H chondrites from the Allan Hills icefields and Modern Fall shows that the distributions of cosmic-ray exposure ages and the concentrations of radiogenic He-4 and Ar-40 are very similar. In an earlier paper we compared the noble gas measurements of 20 Yamato H contents with meteorites from the Allan Hills region and Modern Falls. Similar distributions were found. The distribution of cosmic-ray exposure ages and radiogenic He-4 and Ar-40 gas contents as a function of the terrestrial age is investigated in these chondrites. The distribution shows the well-known 7-Ma-cluster indicating that about 40% of the H chondrites were excavated from their parent body in a single event. Both populations, Antarctic Meteorites and Modern Falls, exhibit the same characteristic feature: a major meteoroid-producing event about 7 Ma. This indicates that one H-group population delivers H chondrites to Antarctica and the rest of the world. Cosmic-ray exposure ages and thermal-history indicaters like radiogenic noble gases show no evidence of a change in the H chondrite meteoroid population during the last 200,000 years.
One Step Quantum Key Distribution Based on EPR Entanglement
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-01-01
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865
Hybrid network defense model based on fuzzy evaluation.
Cho, Ying-Chiang; Pan, Jen-Yi
2014-01-01
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.
Information Security and the Internet.
ERIC Educational Resources Information Center
Doddrell, Gregory R.
1996-01-01
As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…
NASA Astrophysics Data System (ADS)
Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa
2018-03-01
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.
NASA Astrophysics Data System (ADS)
Xu, Mingfeng; Pan, Wei; Zhang, Liyue
2018-07-01
Despite the intuition that synchronization of different nodes in coupled oscillator networks results from information exchange between them, it has recently been shown that remote nodes could be partially synchronous even when they are separated by intermediately unsynchronized nodes. Here based on electro-optic system, we report on a more stronger form of such synchronization pattern that is termed as secure remote synchronization, in which two remotely separated nodes could have identically synchronized dynamical behaviors while the rest of the network are both statistically and information-theoretically incoherent relative to the two synchronized nodes. The generalized form of mirror symmetry in the network structure is identified to be a key mechanism allowing for secure remote synchronization. Moreover, this synchronization mode is robust against a wild range of system parameters and noise perturbing the intermediary dynamics. The lack of information about the synchronized dynamics in the rest of the network suggests that our results could potentially lead to network-based solutions for secure key distribution and secure communication.
Practical secure quantum communications
NASA Astrophysics Data System (ADS)
Diamanti, Eleni
2015-05-01
We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.
Security of quantum key distribution with multiphoton components
Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing
2016-01-01
Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
Measurement-Device-Independent Quantum Key Distribution over 200 km
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei
2014-11-01
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.
Composable security proof for continuous-variable quantum key distribution with coherent States.
Leverrier, Anthony
2015-02-20
We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... page] Important Information on Penny Stocks The U.S. Securities and Exchange Commission (SEC) requires... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND...
Logistics Composite Model (LCOM) Workbook
1976-06-01
nc;-J to e UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Dots Ew.ervol. REPORT DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING FORM I...Controlling Office) 15. SECURITY CLASS. (of this report) Unclassified 158. DECLASSIFICATIONDOWNGRADING SCHEDULE 16. DISTRIBUTION STATEMENT (of this Report...ID SECURITY CLASSIFICATION OF THIS PAGE (When Des Entered) K7 UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE(Whon Dal Entore o l Logic networks
Local Area Network (LAN) Compatibility Issues
1991-09-01
September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V
Glossary: Defense Acquisition Acronyms and Terms. Revision 2
1987-07-01
Approved REPORT DOCUMENTATION PAGE OMBNo. 070-O 18 la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS % unclassified 2a. SECURITY CLASSIFICATION ...WORK UNIT Fort Belvoir, VA 22060-5426 ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification ) Glossary Defense Acquisition...DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION [RUNCLASSIFIED/UNLIMITED 0 SAME AS RPT 0 DTIC USERS unclassified 22a. NAME OF
Security of six-state quantum key distribution protocol with threshold detectors
Kato, Go; Tamaki, Kiyoshi
2016-01-01
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610
Hough, Susan E.
2013-01-01
Recent parallel development of improved quantitative methods to analyze intensity distributions for historical earthquakes and of web‐based systems for collecting intensity data for modern earthquakes provides an opportunity to reconsider not only important individual historical earthquakes but also the overall characterization of intensity distributions for historical events. The focus of this study is a comparison between intensity distributions of historical earthquakes with those from modern earthquakes for which intensities have been determined by the U.S. Geological Survey “Did You Feel It?” (DYFI) website (see Data and Resources). As an example of a historical earthquake, I focus initially on the 1843 Marked Tree, Arkansas, event. Its magnitude has been previously estimated as 6.0–6.2. I first reevaluate the macroseismic effects of this earthquake, assigning intensities using a traditional approach, and estimate a preferred magnitude of 5.4. Modified Mercalli intensity (MMI) values for the Marked Tree earthquake are higher, on average, than those from the 2011 >Mw 5.8 Mineral, Virginia, earthquake for distances ≤500 km but comparable or lower on average at larger distances, with a smaller overall felt extent. Intensity distributions for other moderate historical earthquakes reveal similar discrepancies; the discrepancy is also even more pronounced using earlier published intensities for the 1843 earthquake. I discuss several hypotheses to explain the discrepancies, including the possibility that intensity values associated with historical earthquakes are commonly inflated due to reporting/sampling biases. A detailed consideration of the DYFI intensity distribution for the Mineral earthquake illustrates how reporting and sampling biases can account for historical earthquake intensity biases as high as two intensity units and for the qualitative difference in intensity distance decays for modern versus historical events. Thus, intensity maps for historical earthquakes tend to imply more widespread damage patterns than are revealed by intensity distributions of modern earthquakes of comparable magnitude. However, intensity accounts of historical earthquakes often include fragmentary accounts suggesting long‐period shaking effects that will likely not be captured fully in historical intensity distributions.
1993-10-01
AD-A273 247 AD____ CONTRACT NO: DAMD17-90-C-0124 TITLE: AUTORADIOGRAPHIC DISTRIBUTION AND APPLIED PHARMACOLOGICAL CHARACTERISTICS OF DEXTROMETHORPHAN ...Anticonvulsants, Antitissue, Dextromethorphan , Autoradiography, Pharmacokinetics 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION...middle cerebral artery occlusion model with dextromethorphan , carbetapentane and three of the carbetapentane analogues, 11, B and D, which were
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... Corporate Reorganizations; Distributions Under Sections 368(a)(1)(D) and 354(b)(1)(B); Correction AGENCY... in section 368(a)(1)(D) where no stock and/or securities of the acquiring corporation is issued and... guidance regarding the determination of the basis of stock or securities in a reorganization described in...
Optimal service distribution in WSN service system subject to data security constraints.
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-08-04
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm.
Optimal Service Distribution in WSN Service System Subject to Data Security Constraints
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-01-01
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346
Zhao, Hong-Bo; Ma, Yan-Ji
2014-02-01
According to the cultivated land ecological security in major grain production areas of Northeast China, this paper selected 48 counties of Jilin Province as the research object. Based on the PSR-EES conceptual framework model, an evaluation index system of cultivated land ecological security was built. By using the improved TOPSIS, Markov chains, GIS spatial analysis and obstacle degree models, the spatial-temporal pattern of cultivated land ecological security and the obstacle factors were analyzed from 1995 to 2011 in Jilin Province. The results indicated that, the composite index of cultivated land ecological security appeared in a rising trend in Jilin Province from 1995 to 2011, and the cultivated land ecological security level changed from being sensitive to being general. There was a pattern of 'Club Convergence' in cultivated land ecological security level in each county and the spatial discrepancy tended to become larger. The 'Polarization' trend of cultivated land ecological security level was obvious. The distributions of sensitive level and critical security level with ribbon patterns tended to be dispersed, the general security level and relative security levels concentrated, and the distributions of security level scattered. The unstable trend of cultivated land ecological security level was more and more obvious. The main obstacle factors that affected the cultivated land ecological security level in Jilin Province were rural net income per capita, economic density, the proportion of environmental protection investment in GDP, degree of machinery cultivation and the comprehensive utilization rate of industrial solid wastes.
Internet for law enforcement: a modern phenomena and a phenomenal tool
NASA Astrophysics Data System (ADS)
Wilsker, Ira
1997-02-01
There is an existing, low cost, and widely used framework in place for both the public distribution of law enforcement information, and the secure and restricted distribution of sensitive data. That is, of course, the Internet. Already, hundreds of law enforcement agencies around the world, at all levels, are utilizing this most cost effective medium for a variety of tasks. In the public mode, now with 21 - 35 million individuals in the U.S. having access, agencies typically make available contact information, Community Oriented Policing (COPS), employment, crime prevention, DARE, police explorer, and other helpful information. Most often this information is available via WWW page, or a local BBS. Other public access is available to thousands of specialized sites, such as forensics, training, narcotics, firearms, terrorism and hate crimes, K9, police supply, traffic related, crime prevention, most wanted, missing persons, etc. Public newsgroups provide a forum for local, national, and international law enforcement issues. In the private mode, there is a wide variety of restricted mail lists providing for the exchange of information on narrowly defined topics including forensics, firearms, COPS, officer survival, and other related areas. Traditional EMail provides another cost effective method for the exchange of information, either to a specific point, or broadcast to an explicit wide audience. As a secure method of quickly exchanging information in a most cost effective way, encrypted data, typically text, files, or images, can be instantly transmitted between individuals or agencies. Commonly available encryption technology (the most commonly used is PGP, a public key encryption utility), is freely or inexpensively available. An additional Internet benefit available to the law enforcement community, is the availability of software. Currently available is a variety of accident investigation, crime scene, dispatch, maintenance, evidence tracking, and other useful software. This software can typically be downloaded and updated for free, or for a nominal cost. It is imperative that more agencies make use of this valuable resource; while hundreds are, thousands are not.
ERIC Educational Resources Information Center
Li, Wenhao
2011-01-01
Distributed workflow technology has been widely used in modern education and e-business systems. Distributed web applications have shown cross-domain and cooperative characteristics to meet the need of current distributed workflow applications. In this paper, the author proposes a dynamic and adaptive scheduling algorithm PCSA (Pre-Calculated…
Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S
2011-06-06
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.
Experimental quantum key distribution with source flaws
NASA Astrophysics Data System (ADS)
Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong
2015-09-01
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.
NASA Astrophysics Data System (ADS)
Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.; Cai, Qing-Yu
2012-03-01
Privacy amplification (PA) is an essential postprocessing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.
Unconditional security of a three state quantum key distribution protocol.
Boileau, J-C; Tamaki, K; Batuwantudawe, J; Laflamme, R; Renes, J M
2005-02-04
Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the Bennett-Brassard 1984 and Bennett 1992 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three-state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has been shown only for the trivial intercept-resend eavesdropping strategy. In this Letter, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.
Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.
2011-01-01
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214