75 FR 17205 - Securities Offering Disclosures
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-05
... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Securities Offering Disclosures AGENCY... collection. Title of Proposal: Securities Offering Disclosures. OMB Number: 1550-0035. Form Numbers: SEC...: The Securities Offering regulation provides necessary information, including financial disclosure, to...
Arms Control and National Security: An Introduction. Advance Edition.
ERIC Educational Resources Information Center
Arms Control Association, Washington, DC.
Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…
12 CFR 563g.16 - Delayed or continuous offering and sale of securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delayed or continuous offering and sale of securities. 563g.16 Section 563g.16 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.16 Delayed or continuous offering and sale of securities. Any offer or...
12 CFR 16.9 - Securities offered and sold in holding company dissolution.
Code of Federal Regulations, 2014 CFR
2014-01-01
... dissolution. 16.9 Section 16.9 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.9 Securities offered and sold in holding company dissolution. Offers and sales of bank issued securities in connection with the dissolution of the holding company of...
12 CFR 16.9 - Securities offered and sold in holding company dissolution.
Code of Federal Regulations, 2013 CFR
2013-01-01
... dissolution. 16.9 Section 16.9 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.9 Securities offered and sold in holding company dissolution. Offers and sales of bank issued securities in connection with the dissolution of the holding company of...
12 CFR 16.9 - Securities offered and sold in holding company dissolution.
Code of Federal Regulations, 2011 CFR
2011-01-01
... dissolution. 16.9 Section 16.9 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.9 Securities offered and sold in holding company dissolution. Offers and sales of bank issued securities in connection with the dissolution of the holding company of...
12 CFR 16.9 - Securities offered and sold in holding company dissolution.
Code of Federal Regulations, 2010 CFR
2010-01-01
... dissolution. 16.9 Section 16.9 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.9 Securities offered and sold in holding company dissolution. Offers and sales of bank issued securities in connection with the dissolution of the holding company of...
12 CFR 16.9 - Securities offered and sold in holding company dissolution.
Code of Federal Regulations, 2012 CFR
2012-01-01
... dissolution. 16.9 Section 16.9 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.9 Securities offered and sold in holding company dissolution. Offers and sales of bank issued securities in connection with the dissolution of the holding company of...
Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J; Peña, Paola P; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J; Monteiro, Ligia; Lay, Keng-Ling
2013-01-01
The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the organization of children's behavior in naturalistic settings. Children (N = 547) were 10-72 months old. Child development experts (N = 81) from all countries provided definitions of optimal child secure base use. Findings indicate that children from all countries use their mother as a secure base. Children's organization of secure base behavior was modestly related to each other both within and across countries. Experts' descriptions of the optimally attached child were highly similar across cultures. © 2013 The Authors. Child Development © 2013 Society for Research in Child Development, Inc.
17 CFR 230.135 - Notice of proposed registered offerings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... effect that it does not constitute an offer of any securities for sale; and (2) Limited notice content... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Notice of proposed registered offerings. 230.135 Section 230.135 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
17 CFR 230.801 - Exemption in connection with a rights offering.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption in connection with a rights offering. 230.801 Section 230.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Exemptions for Cross-Border Rights Offerings...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form CB, report of sales of... Forms Pertaining to Exemptions § 239.800 Form CB, report of sales of securities in connection with an exchange offer or a rights offering. This Form is used to report sales of securities in connection with a...
17 CFR 242.105 - Short selling in connection with a public offering.
Code of Federal Regulations, 2010 CFR
2010-04-01
... period: (1) Beginning five business days before the pricing of the offered securities and ending with... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Short selling in connection with a public offering. 242.105 Section 242.105 Commodity and Securities Exchanges SECURITIES AND...
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Mangum, Kevin
2016-01-01
The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Communications in connection with certain registered offerings of asset-backed securities. 230.167 Section 230.167 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933...
McCue, M J; Thompson, J M; Dodd-McCue, D
Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.
17 CFR 240.14d-6 - Disclosure of tender offer information to security holders.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Disclosure of tender offer information to security holders. 240.14d-6 Section 240.14d-6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and...
17 CFR 230.606 - Offering not in excess of $100,000.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offering not in excess of $100,000. 230.606 Section 230.606 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small...
ERIC Educational Resources Information Center
California State Dept. of Education, Sacramento.
This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Definition for purposes of... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.133 Definition for purposes of section 5 of the Act, of “sale”, “offer...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
Code of Federal Regulations, 2010 CFR
2010-04-01
... RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and contracts relating to compensation...
17 CFR 229.512 - (Item 512) Undertakings.
Code of Federal Regulations, 2011 CFR
2011-04-01
... INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY... deviation from the low or high end of the estimated maximum offering range may be reflected in the form of... the registration statement is on Form S-8 (§ 239.16b of this chapter), and the information required to...
17 CFR 229.512 - (Item 512) Undertakings.
Code of Federal Regulations, 2012 CFR
2012-04-01
... INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY... deviation from the low or high end of the estimated maximum offering range may be reflected in the form of... the registration statement is on Form S-8 (§ 239.16b of this chapter), and the information required to...
17 CFR 229.512 - (Item 512) Undertakings.
Code of Federal Regulations, 2014 CFR
2014-04-01
... INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY... deviation from the low or high end of the estimated maximum offering range may be reflected in the form of... the registration statement is on Form S-8 (§ 239.16b of this chapter), and the information required to...
17 CFR 230.259 - Withdrawal or abandonment of offering statements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Withdrawal or abandonment of offering statements. 230.259 Section 230.259 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation A-Conditional Small Issues...
Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H
2014-03-28
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.
76 FR 73526 - Alternatives to the Use of External Credit Ratings in the Regulations of the OCC
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... Branches of Foreign Banks The OCC's regulations on permissible investment securities, securities offerings... to investment securities, securities offerings, and foreign bank capital equivalency deposits... 939A directs all Federal agencies to review, no later than one year after enactment, any regulation...
17 CFR 230.135 - Notice of proposed registered offerings.
Code of Federal Regulations, 2011 CFR
2011-04-01
... through any medium a notice of a proposed offering to be registered under the Act will not be deemed to... issuer is directing its offering to only a particular class of purchasers; (vii) Any statements or... offering. In a rights offering to existing security holders: (1) The class of security holders eligible to...
Redefining Security. A Report by the Joint Security Commission
1994-02-28
security policies. This report offers recommendations on developing new strategies for achieving security within our infor-mation systems, including...better, and we outline methods of improving government and industry personnel security poli- cies. We offer recommendations on developing new strategies ... strategies , sufficient funding, and management attention if our comput- ers and networks are to protect the confidentiality, integrity, and availability of
Public offerings of securities by petroleum industry: methods and costs of raising capital
DOE Office of Scientific and Technical Information (OSTI.GOV)
Siemon, D.
1978-01-01
This study examines public securities offerings by the petroleum industry and the flotation costs associated with raising capital through offerings to the public. Descriptive material is presented on an aggregate basis for the industry and also by selected company characteristics. Data were obtained from the Securities and Exchange Commission's records of registration statements for public offerings and include all public offerings registered with the SEC during the period January 1970 through October 1975. The petroleum industry issued 101 debt offerings and 1058 equity offerings during the time period. The total number of offerings for all industries was estimated to bemore » 20,000, so the petroleum industry accounted for roughly 5% of the total volume.« less
Outsourcing Security Services for Low Performance Portable Devices
NASA Astrophysics Data System (ADS)
Szentgyörgyi, Attila; Korn, András
The number of portable devices using wireless network technologies is on the rise. Some of these devices are incapable of, or at a disadvantage at using secure Internet services, because secure communication often requires comparatively high computing capacity. In this paper, we propose a solution which can be used to offer secure network services for low performance portable devices without severely degrading data transmission rates. We also show that using our approach these devices can utilize some secure network services which were so far unavailable to them due to a lack of software support. In order to back up our claims, we present performance measurement results obtained in a test network.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-01
... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... public offering of its securities and does not propose to make a public offering or engage in business of... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29333] Notice of Applications for...
12 CFR 563.76 - Offers and sales of securities at an office of a savings association.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Offers and sales of securities at an office of a savings association. 563.76 Section 563.76 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF... conversion stock offering. (b) Securities sales practices, advertisements, and other sales literature used in...
12 CFR 563.76 - Offers and sales of securities at an office of a savings association.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Offers and sales of securities at an office of a savings association. 563.76 Section 563.76 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF... conversion stock offering. (b) Securities sales practices, advertisements, and other sales literature used in...
17 CFR 230.165 - Offers made in connection with a business combination transaction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offers made in connection with a business combination transaction. 230.165 Section 230.165 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.165...
17 CFR 240.14d-2 - Commencement of a tender offer.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Commencement of a tender offer. 240.14d-2 Section 240.14d-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
76 FR 4231 - Issuer Review of Assets in Offerings of Asset-Backed Securities
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... issuers that also issue corporate securities are familiar with it. We previously have recognized that... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 229 and 230 [Release Nos. 33-9176, 34-63742; File No. S7-26-10] RIN 3235-AK76 Issuer Review of Assets in Offerings of Asset-Backed Securities AGENCY...
77 FR 67843 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-14
... securities that will be offered in a business combination, exchange offer or other reorganization requiring... SECURITIES AND EXCHANGE COMMISSION Submission for OMB Review; Comment Request Upon Written Request Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy...
Code of Federal Regulations, 2010 CFR
2010-04-01
... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.38 Section 239.38 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-8 may be used for...
Code of Federal Regulations, 2010 CFR
2010-04-01
... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.41 Section 239.41 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-80 may be used for...
75 FR 64182 - Issuer Review of Assets in Offerings of Asset-Backed Securities
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-19
... subject to Rule 13a-15, ABS issuers that also issue corporate securities are familiar with it. We... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 229, 230, 240, and 249 [Release Nos. 33-9150, 34-63091; File No. S7-26-10] RIN 3235-AK76 Issuer Review of Assets in Offerings of Asset-Backed Securities...
17 CFR 230.136 - Definition of certain terms in relation to assessable stock.
Code of Federal Regulations, 2010 CFR
2010-04-01
... relation to assessable stock. 230.136 Section 230.136 Commodity and Securities Exchanges SECURITIES AND... certain terms in relation to assessable stock. (a) An offer, offer to sell, or offer for sale of... shall not be deemed to include the offering or sale of assessable stock, at public auction or otherwise...
78 FR 25324 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-30
... rules governing offers and sales of securities made outside the United States without registration under... 5 of the Securities Act applies to offers and sales of securities outside of the United States...) Whether this collection of information is necessary for the proper performance of the functions of the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of securities to be offered to employees pursuant to employee benefit... employee benefit plans. (a) Any registrant that, immediately prior to the time of filing a registration... benefit plan. The form also is available for the exercise of employee benefit plan options by an employee...
75 FR 27602 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-17
... rules governing offers and sales of securities made outside the United States without registration under... clarification of the extent to which Section 5 of the Securities Act applies to offers and sales of securities... collection techniques or other forms of information technology. Consideration will be given to comments and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Definition for purposes of section 5 of the Act, of âsaleâ, âofferâ, âoffer to sellâ, and âoffer for saleâ. 230.133 Section 230.133..., SECURITIES ACT OF 1933 General § 230.133 Definition for purposes of section 5 of the Act, of “sale”, “offer...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Definition for purposes of section 5 of the Act, of âsaleâ, âofferâ, âoffer to sellâ, and âoffer for saleâ. 230.133 Section 230.133..., SECURITIES ACT OF 1933 General § 230.133 Definition for purposes of section 5 of the Act, of “sale”, “offer...
High Road Partnerships Report: Innovations in Building Good Jobs and Strong Communities.
ERIC Educational Resources Information Center
American Federation of Labor and Congress of Industrial Organizations, Washington, DC. Working for America Inst.
When deciding how to compete in the new global economy, employers can opt for "low-road" strategies such as low wages and no job security. Alternatively, they can choose the "high road" and compete by offering quality goods and services, innovation, and value. Fourteen successful "high-road" partnerships were examined…
17 CFR 230.155 - Integration of abandoned offerings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Integration of abandoned... GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.155 Integration of abandoned offerings... from integration of private and registered offerings. Because of the objectives of Rule 155 and the...
ERIC Educational Resources Information Center
Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William
2016-01-01
The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-13
...Pursuant to Section 943 of the Dodd-Frank Wall Street Reform and Consumer Protection Act \\1\\ we are proposing rules related to representations and warranties in asset-backed securities offerings. Our proposals would require securitizers of asset-backed securities to disclose fulfilled and unfulfilled repurchase requests across all transactions. Our proposals would also require nationally recognized statistical rating organizations to include information regarding the representations, warranties and enforcement mechanisms available to investors in an asset-backed securities offering in any report accompanying a credit rating issued in connection with such offerings, including a preliminary credit rating. ---------------------------------------------------------------------------
Gangwar, Amit Kumar; Gupta, Ashish; Kedawat, Garima; Kumar, Pawan; Singh, Bhanu Pratap; Singh, Nidhi; Srivastava, Avanish K; Dhakate, Sanjay R; Gupta, Bipin Kumar
2018-05-23
Increasing counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF 4 :Eu 3+ @NaYF 4 :Yb 3+ , Er 3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF 4 :Eu 3+ ) and green (NaYF 4 :Yb 3+ , Er 3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against counterfeiting. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
DOT National Transportation Integrated Search
2015-08-01
Cameras are used prolifically to monitor transportation incidents, infrastructure, and congestion. Traditional camera systems often require human monitoring and only offer low-resolution video. Researchers for the Exploratory Advanced Research (EAR) ...
Tobe, Chris
2003-10-01
Certain strategies can offer not-for-profit hospitals potentially greater investment yields while maintaining stability and principal safety. Treasury inflation-indexed securities can offer good returns, low volatility, and inflation protection. "Enhanced cash" strategies offer liquidity and help to preserve capital. Stable value "wrappers" allow hospitals to pursue higher-yielding fixed-income securities without an increase in volatility.
12 CFR 16.32 - Fraudulent transactions and unsafe and unsound practices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... operates as a fraud or deceit upon any person, in connection with the purchase or sale of any security of a... SECURITIES OFFERING DISCLOSURE RULES § 16.32 Fraudulent transactions and unsafe and unsound practices. (a) No person in the offer or sale of bank securities shall directly or indirectly: (1) Employ any device...
Code of Federal Regulations, 2010 CFR
2010-01-01
... offer to buy, a security or interest in a security, for value. However, these terms shall not include... or offer of a security which gives the holder a present or future right or privilege to convert the... includes a savings association. (10) Purchase and buy mean the same as in § 563b.25 of this chapter. (11...
NASA Astrophysics Data System (ADS)
Schaefer, S.; Gregory, M.; Rosenkranz, W.
2017-09-01
Due to higher data rates, better data security and unlicensed spectral usage optical inter-satellite links (OISL) offer an attractive alternative to conventional RF-communication. However, the very high transmission distances necessitate an optical receiver design enabling high receiver sensitivity which requires careful carrier synchronization and a quasi-coherent detection scheme.
ERIC Educational Resources Information Center
Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J.; Peña, Paola P.; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M.; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J.; Monteiro, Ligia; Lay, Keng-Ling
2013-01-01
The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... their securities and do not propose to make a public offering or engage in business of any kind. Filing... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29263] Notice of Applications for...
CLARUS as a Cloud Security Framework: e-Health Use Case.
Vidal, David; Iriso, Santiago; Mulero, Rafael
2017-01-01
Maintaining Passive Medical Health Records (PMHR) is an increasing cost and resource consumption problem. Moving to the cloud is the clearest solution to solve the problem as it offers a high amount of space and computation power. But the cloud is not safe enough when dealing with this kind of information because it can be easily accessed by attackers. The European Commission funded research project CLARUS contributes to protect healthcare-sensitive information in a secure way.
17 CFR 230.152a - Offer or sale of certain fractional interests.
Code of Federal Regulations, 2010 CFR
2010-04-01
... interests for the purpose of combining such interests into whole shares, and for the sale of such number of... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offer or sale of certain... COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.152a Offer or sale of certain...
17 CFR 230.152a - Offer or sale of certain fractional interests.
Code of Federal Regulations, 2011 CFR
2011-04-01
... interests for the purpose of combining such interests into whole shares, and for the sale of such number of... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Offer or sale of certain... COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.152a Offer or sale of certain...
17 CFR 230.152a - Offer or sale of certain fractional interests.
Code of Federal Regulations, 2013 CFR
2013-04-01
... interests for the purpose of combining such interests into whole shares, and for the sale of such number of... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Offer or sale of certain... COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.152a Offer or sale of certain...
17 CFR 230.152a - Offer or sale of certain fractional interests.
Code of Federal Regulations, 2014 CFR
2014-04-01
... interests for the purpose of combining such interests into whole shares, and for the sale of such number of... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Offer or sale of certain... COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.152a Offer or sale of certain...
17 CFR 230.152a - Offer or sale of certain fractional interests.
Code of Federal Regulations, 2012 CFR
2012-04-01
... interests for the purpose of combining such interests into whole shares, and for the sale of such number of... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Offer or sale of certain... COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.152a Offer or sale of certain...
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
Building Security into Schools.
ERIC Educational Resources Information Center
Kosar, John E.; Ahmed, Faruq
2000-01-01
Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... DEPARTMENT OF THE TREASURY Office of the Comptroller of the Currency Agency Information Collection Activities: Information Collection Renewal; Comment Request; Securities Offering Disclosure Rules AGENCY... comment concerning the renewal of an information collection titled, ``Securities Offering Disclosure Rules...
NASA Astrophysics Data System (ADS)
Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
2013-12-01
Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.
31 CFR 356.20 - How does the Treasury determine auction awards?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the Treasury determine... margin for the securities we are auctioning. (2) Accepting bids at the high yield, discount rate, or... the remaining par amount needed to fill the offering amount by the par amount of the bids at the high...
NASA Astrophysics Data System (ADS)
Smith, L.; Murphy, J. W.; Kim, J.; Rozhdestvenskyy, S.; Mejia, I.; Park, H.; Allee, D. R.; Quevedo-Lopez, M.; Gnade, B.
2016-12-01
Solid-state neutron detectors offer an alternative to 3He based detectors, but suffer from limited neutron efficiencies that make their use in security applications impractical. Solid-state neutron detectors based on single crystal silicon also have relatively high gamma-ray efficiencies that lead to false positives. Thin film polycrystalline CdTe based detectors require less complex processing with significantly lower gamma-ray efficiencies. Advanced geometries can also be implemented to achieve high thermal neutron efficiencies competitive with silicon based technology. This study evaluates these strategies by simulation and experimentation and demonstrates an approach to achieve >10% intrinsic efficiency with <10-6 gamma-ray efficiency.
Code of Federal Regulations, 2013 CFR
2013-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Code of Federal Regulations, 2012 CFR
2012-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Code of Federal Regulations, 2014 CFR
2014-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
ERIC Educational Resources Information Center
Waters, John K.
2013-01-01
With schools and students now able to secure high-quality online courses from beyond the ivy-covered walls, faculty--and institutions themselves--are weighing whether their stock is rising or falling. Increasingly, online courses and their content--previously the jealously guarded domain of professors--are being offered as out-of-the-box solutions…
Measurement-Driven Characterization of the Mobile Environment
ERIC Educational Resources Information Center
Soroush, Hamed
2013-01-01
The concurrent deployment of high-quality wireless networks and large-scale cloud services offers the promise of secure ubiquitous access to seemingly limitless amount of content. However, as users' expectations have grown more demanding, the performance and connectivity failures endemic to the existing networking infrastructure have become more…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
....'' \\8\\ The rule requires prominent disclosure of the nature of the conflict, and in certain... Change To Adopt FINRA Rule 5121 (Public Offerings of Securities With Conflicts of Interest) in the... FINRA Rule 5121 (Public Offerings of Securities With Conflicts of Interest) (``Rule'') in the...
17 CFR 230.415 - Delayed or continuous offering and sale of securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... certificates; (viii) Securities which are to be issued in connection with business combination transactions... continuous basis by or on behalf of a registered closed-end management investment company or business... offered and sold, provided, however, that if a new registration statement has been filed pursuant to...
7 CFR 1494.401 - Performance security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 10 2013-01-01 2013-01-01 false Performance security. 1494.401 Section 1494.401... Performance security. (a) Requirement to establish performance security. Prior to the submission of an offer to CCC in response to an Invitation, an eligible exporter must establish performance security, in a...
7 CFR 1494.401 - Performance security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 10 2012-01-01 2012-01-01 false Performance security. 1494.401 Section 1494.401... Performance security. (a) Requirement to establish performance security. Prior to the submission of an offer to CCC in response to an Invitation, an eligible exporter must establish performance security, in a...
17 CFR 230.253 - Offering circular.
Code of Federal Regulations, 2011 CFR
2011-04-01
... permitted. (2) Where an offering circular is distributed through an electronic medium, issuers may satisfy... COMPLETENESS OF ANY OFFERING CIRCULAR OR OTHER SELLING LITERATURE. THESE SECURITIES ARE OFFERED PURSUANT TO AN...
17 CFR 230.253 - Offering circular.
Code of Federal Regulations, 2010 CFR
2010-04-01
... permitted. (2) Where an offering circular is distributed through an electronic medium, issuers may satisfy... COMPLETENESS OF ANY OFFERING CIRCULAR OR OTHER SELLING LITERATURE. THESE SECURITIES ARE OFFERED PURSUANT TO AN...
Security architecture for health grid using ambient intelligence.
Naqvi, S; Riguidel, M; Demeure, I
2005-01-01
To propose a novel approach of incorporating ambient intelligence in the health grid security architecture. Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security mechanisms onto the new technologies. The incorporation of ambient intelligence in the security architecture of a grid will not only render a security paradigm robust but also provide an attractive vision for the future of computing by bringing the two worlds together. In this article we propose an evolutionary approach of utilizing smart devices for grid security architecture. We argue that such an infrastructure will impart unique features to the existing grid security paradigms by offering fortified and relentless monitoring. This new security architecture will be comprehensive in nature but will not be cumbersome for the users due to its typical characteristics of not prying into their lives and adapting to their needs. We have identified a new paradigm of the security architecture for a health grid that will not only render a security mechanism robust but will also provide the high levels of user-friendliness. As our approach is a first contribution to this problem, a number of other issues for future research remain open. However, the prospects are fascinating.
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
Sampangi, Raghav V.; Sampalli, Srinivas
2015-01-01
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. PMID:26389899
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
Sampangi, Raghav V; Sampalli, Srinivas
2015-09-15
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.
Cloud computing applications for biomedical science: A perspective.
Navale, Vivek; Bourne, Philip E
2018-06-01
Biomedical research has become a digital data-intensive endeavor, relying on secure and scalable computing, storage, and network infrastructure, which has traditionally been purchased, supported, and maintained locally. For certain types of biomedical applications, cloud computing has emerged as an alternative to locally maintained traditional computing approaches. Cloud computing offers users pay-as-you-go access to services such as hardware infrastructure, platforms, and software for solving common biomedical computational problems. Cloud computing services offer secure on-demand storage and analysis and are differentiated from traditional high-performance computing by their rapid availability and scalability of services. As such, cloud services are engineered to address big data problems and enhance the likelihood of data and analytics sharing, reproducibility, and reuse. Here, we provide an introductory perspective on cloud computing to help the reader determine its value to their own research.
Cloud computing applications for biomedical science: A perspective
2018-01-01
Biomedical research has become a digital data–intensive endeavor, relying on secure and scalable computing, storage, and network infrastructure, which has traditionally been purchased, supported, and maintained locally. For certain types of biomedical applications, cloud computing has emerged as an alternative to locally maintained traditional computing approaches. Cloud computing offers users pay-as-you-go access to services such as hardware infrastructure, platforms, and software for solving common biomedical computational problems. Cloud computing services offer secure on-demand storage and analysis and are differentiated from traditional high-performance computing by their rapid availability and scalability of services. As such, cloud services are engineered to address big data problems and enhance the likelihood of data and analytics sharing, reproducibility, and reuse. Here, we provide an introductory perspective on cloud computing to help the reader determine its value to their own research. PMID:29902176
2011-10-24
Operations Management Track in the established B.S. in Global Security and Intelligence Studies Degree offered at Embry-Riddle Aeronautical University...and a model 4 -year college curriculum for a BS degree in Security Operations Management
Intelligence Studies, Universities and Security
ERIC Educational Resources Information Center
Glees, Anthony
2015-01-01
This article offers a critical assessment of academic intelligence studies in higher education. It argues that universities (and academics) should value this subject far more highly than they currently do. Doing so will enhance better public understanding of an increasingly important and unique device in modern governance. It will also improve the…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
....'' \\5\\ The rule requires prominent disclosure of the nature of the conflict, and in certain... Change To Adopt FINRA Rule 5121 (Public Offerings of Securities With Conflicts of Interest) in the... (Public Offerings of Securities With Conflicts of Interest) as a FINRA rule in the consolidated FINRA...
78 FR 66955 - Exemptions From Certain Prohibited Transaction Restrictions
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-07
... Auction Rate Securities by UBS AG (ARS Rights) in connection with a Settlement Agreement, (b) the sale of an Auction Rate Security to UBS pursuant to such ARS Rights, where such sale (a Settlement Sale) is... the offer of ARS Rights (the ARS Rights Offer) are consistent with the requirements set forth in the...
17 CFR 230.463 - Report of offering of securities and use of proceeds therefrom.
Code of Federal Regulations, 2010 CFR
2010-04-01
...; Effective Date § 230.463 Report of offering of securities and use of proceeds therefrom. (a) Except as provided in this section, following the effective date of the first registration statement filed under the... required with respect to the first effective registration statement of the predecessor issuer. (c) For...
75 FR 52379 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
... dissemination to the public the best bid, best offer, and aggregate quotation size for each ``subject security... best bids, best offers, and quotation sizes for subject securities.\\3\\ \\1\\ 17 CFR 242.602(a). \\2\\ 17... are OTC market makers or exchange market makers, the best-priced orders and the full size for such...
78 FR 43249 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-19
... dissemination to the public the best bid, best offer, and aggregate quotation size for each ``subject security... best bids, best offers, and quotation sizes for subject securities.\\3\\ \\1\\ 17 CFR 242.602(a). \\2\\ 17... are OTC market makers or exchange market makers, the best-priced orders and the full size for such...
12 CFR 390.421 - Securities sale report.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Securities sale report. 390.421 Section 390.421... REGULATIONS TRANSFERRED FROM THE OFFICE OF THRIFT SUPERVISION Securities Offerings § 390.421 Securities sale report. (a) Within 30 days after the first sale of the securities, every six months after such 30 day...
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
Security Metrics: A Solution in Search of a Problem
ERIC Educational Resources Information Center
Rosenblatt, Joel
2008-01-01
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...
2017-11-24
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.
2017-01-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028
Provably secure and high-rate quantum key distribution with time-bin qudits.
Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J
2017-11-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.
Provably secure and high-rate quantum key distribution with time-bin qudits
DOE Office of Scientific and Technical Information (OSTI.GOV)
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
17 CFR 230.252 - Offering statement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... misleading. (b) Paper, printing, language and pagination. The requirements for offering statements are the... directors or other governing body, and each selling security holder shall sign the offering statement. If a... an amendment to the offering statement that contains the following language: This offering statement...
17 CFR 230.252 - Offering statement.
Code of Federal Regulations, 2012 CFR
2012-04-01
... misleading. (b) Paper, printing, language and pagination. The requirements for offering statements are the... directors or other governing body, and each selling security holder shall sign the offering statement. If a... an amendment to the offering statement that contains the following language: This offering statement...
17 CFR 230.252 - Offering statement.
Code of Federal Regulations, 2011 CFR
2011-04-01
... misleading. (b) Paper, printing, language and pagination. The requirements for offering statements are the... directors or other governing body, and each selling security holder shall sign the offering statement. If a... an amendment to the offering statement that contains the following language: This offering statement...
17 CFR 230.252 - Offering statement.
Code of Federal Regulations, 2014 CFR
2014-04-01
... misleading. (b) Paper, printing, language and pagination. The requirements for offering statements are the... directors or other governing body, and each selling security holder shall sign the offering statement. If a... an amendment to the offering statement that contains the following language: This offering statement...
17 CFR 230.252 - Offering statement.
Code of Federal Regulations, 2013 CFR
2013-04-01
... misleading. (b) Paper, printing, language and pagination. The requirements for offering statements are the... directors or other governing body, and each selling security holder shall sign the offering statement. If a... an amendment to the offering statement that contains the following language: This offering statement...
78 FR 43930 - Proposed Exemptions From Certain Prohibited Transaction Restrictions
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
...), of certain rights issued to owners of Auction Rate Securities by UBS AG (ARS Rights) in connection with a Settlement Agreement, (b) the sale of an Auction Rate Security to UBS pursuant to such ARS... in Section III (a) The terms and delivery of the offer of ARS Rights (the ARS Rights Offer) are...
12 CFR 563.76 - Offers and sales of securities at an office of a savings association.
Code of Federal Regulations, 2010 CFR
2010-01-01
... connection with the association's conversion from the mutual to stock form of organization in a conversion approved pursuant to part 563b of this chapter may be offered and sold at the association's offices... commissions consistent with industry norms may be paid to securities personnel of registered broker-dealers...
12 CFR 563g.19 - Approval of the security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...
Experimental Measurement-Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-01
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Experimental measurement-device-independent quantum key distribution.
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-27
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Association of American Universities Policy Recommendations for President-Elect Obama
ERIC Educational Resources Information Center
Association of American Universities, 2008
2008-01-01
In this document, the Association of American Universities offers a series of research and technology policy recommendations that would help our nation to continue its global pre-eminence in science and high technology, improve the quality of life and national security of our citizens, and speed our nation's economic recovery. After policy…
How to Get in the "First Pile"
ERIC Educational Resources Information Center
Vanevenhoven, Jeff; Delaney-Klinger, Kelly; Winkel, Doan; Wagner, Richard
2011-01-01
Pressures facing junior faculty during a tenure track job search are high and can come from a multitude of areas. It follows that professionals in this position would try to reduce uncertainty associated with securing a new employment contract. The authors offer their observations below on how to increase an applicant's chance to succeed in an…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-20
... change does not significantly affect the protection of investors or the public interest, does not impose... provide investors and traders with additional opportunities and strategies to hedge high priced securities... believes the $5 Strike Price Program would offer investors a greater selection of strike prices at a lower...
ERIC Educational Resources Information Center
Noble, Susan
2018-01-01
This article looks in detail at the constraints imposed on teachers of English by current examination syllabuses, and at how approaches developed through the Key Stage 3 (KS3) offer and the innovative Excellent Futures Curriculum at Stanley Park High School, Carshalton enable KS4 students to be more securely and fruitfully engaged as readers,…
USDA-ARS?s Scientific Manuscript database
Greenhouses have been used in the United Arab Emirates (UAE) to produce vegetables that contribute toward UAE food security, including offering fresh vegetable produce in the off-season. However, to manage such greenhouses farmers face both technical and environmental limitations (i.e., high water s...
78 FR 76662 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... rules and forms related to the offer and sale of securities pursuant to Section 3(b) of the Securities...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AND BILLS HELD IN LEGACY TREASURY DIRECT Legacy Treasury Direct Book-Entry Securities System (Legacy... of a security may be reinvested at maturity in a new security in the same form of registration, provided a new security is then being offered by the Department and provision for reinvestment is made in...
Re-designing the PhEDEx Security Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, C.-H.; Wildish, T.; Zhang, X.
2014-01-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less
Re-designing the PhEDEx Security Model
NASA Astrophysics Data System (ADS)
C-H, Huang; Wildish, T.; X, Zhang
2014-06-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.
McKinnon, Iain; Lewis, Thomas; Mehta, Naomi; Imrit, Shahed; Thorp, Julie; Ince, Chris
2018-02-01
Aims and method To assess the benefits of the introduction of routine vitamin D serum sampling for all patients admitted to a secure in-patient hospital in the North of England providing medium security, low security and rehabilitation services for offenders with intellectual and developmental disability. The vitamin D levels of 100 patients were analysed at baseline. Those with insufficient or deficient levels were offered treatment and retested after 1 year. Vitamin D levels were analysed in the context of level of security, seasonality of test and co-prescription of psychotropic medications. Eighty-three per cent of patients had suboptimal vitamin D levels at initial test (41% deficient and 42% insufficient). This was seen among established patients and new admissions. Regression analysis of baseline vitamin D levels revealed no differences for levels of security, seasonality, whether patients were taking antipsychotic or anticonvulsant medication, or length of stay. Patients with deficiency or insufficiency were all offered supplementation. Those who opted in had significantly higher vitamin D levels at follow-up, compared with those who declined treatment. Clinical implications Established and newly admitted patients in our secure mental health services had substantial levels of vitamin D insufficiency. In the light of the morbidities that are associated with deficient vitamin D levels, routine screening and the offer of supplementation is advisable. Declaration of interest None.
Rideout, Karen; Seed, Barbara; Ostry, Aleck
2006-01-01
Food security is emerging as an increasingly important public health issue. The purpose of this paper is to describe a conceptual model and five classes of food security indicators for regional health authorities (RHAs): direct, indirect, consequence, process, and supra-regional. The model was developed after a review of the food security literature and interviews with British Columbia community nutritionists and public health officials. We offer this conceptual model as a practical tool to help RHAs develop a comprehensive framework and use specific indicators, in conjunction with public health nutritionists and other community stakeholders. We recommend using all five classes of indicator together to ensure a complete assessment of the full breadth of food security. This model will be useful for Canadian health authorities wishing to take a holistic community-based approach to public health nutrition to develop more effective policies and programs to maximize food security. The model and indicators offer a rational process that could be useful for collaborative multi-stakeholder initiatives to improve food security.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Presenter means the individual requesting the redemption or redemption-exchange of securities. (k..., including redemption-exchange. (m) Redemption-exchange means the authorized redemption of eligible securities for the purpose of applying the proceeds in payment for other securities offered in exchange by...
77 FR 54620 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-05
... large, publicly-traded Canadian issuers to register securities that will be offered in a business... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request, Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy...
Code of Federal Regulations, 2011 CFR
2011-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2013 CFR
2013-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2012 CFR
2012-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2014 CFR
2014-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
Complying with the Campus Security Act--1990. Title II--Crime Awareness and Campus Security.
ERIC Educational Resources Information Center
National Association of Student Personnel Administrators, Inc.
This paper offers guidelines to colleges and universities which must comply with requirements of the Student Right-to-Know and Campus Security Act of 1990, specifically Title II, Crime Awareness and Campus Security. An introduction outlines some measures that campuses are urged to adopt such as campus-wide committees to review security policies,…
Code of Federal Regulations, 2011 CFR
2011-04-01
... registrations and offerings, net change in corporate securities outstanding, working capital of U.S... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
The Freedom to Choose Secure Attachment Relationships in Adulthood
ERIC Educational Resources Information Center
Keren, Einat; Mayseless, Ofra
2013-01-01
This study was based on the attachment-security hypothesis (H. Latty-Mann & K. E. Davis, 1996) that predicts that all individuals, regardless of attachment style, should demonstrate a preference for secure partners who are most likely to offer attachment security. It was therefore expected that with the transfer of attachment functions from…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eipeldauer, Mary D; Shelander Jr, Bruce R
2012-01-01
The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less
Hochfellner, Daniela; Müller, Dana; Schmucker, Alexandra
2014-12-01
The demand for comprehensive and innovative data is constantly growing in social science. In particular, micro data from various social security agencies become more and more attractive. In contrast to survey data, administrative data offer a census with highly reliable information but are restricted in their usage. To make them accessible for researchers, data or research output either have to be anonymized or released after disclosure review procedures have been used. This article discusses the trade-off between maintaining a high capability of research potential while protecting private information, by exploiting the data disclosure portfolio and the adopted disclosure strategies of the Research Data Center of the German Federal Employment Agency. © The Author(s) 2014.
Chung, Hyunji; Iorga, Michaela; Voas, Jeffrey; Lee, Sangjin
2017-01-01
Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA) – diagnostics offer the possibility of securer IVA ecosystems. PMID:29213147
31 CFR 375.13 - What requirements apply to offers?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What requirements apply to offers? 375... description, par amount, and price of each security offered. All offers must equal or exceed the minimum offer... must express offered prices in terms of price per $100 of par with three decimals, e.g., 102.172. The...
31 CFR 375.13 - What requirements apply to offers?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What requirements apply to offers... description, par amount, and price of each security offered. All offers must equal or exceed the minimum offer... must express offered prices in terms of price per $100 of par with three decimals, e.g., 102.172. The...
31 CFR 375.13 - What requirements apply to offers?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What requirements apply to offers? 375... description, par amount, and price of each security offered. All offers must equal or exceed the minimum offer... must express offered prices in terms of price per $100 of par with three decimals, e.g., 102.172. The...
31 CFR 375.13 - What requirements apply to offers?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What requirements apply to offers... description, par amount, and price of each security offered. All offers must equal or exceed the minimum offer... must express offered prices in terms of price per $100 of par with three decimals, e.g., 102.172. The...
31 CFR 375.13 - What requirements apply to offers?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What requirements apply to offers? 375... description, par amount, and price of each security offered. All offers must equal or exceed the minimum offer... must express offered prices in terms of price per $100 of par with three decimals, e.g., 102.172. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
...We are adopting amendments to Rule 506 of Regulation D and Rule 144A under the Securities Act of 1933 to implement Section 201(a) of the Jumpstart Our Business Startups Act. The amendment to Rule 506 permits an issuer to engage in general solicitation or general advertising in offering and selling securities pursuant to Rule 506, provided that all purchasers of the securities are accredited investors and the issuer takes reasonable steps to verify that such purchasers are accredited investors. The amendment to Rule 506 also includes a non-exclusive list of methods that issuers may use to satisfy the verification requirement for purchasers who are natural persons. The amendment to Rule 144A provides that securities may be offered pursuant to Rule 144A to persons other than qualified institutional buyers, provided that the securities are sold only to persons that the seller and any person acting on behalf of the seller reasonably believe are qualified institutional buyers. We are also revising Form D to require issuers to indicate whether they are relying on the provision that permits general solicitation or general advertising in a Rule 506 offering. Also today, in a separate release, to implement Section 926 of the Dodd-Frank Wall Street Reform and Consumer Protection Act, we are adopting amendments to Rule 506 to disqualify issuers and other market participants from relying on Rule 506 if ``felons and other `bad actors' '' are participating in the Rule 506 offering. We are also today, in a separate release, publishing for comment a number of proposed amendments to Regulation D, Form D and Rule 156 under the Securities Act that are intended to enhance the Commission's ability to evaluate the development of market practices in Rule 506 offerings and address certain comments made in connection with implementing Section 201(a)(1) of the Jumpstart Our Business Startups Act.
Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function
NASA Astrophysics Data System (ADS)
Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).
78 FR 44729 - Disqualification of Felons and Other “Bad Actors” From Rule 506 Offerings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
...We are adopting amendments to our rules to implement Section 926 of the Dodd-Frank Wall Street Reform and Consumer Protection Act. Section 926 requires us to adopt rules that disqualify securities offerings involving certain ``felons and other `bad actors''' from reliance on Rule 506 of Regulation D. The rules must be ``substantially similar'' to Rule 262 under the Securities Act, which contains the disqualification provisions of Regulation A under the Securities Act, and must also cover matters enumerated in Section 926 of the Dodd-Frank Act (including certain state regulatory orders and bars).
Comparing 2 Adhesive Methods on Skin Integrity in the High-Risk Neonate.
Boswell, Nicole; Waker, Cheryl L
2016-12-01
Nurses have a primary role in promoting neonatal skin integrity and skin care management of the critically ill neonate. Adhesive products are essential to secure needed medical devices but can be a significant factor contributing to skin breakdown. Current literature does not offer a definitive answer regarding which products most safely and effectively work to secure needed devices in the high-risk neonatal population. To determine which adhesive method is best practice to safely and effectively secure lines/tubes in the high-risk neonate population. The only main effect that was significant was age group with mean skin scores. Subjects in the younger group (24-28 weeks) had higher skin scores than in the older group (28-34 weeks), validating that younger gestations are at higher risk of breakdown with the use of adhesives. The findings did not clearly identify which product was superior to secure tubes and lines, or was the least injurious to skin of the high-risk neonate. Neither a transparent dressing only or transparent dressing over hydrocolloid method clearly demonstrated an advantage in the high-risk, preterm neonate. Anecdotal comments suggested staff preferred the transparent dressing over hydrocolloid method as providing better adhesive while protecting skin integrity. The findings validated that younger gestations are at higher risk of breakdown with the use of adhesives and therefore require close vigilance to maintain skin integrity.
ERIC Educational Resources Information Center
Sturgeon, Julie
2002-01-01
Explains why campus security officials consider locker rooms and restrooms the bane of their jobs, and offers a formula for protecting property and privacy at the same time: first secure the entire building, then zero in on specifics. Describes various security options for these campus areas. (EV)
Cyber Security--Are You Prepared?
ERIC Educational Resources Information Center
Newman, Scott
2007-01-01
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
12 CFR 563g.2 - Offering circular requirement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Offering circular requirement. 563g.2 Section 563g.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.2 Offering circular requirement. (a) General. No savings association shall offer or sell, directly...
ERIC Educational Resources Information Center
Hungerford, Thomas L.
2006-01-01
The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... same underlying security would be detrimental to the success of this new product offering and would... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69161; File No. SR-NYSEArca-2013-26] Self... Certain Securities March 18, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934...
12 CFR 344.7 - Settlement of securities transactions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... of securities transactions. (a) A bank shall not effect or enter into a contract for the purchase or... for payment of funds and delivery of securities later than the third business day after the date of... offering. A bank shall not effect or enter into a contract for the purchase or sale of the securities that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70198; File No. SR-DTC-2013-09] Self-Regulatory... Change To Eliminate Special Procedures for Securities Offered Pursuant to Regulation S, Category 3, Under the Securities Act of 1933 August 14, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange...
Code of Federal Regulations, 2012 CFR
2012-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
Code of Federal Regulations, 2013 CFR
2013-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
Code of Federal Regulations, 2014 CFR
2014-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
Secure quantum private information retrieval using phase-encoded queries
NASA Astrophysics Data System (ADS)
Olejnik, Lukasz
2011-08-01
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.
17 CFR 8.16 - Settlement offers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Settlement offers. 8.16... FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.16 Settlement offers. (a) The rules of an exchange may permit a respondent to submit a written offer of settlement to...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
12 CFR 563g.21 - Filing of copies of offering circulars in certain exempt offerings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Filing of copies of offering circulars in certain exempt offerings. 563g.21 Section 563g.21 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.21 Filing of copies of offering circulars in certain...
Diversify your sources of capital through debt offerings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burkhardt, D.A.; Soucy, S.T.
1993-09-01
Despite the trend toward diversification in many areas of the utility industry, most utility executives have yet to realize that many of the benefits derived from diversifying equity ownership can also be gained through a similar approach to their debt securities. Although institutional investors have long been regarded as the exclusive market for utility debt securities, individuals are an increasingly important component of this market. The factors that motivate individuals to purchase utility debt securities are the same as those that influence purchases of utility stocks: safety and dependable income. The benefits of retail ownership of utility debt securities domore » not, however, accrue exclusively to the investor. Utility companies that actively market debt offerings to individual investors also can expect to enjoy a number of tangible benefits. Nowhere are these benefits more obvious than in the area of tax-exempt utility securities.« less
Code of Federal Regulations, 2012 CFR
2012-04-01
... financial regulatory authority,” as defined in section 2(a)(50) of the Act [15 U.S.C. 80a-2(a)(50)], in such country; (ii) The securities are offered at a fixed price to all purchasers in the offering (except for... of the issuer); (iii) Financial statements, prepared and audited in accordance with standards...
Code of Federal Regulations, 2011 CFR
2011-04-01
... financial regulatory authority,” as defined in section 2(a)(50) of the Act [15 U.S.C. 80a-2(a)(50)], in such country; (ii) The securities are offered at a fixed price to all purchasers in the offering (except for... of the issuer); (iii) Financial statements, prepared and audited in accordance with standards...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Investment Companies § 230.701 Exemption for offers and sales of securities pursuant to certain compensatory... “Exchange Act”) (15 U.S.C. 78m or 78o(d)) and is not an investment company registered or required to be registered under the Investment Company Act of 1940 (15 U.S.C. 80a-1 et seq.). (2) Issuers that become...
2001-09-20
what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.
Deep ultraviolet semiconductor light sources for sensing and security
NASA Astrophysics Data System (ADS)
Shatalov, Max; Bilenko, Yuri; Yang, Jinwei; Gaska, Remis
2009-09-01
III-Nitride based deep ultraviolet (DUV) light emitting diodes (LEDs) rapidly penetrate into sensing market owing to several advantages over traditional UV sources (i.e. mercury, xenon and deuterium lamps). Small size, a wide choice of peak emission wavelengths, lower power consumption and reduced cost offer flexibility to system integrators. Short emission wavelength offer advantages for gas detection and optical sensing systems based on UV induced fluorescence. Large modulation bandwidth for these devices makes them attractive for frequency-domain spectroscopy. We will review present status of DUV LED technology and discuss recent advances in short wavelength emitters and high power LED lamps.
NASA Astrophysics Data System (ADS)
Hossain, Kamrul
2016-09-01
The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.
12 CFR 563g.8 - Use of the offering circular.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Use of the offering circular. 563g.8 Section 563g.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.8 Use of the offering circular. (a) An offering circular or amendment declared effective by the...
17 CFR 230.156 - Investment company sales literature.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Investment company sales... GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.156 Investment company sales... is materially misleading in connection with the offer or sale of securities issued by an investment...
17 CFR 230.156 - Investment company sales literature.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Investment company sales... GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.156 Investment company sales... is materially misleading in connection with the offer or sale of securities issued by an investment...
49 CFR 1548.9 - Acceptance of cargo.
Code of Federal Regulations, 2010 CFR
2010-10-01
... program. (b) Refusal to transport. Each indirect air carrier must refuse to offer for transport on an..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.9 Acceptance of cargo. (a) Preventing or deterring the carriage of any explosive or incendiary. Each indirect air...
78 FR 9435 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget this... to register securities that are offered for cash upon the exercise of rights granted to a registrant... Securities and Exchange Commission, Office of Information and Regulatory Affairs, Office of Management and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Extending unlisted trading... Unlisted Trading § 240.12f-2 Extending unlisted trading privileges to a security that is the subject of an initial public offering. (a) General provision. A national securities exchange may extend unlisted trading...
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Extending unlisted trading... Unlisted Trading § 240.12f-2 Extending unlisted trading privileges to a security that is the subject of an initial public offering. (a) General provision. A national securities exchange may extend unlisted trading...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Extending unlisted trading... Unlisted Trading § 240.12f-2 Extending unlisted trading privileges to a security that is the subject of an initial public offering. (a) General provision. A national securities exchange may extend unlisted trading...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Extending unlisted trading... Unlisted Trading § 240.12f-2 Extending unlisted trading privileges to a security that is the subject of an initial public offering. (a) General provision. A national securities exchange may extend unlisted trading...
Quantum-key-distribution protocol with pseudorandom bases
NASA Astrophysics Data System (ADS)
Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.
2018-01-01
Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-16
... Modify Fees for Non Co-Location Services May 9, 2011. Pursuant to Section 19(b)(1) of the Securities... fees for non co-location services. While changes to the Fee Schedule pursuant to this proposal are... operates in a highly competitive market in which exchanges offer non co-location services as a means to...
75 FR 73137 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-29
... requirements of the Securities Act for limited offerings and sales of securities issued under compensatory... information on respondents, including through the use of automated collection techniques or other forms of...
77 FR 39749 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... advertising in securities offerings conducted pursuant to Rule 506 of Regulation D under the Securities Act... Startups Act. At times, changes in Commission priorities require alterations in the scheduling of meeting...
12 CFR 563b.530 - What other requirements apply after I convert?
Code of Federal Regulations, 2010 CFR
2010-01-01
... quotations for the security in a recognized inter-dealer quotation system; (2) Furnishes bona fide competitive bid and offer quotations for the security on request; or (3) May effect transactions for the... Securities Dealers Automated Quotation system. (d) File all post-conversion reports that OTS requires...
6 CFR 13.46 - Compromise or settlement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Compromise or settlement. 13.46 Section 13.46 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.46 Compromise or settlement. (a) Parties may Make offers of compromise or settlement at any time...
18 CFR 1314.3 - Authority of Reserve Banks.
Code of Federal Regulations, 2010 CFR
2010-04-01
... functions with respect to the issuance of Book-entry TVA Power Securities offered and sold by TVA to which this part 1314 applies, in accordance with the Securities Documentation, Reserve Bank Operating...-ENTRY PROCEDURES FOR TVA POWER SECURITIES ISSUED THROUGH THE FEDERAL RESERVE BANKS § 1314.3 Authority of...
17 CFR 229.1103 - (Item 1103) Transaction summary and risk factors.
Code of Federal Regulations, 2012 CFR
2012-04-01
... if doing so will aid understanding. Consider using diagrams to illustrate the relationships among the parties, the structure of the securities offered (including, for example, the flow of funds or any... securities may be issued. (v) Identify the distribution frequency on the securities. (vi) Summarize the flow...
17 CFR 229.1103 - (Item 1103) Transaction summary and risk factors.
Code of Federal Regulations, 2013 CFR
2013-04-01
... if doing so will aid understanding. Consider using diagrams to illustrate the relationships among the parties, the structure of the securities offered (including, for example, the flow of funds or any... securities may be issued. (v) Identify the distribution frequency on the securities. (vi) Summarize the flow...
17 CFR 229.1103 - (Item 1103) Transaction summary and risk factors.
Code of Federal Regulations, 2014 CFR
2014-04-01
... if doing so will aid understanding. Consider using diagrams to illustrate the relationships among the parties, the structure of the securities offered (including, for example, the flow of funds or any... securities may be issued. (v) Identify the distribution frequency on the securities. (vi) Summarize the flow...
Security Frameworks for Machine-to-Machine Devices and Networks
NASA Astrophysics Data System (ADS)
Demblewski, Michael
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
Secure steganography designed for mobile platforms
NASA Astrophysics Data System (ADS)
Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.
2006-05-01
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.
Digital Photograph Security: What Plastic Surgeons Need to Know.
Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H
2015-11-01
Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.
The Gravity of High-Skilled Migration Policies.
Czaika, Mathias; Parsons, Christopher R
2017-04-01
Combining unique, annual, bilateral data on labor flows of highly skilled immigrants for 10 OECD destinations between 2000 and 2012, with new databases comprising both unilateral and bilateral policy instruments, we present the first judicious cross-country assessment of policies aimed to attract and select high-skilled workers. Points-based systems are much more effective in attracting and selecting high-skilled migrants than requiring a job offer, labor market tests, and shortage lists. Offers of permanent residency, while attracting the highly skilled, overall reduce the human capital content of labor flows because they prove more attractive to non-high-skilled workers. Bilateral recognition of diploma and social security agreements foster greater flows of high-skilled workers and improve the skill selectivity of immigrant flows. Conversely, double taxation agreements deter high-skilled migrants, although they do not alter overall skill selectivity. Our results are robust to a variety of empirical specifications that account for destination-specific amenities, multilateral resistance to migration, and the endogeneity of immigration policies.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form F-3, for registration... CFR 230.405); or (v) Discloses in the registration statement that it has a reasonable belief that it... offering of non-convertible investment grade securities, discloses the basis for such belief, and files a...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Form F-3, for registration... CFR 230.405); or (v) Discloses in the registration statement that it has a reasonable belief that it... offering of non-convertible investment grade securities, discloses the basis for such belief, and files a...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Form F-3, for registration... CFR 230.405); or (v) Discloses in the registration statement that it has a reasonable belief that it... offering of non-convertible investment grade securities, discloses the basis for such belief, and files a...
Cyber Hygiene for Control System Security
Oliver, David
2015-10-08
There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.
12 CFR 563g.17 - Sales of securities at an office of a savings association.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Sales of securities at an office of a savings association. 563g.17 Section 563g.17 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.17 Sales of securities at an office of a savings association. Sales of...
17 CFR 240.15c1-8 - Sales at the market.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Sales at the market. 240.15c1... Securities Exchange Act of 1934 Rules Relating to Over-The-Counter Markets § 240.15c1-8 Sales at the market... securities exchange that such security is being offered to such customer “at the market” or at a price...
Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James
2017-04-01
Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Information That a Foreign Board of Trade Should Submit When Seeking No-Action Relief To Offer and Sell, to Persons Located in the United States, a Futures Contract on a Foreign Non-Narrow-Based Security Index Traded on That Foreign Board of Trade D Appendix D to Part 30...
76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... Schemes Provide Security''. Distributed data architectures, such as cloud computing, offer very attractive... locating your data in the cloud, and by breaking it up and replicating different segments throughout the...
Cybersecurity and Resilience | Energy Systems Integration Facility | NREL
, and offer prioritized action items to improve organizational protocols. The team is also helping and provide a prioritized list of action items for gaps in security controls. Security architectures
Competition, Speculative Risks, and IT Security Outsourcing
NASA Astrophysics Data System (ADS)
Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan
Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.
17 CFR 4.12 - Exemption from provisions of part 4.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Exemption from provisions of part 4. 4.12 Section 4.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... pool for which it makes such claim: (A) Will be offered and sold pursuant to the Securities Act of 1933...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2011 CFR
2011-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2014 CFR
2014-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2013 CFR
2013-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Distribution of information...
17 CFR 240.14c-2 - Distribution of information statement.
Code of Federal Regulations, 2012 CFR
2012-04-01
... that has made a public offering of securities, including the taking of corporate action by the written... authorizations of security holders, at least 20 calendar days prior to the earliest date on which the corporate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Distribution of information...
Teaching Information Security with Workflow Technology--A Case Study Approach
ERIC Educational Resources Information Center
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang
2014-01-01
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... value of each savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Fiscal Service determines redemption values for Series A-E bonds, eligible Series EE and I bonds, and savings notes, that should be used in redeeming savings securities. [63...
31 CFR 375.23 - How does the securities delivery process work?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... the securities delivery process work? If any of the offers you submitted are accepted, you must...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-05
... Our Business Startups Act. Regulation Crowdfunding would prescribe rules governing the offer and sale... to use as intermediaries in the offer and sale of securities in reliance on Section 4(a)(6). In... Requirements 4. Prohibition on Advertising Terms of the Offering 5. Compensation of Persons Promoting the...
Secure quantum private information retrieval using phase-encoded queries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olejnik, Lukasz
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less
Aluminum plasmonic metamaterials for structural color printing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cheng, Fei; Gao, Jie; Stan, Liliana
2015-01-01
We report a structural color printing platform based on aluminum plasmonic metamaterials supporting near perfect light absorption and narrow-band spectral response tunable across the visible spectrum to realize high-resolution, angle-insensitive color printing with high color purity and saturation. Additionally, the fabricated metamaterials can be protected by a transparent polymer thin layer for ambient use with further improved color performance. The demonstrated structural color printing with aluminum plasmonic metamaterials offers great potential for relevant applications such as security marking and information storage.
Aluminum plasmonic metamaterials for structural color printing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cheng, Fei; Gao, Jie; Stan, Liliana
2015-05-26
We report a structural color printing platform based on aluminum plasmonic metamaterials supporting near perfect light absorption and narrow-band spectral response tunable across the visible spectrum to realize high-resolution, angle-insensitive color printing with high color purity and saturation. Additionally, the fabricated metamaterials can be protected by a transparent polymer thin layer for ambient use with further improved color performance. The demonstrated structural color printing with aluminum plasmonic metamaterials offers great potential for relevant applications such as security marking and information storage.
The science of human security: a response from political science.
Roberts, David
2008-01-01
The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality.
Quantum technology and cryptology for information security
NASA Astrophysics Data System (ADS)
Naqvi, Syed; Riguidel, Michel
2007-04-01
Cryptology and information security are set to play a more prominent role in the near future. In this regard, quantum communication and cryptography offer new opportunities to tackle ICT security. Quantum Information Processing and Communication (QIPC) is a scientific field where new conceptual foundations and techniques are being developed. They promise to play an important role in the future of information Security. It is therefore essential to have a cross-fertilizing development between quantum technology and cryptology in order to address the security challenges of the emerging quantum era. In this article, we discuss the impact of quantum technology on the current as well as future crypto-techniques. We then analyse the assumptions on which quantum computers may operate. Then we present our vision for the distribution of security attributes using a novel form of trust based on Heisenberg's uncertainty; and, building highly secure quantum networks based on the clear transmission of single photons and/or bundles of photons able to withstand unauthorized reading as a result of secure protocols based on the observations of quantum mechanics. We argue how quantum cryptographic systems need to be developed that can take advantage of the laws of physics to provide long-term security based on solid assumptions. This requires a structured integration effort to deploy quantum technologies within the existing security infrastructure. Finally, we conclude that classical cryptographic techniques need to be redesigned and upgraded in view of the growing threat of cryptanalytic attacks posed by quantum information processing devices leading to the development of post-quantum cryptography.
17 CFR 229.1012 - (Item 1012) The solicitation or recommendation.
Code of Federal Regulations, 2011 CFR
2011-04-01
... offer or is unable to take a position with respect to the tender offer. (b) Reasons. State the reasons... recommendation, state whether the filing person is advising holders of the subject securities to accept or reject the tender offer or to take other action with respect to the tender offer and, if so, describe the...
17 CFR 230.506 - Exemption for limited offers and sales without regard to dollar amount of offering.
Code of Federal Regulations, 2014 CFR
2014-04-01
... registered and in good standing under the laws of the place of his or her residence or principal office. (D... director, executive officer or other officer participating in the offering of any such investment manager... Regulation D-Rules Governing the Limited Offer and Sale of Securities Without Registration Under the...
Rueda, Sergio; Raboud, Janet; Rourke, Sean B; Bekele, Tsegaye; Bayoumi, Ahmed; Lavis, John; Cairney, John; Mustard, Cameron
2012-01-01
Background In the general population, job insecurity may be as harmful to health as unemployment. Some evidence suggests that employment is associated with better health outcomes among people with HIV, but it is not known whether job security offers additional quality-of-life benefits beyond the benefits of employment alone. Methods We used baseline data for 1660 men and 270 women who participated in the Ontario HIV Treatment Network Cohort Study, an ongoing observational cohort study that collects clinical and socio-behavioural data from people with HIV in the province of Ontario, Canada. We performed multivariable regression analyses to determine the contribution of employment and job security to health-related quality of life after controlling for potential confounders. Results Employed men with secure jobs reported significantly higher mental health–related quality of life than those who were non-employed (β = 5.27, 95% confidence interval [CI] 4.07 to 6.48), but insecure employment was not associated with higher mental health scores relative to non-employment (β = 0.18, 95% CI –1.53 to 1.90). Thus, job security was associated with a 5.09-point increase on a 100-point mental health quality-of-life score (95% CI 3.32 to 6.86). Among women, being employed was significantly associated with both physical and mental health quality of life, but job security was not associated with additional health benefits. Interpretation Participation in employment was associated with better quality of life for both men and women with HIV. Among men, job security was associated with better mental health, which suggests that employment may offer a mental health benefit only if the job is perceived to be secure. Employment policies that promote job security may offer not only income stability but also mental health benefits, although this additional benefit was observed only for men. PMID:23687526
Rueda, Sergio; Raboud, Janet; Rourke, Sean B; Bekele, Tsegaye; Bayoumi, Ahmed; Lavis, John; Cairney, John; Mustard, Cameron
2012-01-01
In the general population, job insecurity may be as harmful to health as unemployment. Some evidence suggests that employment is associated with better health outcomes among people with HIV, but it is not known whether job security offers additional quality-of-life benefits beyond the benefits of employment alone. We used baseline data for 1660 men and 270 women who participated in the Ontario HIV Treatment Network Cohort Study, an ongoing observational cohort study that collects clinical and socio-behavioural data from people with HIV in the province of Ontario, Canada. We performed multivariable regression analyses to determine the contribution of employment and job security to health-related quality of life after controlling for potential confounders. Employed men with secure jobs reported significantly higher mental health-related quality of life than those who were non-employed (β = 5.27, 95% confidence interval [CI] 4.07 to 6.48), but insecure employment was not associated with higher mental health scores relative to non-employment (β = 0.18, 95% CI -1.53 to 1.90). Thus, job security was associated with a 5.09-point increase on a 100-point mental health quality-of-life score (95% CI 3.32 to 6.86). Among women, being employed was significantly associated with both physical and mental health quality of life, but job security was not associated with additional health benefits. Participation in employment was associated with better quality of life for both men and women with HIV. Among men, job security was associated with better mental health, which suggests that employment may offer a mental health benefit only if the job is perceived to be secure. Employment policies that promote job security may offer not only income stability but also mental health benefits, although this additional benefit was observed only for men.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Form S-3, for registration... statement that it has a reasonable belief that it would have been eligible to use this Form S-3 as of... securities, discloses the basis for such belief, and files a final prospectus for an offering pursuant to...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form S-3, for registration... statement that it has a reasonable belief that it would have been eligible to use this Form S-3 as of... securities, discloses the basis for such belief, and files a final prospectus for an offering pursuant to...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Form S-3, for registration... statement that it has a reasonable belief that it would have been eligible to use this Form S-3 as of... securities, discloses the basis for such belief, and files a final prospectus for an offering pursuant to...
A Social Infrastructure for Hometown Security. Evolving the Homeland Security Paradigm
2009-01-23
information, including suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations and Reports, 1215...national call to service . This call offers an opportunity to invest in a social infrastructure for homeland security that will bring the American people... service , we were asked to go shopping.”12 By most accounts, the likely security challenges in the next few years will demand much greater involvement
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era
NASA Astrophysics Data System (ADS)
Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr
2018-05-01
The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
Addressing the Economic Security Issues Facing Same-Sex Couples.
ERIC Educational Resources Information Center
Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael
1999-01-01
Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)
Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems
NASA Technical Reports Server (NTRS)
Powell, John D.; Gilliam, David
2004-01-01
The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.
Fiber optic sensor based on Mach-Zehnder interferometer for securing entrance areas of buildings
NASA Astrophysics Data System (ADS)
Nedoma, Jan; Fajkus, Marcel; Martinek, Radek; Mec, Pavel; Novak, Martin; Bednarek, Lukas; Vasinek, Vladimir
2017-10-01
Authors of this article focused on the utilization of fiber optic sensors based on interferometric measurements for securing entrance areas of buildings such as windows and doors. We described the implementation of the fiber-optic interferometer (type Mach-Zehnder) into the window frame or door, sensor sensitivity, analysis of the background noise and methods of signal evaluation. The advantage of presented solution is the use of standard telecommunication fiber standard G.652.D, high sensitivity, immunity of sensor to electromagnetic interference (EMI) and passivity of the sensor regarding power supply. Authors implemented the Graphical User Interface (GUI) which offers the possibility of remote monitoring presented sensing solution.
Dehling, Tobias; Gao, Fangjian; Schneider, Stephan
2015-01-01
Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages. Conclusions Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements. PMID:25599627
Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali
2015-01-19
Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages. Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements.
17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.
Code of Federal Regulations, 2010 CFR
2010-04-01
... obtain information about the amount of securities represented by accounts of customers resident in the... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... interest of investors. (c) Tier I. Any tender offer for the securities of a foreign private issuer as...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-26
... the Securities Exchange Act of 1934 (``Exchange Act'') concerning large trader reporting to assist the... persons are referred to as ``large traders'').\\1\\ \\1\\ See Securities Exchange Act Release No. 64976 (July... person is a large trader: (1) Any transaction that is part of an offering of securities by or on behalf...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Securities outside of the Offer and may otherwise buy, sell, hold or seek to restructure, redeem or otherwise....1 trillion. Citigroup's consumer and corporate banking business is a global franchise encompassing... bought and sold as follows. Auction Rate Securities are securities (issued as debt or preferred stock...
17 CFR 242.104 - Stabilizing and other activities in connection with an offering.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the principal market if the security has traded in the principal market on the day stabilizing is... security has traded in that market on the day stabilizing is initiated or on the last preceding business... expressed in a currency other than the currency of the principal market for the security, such bid may be...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-27
... months that a Tier I corporate security is listed on the Exchange pursuant to Rule 14.8. Such listing... corporate security is listed on the Exchange, and for all ETPs, the Exchange proposes to offer a $250 daily... underlying securities or products, market making for a corporate issue requires additional analysis and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-02
... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-30804] Notice of Applications for... by writing to the Secretary, U.S. Securities and Exchange Commission, 100 F Street NE., Washington...
Teaching Case: Security Breach at Target
ERIC Educational Resources Information Center
Plachkinova, Miloslava; Maurer, Chris
2018-01-01
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-09
.... Subordinated Debt Securities/ Notice of Issuance of Subordinated Debt or Mandatorily Redeemable Preferred Stock. 1550-0032 Interagency Notice of Change in 1557-0272 1557-0014. Control. 1550-0035 Securities Offering... to that Transferred to the Transferred to the FRB. FRB. 1550-0062 Minimum Security Devices and 1557...
78 FR 44806 - Amendments to Regulation D, Form D and Rule 156
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
...The Securities and Exchange Commission, which today in separate releases amended Rule 506 of Regulation D, Form D and Rule 144A under the Securities Act of 1933 to implement Section 201(a) of the Jumpstart Our Business Startups Act and Section 926 of the Dodd- Frank Wall Street Reform and Consumer Protection Act, is publishing for comment a number of proposed amendments to Regulation D, Form D and Rule 156 under the Securities Act. These proposed amendments are intended to enhance the Commission's ability to evaluate the development of market practices in Rule 506 offerings and to address concerns that may arise in connection with permitting issuers to engage in general solicitation and general advertising under new paragraph (c) of Rule 506. Specifically, the proposed amendments to Regulation D would require the filing of a Form D in Rule 506(c) offerings before the issuer engages in general solicitation; require the filing of a closing amendment to Form D after the termination of any Rule 506 offering; require written general solicitation materials used in Rule 506(c) offerings to include certain legends and other disclosures; require the submission, on a temporary basis, of written general solicitation materials used in Rule 506(c) offerings to the Commission; and disqualify an issuer from relying on Rule 506 for one year for future offerings if the issuer, or any predecessor or affiliate of the issuer, did not comply, within the last five years, with Form D filing requirements in a Rule 506 offering. The proposed amendments to Form D would require an issuer to include additional information about offerings conducted in reliance on Regulation D. Finally, the proposed amendments to Rule 156 would extend the antifraud guidance contained in the rule to the sales literature of private funds.
NASA Astrophysics Data System (ADS)
Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.
2018-04-01
Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.
Professional convergence in forensic practice.
Mercer, D; Mason, T; Richman, J
2001-06-01
This paper outlines the development and convergence of forensic science and secure psychiatric services in the UK, locating the professionalization of forensic nursing within a complex web of political, economic, and ideological structures. It is suggested that a stagnation of the therapeutic enterprise in high and medium security provision has witnessed an intrusion of medical power into the societal body. Expanding technologies of control and surveillance are discussed in relation to the move from modernity to postmodernity and the ongoing dynamic of medicalized offending. Four aspects of globalization are identified as impacting upon the organization and application of forensic practice: (i) organized capitalism and the exhaustion of the welfare state; (ii) security versus danger and trust versus risk; (iii) science as a meta-language; and (iv) foreclosure as a mechanism of censorship. Finally, as a challenge for the profession, some predictions are offered about the future directions or demise of forensic nursing.
17 CFR 242.104 - Stabilizing and other activities in connection with an offering.
Code of Federal Regulations, 2011 CFR
2011-04-01
... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation M § 242.104 Stabilizing and other activities in connection with an...
12 CFR 563g.15 - Requests for interpretive advice or waiver.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...
12 CFR 563g.15 - Requests for interpretive advice or waiver.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...
12 CFR 563g.15 - Requests for interpretive advice or waiver.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...
12 CFR 563g.15 - Requests for interpretive advice or waiver.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...
12 CFR 563g.15 - Requests for interpretive advice or waiver.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... each savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series...
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series EE...
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series EE and I...
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series EE...
Realization of Quantum Digital Signatures without the Requirement of Quantum Memory
NASA Astrophysics Data System (ADS)
Collins, Robert J.; Donaldson, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.
2014-07-01
Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.
Realization of quantum digital signatures without the requirement of quantum memory.
Collins, Robert J; Donaldson, Ross J; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J; Andersson, Erika; Jeffers, John; Buller, Gerald S
2014-07-25
Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Settlements. 10.108 Section 10... to the Commission; Settlements § 10.108 Settlements. (a) When offers may be made. Parties may at any time during the course of the proceeding propose offers of settlement. All offers of settlement shall...
78 FR 13885 - Notice of HUD-Held Multifamily & Healthcare Loan Sale, Second Offering (MHLS 2013-1)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-01
... Multifamily & Healthcare Loan Sale, Second Offering (MHLS 2013-1) AGENCY: Office of the Assistant Secretary...: This notice announces HUD's intention to sell certain unsubsidized healthcare mortgage loans, without... offering in MHLS 2013-1, certain unsubsidized mortgage loans (Mortgage Loans) secured by two healthcare...
Computer-generated holograms and diffraction gratings in optical security applications
NASA Astrophysics Data System (ADS)
Stepien, Pawel J.
2000-04-01
The term 'computer generated hologram' (CGH) describes a diffractive structure strictly calculated and recorded to diffract light in a desired way. The CGH surface profile is a result of the wavefront calculation rather than of interference. CGHs are able to form 2D and 3D images. Optically, variable devices (OVDs) composed of diffractive gratings are often used in security applications. There are various types of optically and digitally recorded gratings in security applications. Grating based OVDs are used to record bright 2D images with limited range of cinematic effects. These effects result form various orientations or densities of recorded gratings. It is difficult to record high quality OVDs of 3D objects using gratings. Stereo grams and analogue rainbow holograms offer 3D imaging, but they are darker and have lower resolution than grating OVDs. CGH based OVDs contains unlimited range of cinematic effects and high quality 3D images. Images recorded using CGHs are usually more noisy than grating based OVDs, because of numerical inaccuracies in CGH calculation and mastering. CGH based OVDs enable smooth integration of hidden and machine- readable features within an OVD design.
Microstructured fibres: a positive impact on defence technology?
NASA Astrophysics Data System (ADS)
O'Driscoll, E. J.; Watson, M. A.; Delmonte, T.; Petrovich, M. N.; Feng, X.; Flanagan, J. C.; Hayes, J. R.; Richardson, D. J.
2006-09-01
In this paper we seek to assess the potential impact of microstructured fibres for security and defence applications. Recent literature has presented results on using microstructured fibre for delivery of high power, high quality radiation and also on the use of microstructured fibre for broadband source generation. Whilst these two applications may appear contradictory to one another the inherent design flexibility of microstructured fibres allows fibres to be fabricated for the specific application requirements, either minimising (for delivery) or maximising (for broadband source generation) the nonlinear effects. In platform based laser applications such as infrared counter measures, remote sensing and laser directed-energy weapons, a suitable delivery fibre providing high power, high quality light delivery would allow a laser to be sited remotely from the sensor/device head. This opens up the possibility of several sensor/device types sharing the same multi-functional laser, thus reducing the complexity and hence the cost of such systems. For applications requiring broadband source characteristics, microstructured fibres can also offer advantages over conventional sources. By exploiting the nonlinear effects it is possible to realise a multifunctional source for applications such as active hyperspectral imaging, countermeasures, and biochemical sensing. These recent results suggest enormous potential for these novel fibre types to influence the next generation of photonic systems for security and defence applications. However, it is important to establish where the fibres can offer the greatest advantages and what research still needs to be done to drive the technology towards real platform solutions.
Secure public cloud platform for medical images sharing.
Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas
2015-01-01
Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.
DNA based random key generation and management for OTP encryption.
Zhang, Yunpeng; Liu, Xin; Sun, Manhui
2017-09-01
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.
Secure method for biometric-based recognition with integrated cryptographic functions.
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
Case Study: Creation of a Degree Program in Computer Security. White Paper.
ERIC Educational Resources Information Center
Belon, Barbara; Wright, Marie
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
2010-09-01
of Defense DTSA Defense Technology Security Administration FMS Foreign Military Sales GSD Gulf Security Dialogue LOA Letter of Offer and...may refer license applications to the Defense Technology Security Administration ( DTSA ) to determine if the United States should release the...requested technology to the requesting foreign government. Specifically, DTSA assesses the sale’s impact on preserving critical U.S. military technological
Graphs for information security control in software defined networks
NASA Astrophysics Data System (ADS)
Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.
2017-07-01
Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Ultra Wideband (UWB) communication vulnerability for security applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cooley, H. Timothy
2010-07-01
RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages overmore » conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.« less
NASA Astrophysics Data System (ADS)
Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas
2015-11-01
Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.
Physical security, HIPPA, and the HHS wall of shame.
Sage, April
2014-01-01
In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.
17 CFR 230.418 - Supplemental information.
Code of Federal Regulations, 2010 CFR
2010-04-01
... offer or similar transaction, any feasibility studies, management analyses, fairness opinions or similar....405), of the securities being registered except for: (i) Reports solely comprised of recommendations to buy, sell or hold the securities of the registrant, unless such recommendations have changed...
Wædegaard, Kristian J; Balling, Peter
2011-02-14
An infrared femtosecond laser has been used to write computer-generated holograms directly on a silicon surface. The high resolution offered by short-pulse laser ablation is employed to write highly detailed holograms with resolution up to 111 kpixels/mm2. It is demonstrated how three-dimensional effects can be realized in computer-generated holograms. Three-dimensional effects are visualized as a relative motion between different parts of the holographic reconstruction, when the hologram is moved relative to the reconstructing laser beam. Potential security applications are briefly discussed.
Sex differences in Portuguese lonely hearts advertisements.
Neto, Félix
2005-10-01
Advertisements from "Lonely Hearts" columns in the major daily Portuguese newspaper (Jornal de Notícias) were used to test hypotheses about the mate preferences of men and women. A total of 484 advertisements were coded for demographic descriptors and offers of and appeals for attractiveness, financial security, sincerity, expressiveness, and instrumentality, e.g., intelligence and ambition. Some results supported social exchange and evolutionary predictions: men sought younger women and offered security; women sought older men with status and resources. However, other results challenged such predictions: attractiveness and expressiveness did not differ by sex.
17 CFR 242.105 - Short selling in connection with a public offering.
Code of Federal Regulations, 2011 CFR
2011-04-01
... EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation M § 242.105 Short selling in connection with a public offering. (a) Unlawful...
Parallel operation of NH3 screw compressors - the optimum way
NASA Astrophysics Data System (ADS)
Pijnenburg, B.; Ritmann, J.
2015-08-01
The use of more smaller industrial NH3 screw compressors operating in parallel seems to offer the optimum way when it comes to fulfilling maximum part load efficiency, increased redundancy and other highly requested features in the industrial refrigeration industry today. Parallel operation in an optimum way can be selected to secure continuous operation and can in most applications be configured to ensure lower overall operating economy. New compressors are developed to meet requirements for flexibility in operation and are controlled in an intelligent way. The intelligent control system keeps focus on all external demands, but yet striving to offer always the lowest possible absorbed power, including in future scenarios with connection to smart grid.
Key Reconciliation for High Performance Quantum Key Distribution
Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente
2013-01-01
Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440
Privacy preservation and authentication on secure geographical routing in VANET
NASA Astrophysics Data System (ADS)
Punitha, A.; Manickam, J. Martin Leo
2017-05-01
Vehicular Ad hoc Networks (VANETs) play an important role in vehicle-to-vehicle communication as it offers a high level of safety and convenience to drivers. In order to increase the level of security and safety in VANETs, in this paper, we propose a Privacy Preservation and Authentication on Secure Geographical Routing Protocol (PPASGR) for VANET. It provides security by detecting and preventing malicious nodes through two directional antennas such as forward (f-antenna) and backward (b-antenna). The malicious nodes are detected by direction detection, consistency detection and conflict detection. The location of the trusted neighbour is identified using TNT-based location verification scheme after the implementation of the Vehicle Tamper Proof Device (VTPD), Trusted Authority (TA) is generated that produces the anonymous credentials. Finally, VTPD generates pseudo-identity using TA which retrieves the real identity of the sender. Through this approach, the authentication, integrity and confidentiality for routing packets can be achieved. The simulation results show that the proposed approach reduces the packet drop due to attack and improves the packet delivery ratio.
NASA Astrophysics Data System (ADS)
Balamurugan, A. M.; Sivasubramanian, A.
2014-06-01
The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.
Anti-jamming communication for body area network using chaotic frequency hopping.
Gopalakrishnan, Balamurugan; Bhagyaveni, Marcharla Anjaneyulu
2017-12-01
The healthcare industries research trends focus on patient reliable communication and security is a paramount requirement of healthcare applications. Jamming in wireless communication medium has become a major research issue due to the ease of blocking communication in wireless networks and throughput degradation. The most commonly used technique to overcome jamming is frequency hopping (FH). However, in traditional FH pre-sharing of key for channel selection and a high-throughput overhead is required. So to overcome this pre-sharing of key and to increase the security chaotic frequency hopping (CFH) has been proposed. The design of chaos-based hop selection is a new development that offers improved performance in transmission of information without pre-shared key and also increases the security. The authors analysed the performance of proposed CFH system under different reactive jamming durations. The percentage of error reduction by the reactive jamming for jamming duration 0.01 and 0.05 s for FH and CFH is 55.03 and 84.24%, respectively. The obtained result shows that CFH is more secure and difficult to jam by the reactive jammer.
Web Service Execution and Monitoring in Integrated Applications in Support of Business Communities
NASA Astrophysics Data System (ADS)
Chiriacescu, Rares M.; SzóKe, Alexandru; Portase, Sorin; Florea, Monica
Emerging technology is one of the key factors that drive the business world to faster adaptation, reaction and shorter communication path. Building upon such technologies, business communities emerge, geared toward high flexibility in their offerings and collaboration: business-to-customer and business-to-business collaborations. Adapting to the market requirements, companies must address several technical challenges that arise from the main requirements of the system they have to introduce: a high degree of flexibility, heterogeneous system collaboration and security of the transferred data.
Identity Dilemmas: The Consequence of Identity in Protracted Conflict
2011-03-24
prescribe method, or promote thought, the contributions of Thucydides, Plato , Aristotle, Hobbes, Locke, Kant and others offer penetrating insight into...Lebow, A Cultural Theory, 180. 28 Ibid., 180. For an exceptional examination of ontological security-seeking behavior and how rational security
Negligence in Visitor Security.
ERIC Educational Resources Information Center
Dwyer, William O.; Murrell, Dan S.
1985-01-01
The park administrator's responsibility in providing security for park visitors through prevention strategies and law enforcement is discussed. Types of negligence are indicated, practice recommendations are made, and evaluative criteria for personnel selection and training are offered. Reference is made to the General Accounting Office Report and…
Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C
2008-11-06
As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.
Motion effects in multistatic millimeter-wave imaging systems
NASA Astrophysics Data System (ADS)
Schiessl, Andreas; Ahmed, Sherif Sayed; Schmidt, Lorenz-Peter
2013-10-01
At airport security checkpoints, authorities are demanding improved personnel screening devices for increased security. Active mm-wave imaging systems deliver the high quality images needed for reliable automatic detection of hidden threats. As mm-wave imaging systems assume static scenarios, motion effects caused by movement of persons during the screening procedure can degrade image quality, so very short measurement time is required. Multistatic imaging array designs and fully electronic scanning in combination with digital beamforming offer short measurement time together with high resolution and high image dynamic range, which are critical parameters for imaging systems used for passenger screening. In this paper, operational principles of such systems are explained, and the performance of the imaging systems with respect to motion within the scenarios is demonstrated using mm-wave images of different test objects and standing as well as moving persons. Electronic microwave imaging systems using multistatic sparse arrays are suitable for next generation screening systems, which will support on the move screening of passengers.
Clarifying Resilience in the Context of Homeland Security
2013-03-01
Resilience Is a Complex Adaptive System of Systems ( CASoS ) ....60 4. Resilience Is Experienced and Demonstrated in Different Ways ..60 5. Resilience Is...The inclusion of a resilience module into existing homeland security training programs broadens the practitioner’s knowledge base from a basic level...psychology offer several considerations for the homeland security practitioner. The first consideration maintains that a de -emphasis on the
NNSA Program Develops the Next Generation of Nuclear Security Experts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brim, Cornelia P.; Disney, Maren V.
2015-09-02
NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.
Airline Security and a Strategy for Change
2006-01-15
21 KEY TERMS: Biometrics, Federal Flight Deck Officer, Positive Passenger Bag Match , Airline Security CLASSIFICATION: Unclassified On September 11...subsequent to 9/11, then offers a recommended strategy which could provide both an improved security posture and the peace of mind demanded by travelers...expanding the Positive Passenger Bag Match criteria, and gathering information on passengers about special capabilities they might have for use by Captains
Kaschner, Holger; Jordan, Tim
The German government is seeking to enhance the resilience of critical national infrastructures via its new IT Security Law. This paper analyses the content of the law, as well as the limitations and constraints arising from the conflicting interests of affected stakeholders. The paper also offers solutions to help the IT Security Law fulfil its potential despite the constraints.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., rights offering or business combination. 239.42 Section 239.42 Commodity and Securities Exchanges... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process and undertaking for issuers registering securities on Form F-8, F-9, F-10...
17 CFR 230.508 - Insignificant deviations from a term, condition or requirement of Regulation D.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Regulation D-Rules Governing the Limited Offer and Sale of Securities Without Registration Under the... offer or sale to a particular individual or entity, if the person relying on the exemption shows: (1... the offering as a whole, provided that any failure to comply with paragraph (c) of § 230.502...
17 CFR 230.508 - Insignificant deviations from a term, condition or requirement of Regulation D.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Regulation D-Rules Governing the Limited Offer and Sale of Securities Without Registration Under the... offer or sale to a particular individual or entity, if the person relying on the exemption shows: (1... the offering as a whole, provided that any failure to comply with paragraph (c) of § 230.502...
17 CFR 230.508 - Insignificant deviations from a term, condition or requirement of Regulation D.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Regulation D-Rules Governing the Limited Offer and Sale of Securities Without Registration Under the... offer or sale to a particular individual or entity, if the person relying on the exemption shows: (1... the offering as a whole, provided that any failure to comply with paragraph (c) of § 230.502...
17 CFR 230.508 - Insignificant deviations from a term, condition or requirement of Regulation D.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Regulation D-Rules Governing the Limited Offer and Sale of Securities Without Registration Under the... offer or sale to a particular individual or entity, if the person relying on the exemption shows: (1... the offering as a whole, provided that any failure to comply with paragraph (c) of § 230.502...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
... Connection With a Proposed Change to its Operations in the Form of a Private Offering by OCC of Senior... change its operations in the form of a private offering of senior unsecured debt securities (``Offering... would provide OCC with access to additional liquidity for working capital needs and general corporate...
12 CFR 563g.9 - Escrow requirement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Escrow requirement. 563g.9 Section 563g.9 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.9 Escrow requirement. (a) Any funds received in an offering which is offered and sold on a best efforts all...
Towards real-time photon Monte Carlo dose calculation in the cloud
NASA Astrophysics Data System (ADS)
Ziegenhein, Peter; Kozin, Igor N.; Kamerling, Cornelis Ph; Oelfke, Uwe
2017-06-01
Near real-time application of Monte Carlo (MC) dose calculation in clinic and research is hindered by the long computational runtimes of established software. Currently, fast MC software solutions are available utilising accelerators such as graphical processing units (GPUs) or clusters based on central processing units (CPUs). Both platforms are expensive in terms of purchase costs and maintenance and, in case of the GPU, provide only limited scalability. In this work we propose a cloud-based MC solution, which offers high scalability of accurate photon dose calculations. The MC simulations run on a private virtual supercomputer that is formed in the cloud. Computational resources can be provisioned dynamically at low cost without upfront investment in expensive hardware. A client-server software solution has been developed which controls the simulations and transports data to and from the cloud efficiently and securely. The client application integrates seamlessly into a treatment planning system. It runs the MC simulation workflow automatically and securely exchanges simulation data with the server side application that controls the virtual supercomputer. Advanced encryption standards were used to add an additional security layer, which encrypts and decrypts patient data on-the-fly at the processor register level. We could show that our cloud-based MC framework enables near real-time dose computation. It delivers excellent linear scaling for high-resolution datasets with absolute runtimes of 1.1 seconds to 10.9 seconds for simulating a clinical prostate and liver case up to 1% statistical uncertainty. The computation runtimes include the transportation of data to and from the cloud as well as process scheduling and synchronisation overhead. Cloud-based MC simulations offer a fast, affordable and easily accessible alternative for near real-time accurate dose calculations to currently used GPU or cluster solutions.
Towards real-time photon Monte Carlo dose calculation in the cloud.
Ziegenhein, Peter; Kozin, Igor N; Kamerling, Cornelis Ph; Oelfke, Uwe
2017-06-07
Near real-time application of Monte Carlo (MC) dose calculation in clinic and research is hindered by the long computational runtimes of established software. Currently, fast MC software solutions are available utilising accelerators such as graphical processing units (GPUs) or clusters based on central processing units (CPUs). Both platforms are expensive in terms of purchase costs and maintenance and, in case of the GPU, provide only limited scalability. In this work we propose a cloud-based MC solution, which offers high scalability of accurate photon dose calculations. The MC simulations run on a private virtual supercomputer that is formed in the cloud. Computational resources can be provisioned dynamically at low cost without upfront investment in expensive hardware. A client-server software solution has been developed which controls the simulations and transports data to and from the cloud efficiently and securely. The client application integrates seamlessly into a treatment planning system. It runs the MC simulation workflow automatically and securely exchanges simulation data with the server side application that controls the virtual supercomputer. Advanced encryption standards were used to add an additional security layer, which encrypts and decrypts patient data on-the-fly at the processor register level. We could show that our cloud-based MC framework enables near real-time dose computation. It delivers excellent linear scaling for high-resolution datasets with absolute runtimes of 1.1 seconds to 10.9 seconds for simulating a clinical prostate and liver case up to 1% statistical uncertainty. The computation runtimes include the transportation of data to and from the cloud as well as process scheduling and synchronisation overhead. Cloud-based MC simulations offer a fast, affordable and easily accessible alternative for near real-time accurate dose calculations to currently used GPU or cluster solutions.
6 CFR 25.5 - Obligations of seller.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI... Terrorism when Qualified Anti-Terrorism Technologies have been deployed in defense against, response to, or... liability insurance offered on the world market; (vi) Data and history regarding mass casualty losses; (vii...
Ownership, Privacy, Confidentiality, and Security Data.
ERIC Educational Resources Information Center
Staman, E. Michael
1986-01-01
One of the areas most often neglected by those responsible for information systems in colleges and universities relates to ownership, privacy, confidentiality, and security of data. Background information and definitions are provided, and a suggested environment is described. Model recommendations for institutional policy are offered. (MLW)
DOT National Transportation Integrated Search
2017-02-01
Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can c...
The governance dimensions of water security: a review.
Bakker, Karen; Morinville, Cynthia
2013-11-13
Water governance is critical to water security, and to the long-term sustainability of the Earth's freshwater systems. This review examines recent debates regarding the governance dimensions of water security, including adaptive governance, polycentric governance, social learning and multi-level governance. The analysis emphasizes the political and institutional dimensions of water governance, and explores the relevance of social power-an overlooked yet important aspect of the water security debate. In addition, the review explores the intersection and potential synergies between water governance perspectives and risk-based approaches to water security, and offers critiques and suggestions for further research questions and agendas.
U.S.-China Counterterrorism Cooperation: Issues for U.S. Policy
2008-10-08
detained Uighurs at Guantanamo Bay prison; weapons nonproliferation; port security; security for the Olympics in Beijing in August 2008; sanctions...the others for Resolution 1368 (to combat terrorism). On September 20, Beijing said that it offered “unconditional support” in fighting terrorism...transform — the closer bilateral relationship pursued by President Bush since late 2001. In the short-term, U.S. security policy toward Beijing sought
Change Detection Algorithms for Information Assurance of Computer Networks
2002-01-01
original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-N, appointment of agent for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43 Section 239.43 Commodity and Securities...
Reliable Video Analysis Helps Security Company Grow
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meurer, Dave; Furgal, Dave; Hobson, Rick
Armed Response Team (ART) has grown to become the largest locally owned security company in New Mexico. With technical assistance from Sandia National Laboratories through the New Mexico Small Business Assistance (NMSBA) Program, ART got help so they could quickly bring workable video security solutions to market. By offering a reliable video analytic camera system, they’ve been able to reduce theft, add hundreds of clients, and increase their number of employees.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Form F-N, appointment of agent for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43 Section 239.43 Commodity and Securities...
Effective Strategies for School Security.
ERIC Educational Resources Information Center
Blauvelt, Peter D.
This handbook offers administrators specific advice on developing the skills, knowledge, and techniques needed for coping with problems of school crime and violence. The guide begins by advising administrators that having security information available at all times helps determine the climate of the school. Instructions are given for preparing…
Community Colleges and Cybersecurity Education.
ERIC Educational Resources Information Center
Teles, Elizabeth J.; Hovis, R. Corby
2002-01-01
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
17 CFR 230.504 - Exemption for limited offerings and sales of securities not exceeding $1,000,000.
Code of Federal Regulations, 2010 CFR
2010-04-01
... require the public filing and delivery to investors of a substantive disclosure document before sale, and... only to “accredited investors” as defined in § 230.501(a). (2) The aggregate offering price for an... § 230.504 fails to meet the limitation on the aggregate offering price, it does not affect the...
ERIC Educational Resources Information Center
Waldrop, Gerry L.
2017-01-01
Securing employment poses a significant problem for information technology (IT) college and university graduates. An overarching purpose of this research was to inform IT faculty, IT hiring managers and IT graduates of which 42 critical IT skills best predict the offering of jobs to graduates and how long it takes graduates to receive such offers.…
NASA Astrophysics Data System (ADS)
Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd
2016-11-01
Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.
The technological obsolescence of the Brazilian eletronic ballot box.
Camargo, Carlos Rogério; Faust, Richard; Merino, Eugênio; Stefani, Clarissa
2012-01-01
The electronic ballot box has played a significant role in the consolidation of Brazilian political process. It has enabled paper ballots extinction as a support for the elector's vote as well as for voting counting processes. It is also widely known that election automation has decisively collaborated to the legitimization of Brazilian democracy, getting rid of doubts about the winning candidates. In 1995, when the project was conceived, it represented a compromise solution, balancing technical efficiency and costs trade-offs. However, this architecture currently limits the ergonomic enhancements to the device operation, transportation, maintenance and storage. Nowadays are available in the market devices of reduced dimensions, based on novel computational architecture, namely tablet computers, which emphasizes usability, autonomy, portability, security and low power consumption. Therefore, the proposal under discussion is the replacement of the current electronic ballot boxes for tablet-based devices to improve the ergonomics aspects of the Brazilian voting process. These devices offer a plethora of integrated features (e.g., capacitive touchscreen, speakers, microphone) that enable highly usable and simple user interfaces, in addition to enhancing the voting process security mechanisms. Finally, their operational systems features allow for the development of highly secure applications, suitable to the requirements of a voting process.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qojas, M.
1999-03-01
This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of themore » intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.« less
Army Officer Counseling Training for Commanders: Participant Manual
2011-04-01
but also create high levels of stress , burnout , and frustration. o Even social events may be perceived as burdensome because they take away from... level of security is not always present in private-sector jobs . o Educational opportunities stand out as the most attractive benefit the Army offers...and one or more silent observers. If you are an observer, your role will be to take notes on the counselor‟s performance and provide feedback at the
Emergency access to protected health records.
Künzi, Julien; Koster, Paul; Petković, Milan
2009-01-01
Digital Rights Management (DRM) schemes are receiving increased attention in the healthcare domain for the protection of sensitive health records as they offer security against insider attacks and advance protection features such as usage control. However, to be accepted by health care providers, a DRM solution has to fulfill specific healthcare requirements including emergency access. In this paper, we propose such DRM solution that can be deployed in highly distributed environments of electronic or personal health record infrastructures.
An Energy Bridge Too Far? Unconventional Natural Gas Innovations and Eurasia’s Energy Bridge
2013-03-01
which has low popular support after the Fukushima Daiichi reactor disaster —offers fertile ground for politicians to support natural gas as a short... increased energy independence and security.196 Finally, the high cost of Europe’s low-carbon energy sources, such as renewables or nuclear energy...renewable energy and is more palatable than nuclear power.204 This increased use of natural gas does not ally European fears of energy insecurity
Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.
Al-Haj, Ali
2015-04-01
Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.
Developing a computer security training program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-01-01
We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).
Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851
On the security of consumer wearable devices in the Internet of Things.
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.
On the security of consumer wearable devices in the Internet of Things
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756
17 CFR 230.904 - Offshore resales.
Code of Federal Regulations, 2010 CFR
2010-04-01
... affiliates (except any officer or director who is an affiliate solely by virtue of holding such position), or... concession, fee or other remuneration in respect of the securities offered or sold: (i) Neither the seller... selling concession, fee or other remuneration in respect of the securities sold, the seller or a person...
78 FR 36604 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-18
... included new rule 7d-2 under the Investment Company Act, permitting foreign funds to offer securities to... retirement account investments. Most securities that are ``qualified investments'' for Canadian retirement... retirement accounts as needed to meet their changing investment goals or income needs. \\1\\ 15 U.S.C. 77. In...
75 FR 54923 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-09
... included new rule 7d-2 under the Investment Company Act, permitting foreign funds to offer securities to... retirement account investments. Most securities that are ``qualified investments'' for Canadian retirement... retirement accounts as needed to meet their changing investment goals or income needs. \\1\\ 15 U.S.C. 77. In...
Managing Campus Security Programs in the 80's.
ERIC Educational Resources Information Center
Kimble, Joseph Paul
After presenting an imaginative depiction of the fiscal and administrative changes that may overwhelm community colleges during the 1980's, this paper looks at several factors that should be considered in planning and managing campus security departments. The paper offers suggestions related to: (1) the development of master parking plans which…
An Undergraduate Information Security Program: More than a Curriculum
ERIC Educational Resources Information Center
Woodward, Belle; Imboden, Thomas; Martin, Nancy L.
2013-01-01
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Mitigating risks by integrating business continuity and security.
Shaw, Scott; Smith, Nicholas
2010-11-01
There has been much discussion regarding the topic of business continuity and security convergence. This paper provides a realistic overview of the union of the two disciplines and offers no/low-cost programme elements that may be used for organisations considering or in the midst of convergence efforts.
75 FR 6416 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-09
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget this... Regulatory Affairs, Office of Management and Budget, Room 10102, New Executive Office Building, Washington... to register securities that are offered for cash upon the exercise of rights that are granted to a...
75 FR 38158 - Korea Finance Corporation; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-01
...Summary of Application: Applicant, a policy finance institution established by the government of the Republic of Korea (the ``Korean Government'') requests an order exempting it from all provisions of the Act in connection with the offer and sale of its debt securities in the United States (``Debt Securities'').
Rescuing Computerized Testing by Breaking Zipf's Law.
ERIC Educational Resources Information Center
Wainer, Howard
2000-01-01
Suggests that because of the nonlinear relationship between item usage and item security, the problems of test security posed by continuous administration of standardized tests cannot be resolved merely by increasing the size of the item pool. Offers alternative strategies to overcome these problems, distributing test items so as to avoid the…
Reliable Video Analysis Helps Security Company Grow
Meurer, Dave; Furgal, Dave; Hobson, Rick
2018-05-11
Armed Response Team (ART) has grown to become the largest locally owned security company in New Mexico. With technical assistance from Sandia National Laboratories through the New Mexico Small Business Assistance (NMSBA) Program, ART got help so they could quickly bring workable video security solutions to market. By offering a reliable video analytic camera system, theyâve been able to reduce theft, add hundreds of clients, and increase their number of employees.
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
NASA Astrophysics Data System (ADS)
Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan
2017-08-01
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.
A Security-façade Library for Virtual-observatory Software
NASA Astrophysics Data System (ADS)
Rixon, G.
2009-09-01
The security-façade library implements, for Java, IVOA's security standards. It supports the authentication mechanisms for SOAP and REST web-services, the sign-on mechanisms (with MyProxy, AstroGrid Accounts protocol or local credential-caches), the delegation protocol, and RFC3820-enabled HTTPS for Apache Tomcat. Using the façade, a developer who is not a security specialist can easily add access control to a virtual-observatory service and call secured services from an application. The library has been an internal part of AstroGrid software for some time and it is now offered for use by other developers.
17 CFR 230.605 - Filing and use of the offering circular.
Code of Federal Regulations, 2010 CFR
2010-04-01
... run along the left hand margin of the page and printed perpendicular to the text, in boldface type at... paragraphs (b) or (f) of this rule and in § 230.606: (1) No written offer of securities of any issuer shall... would normally have been received by him at or prior to the time of such written offer; and (2) No...
A capital idea. Bonds and nontraditional financing options.
Wareham, Therese L
2004-05-01
Not-for-profit healthcare organizations have four basic sources of capital: internal sources, philanthropy, asset sales, and external sources. External sources, in particular, offer a wealth of options that are important for such organizations--especially those facing significant capital shortfalls--to consider. External sources include bond offerings and nontraditional offerings, such as receivables financing, off-balance-sheet options, real estate investment trusts, and subordinated securities.
Is Provider Secure Messaging Associated With Patient Messaging Behavior? Evidence From the US Army.
Wolcott, Vickee; Agarwal, Ritu; Nelson, D Alan
2017-04-06
Secure messaging with health care providers offers the promise of improved patient-provider relationships, potentially facilitating outcome improvements. But, will patients use messaging technology in the manner envisioned by policy-makers if their providers do not actively use it? We hypothesized that the level and type of secure messaging usage by providers might be associated with messaging initiation by their patients. The study employed a dataset of health care and secure messaging records of more than 81,000 US Army soldiers and nearly 3000 clinicians with access to a patient portal system. We used a negative binomial regression model on over 25 million observations to determine the adjusted association between provider-initiated and provider-response messaging and subsequent messaging by their patients in this population over a 4-year period. Prior provider-initiated and response messaging levels were associated with new patient messaging when controlling for the patient's health care utilization and diagnoses, with the strongest association for high provider-response messaging level. Patients whose providers were highly responsive to the messages of other patients initiated 334% more secure messages (P<.001) than patients with providers who did not personally respond to other patients' messages. Our results indicate that provider messaging usage levels and types thereof predict their patients' subsequent communication behavior. The findings suggest the need for more study into the factors associated with provider messaging to fully understand the mechanisms of this relationship. ©Vickee Wolcott, Ritu Agarwal, D. Alan Nelson. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.04.2017.
An improved control mode for the ping-pong protocol operation in imperfect quantum channels
NASA Astrophysics Data System (ADS)
Zawadzki, Piotr
2015-07-01
Quantum direct communication (QDC) can bring confidentiality of sensitive information without any encryption. A ping-pong protocol, a well-known example of entanglement-based QDC, offers asymptotic security in a perfect quantum channel. However, it has been shown (Wójcik in Phys Rev Lett 90(15):157901, 2003. doi:10.1103/PhysRevLett.90.157901) that it is not secure in the presence of losses. Moreover, legitimate parities cannot rely on dense information coding due to possible undetectable eavesdropping even in the perfect setting (Pavičić in Phys Rev A 87(4):042326, 2013. doi:10.1103/PhysRevA.87.042326). We have identified the source of the above-mentioned weaknesses in the incomplete check of the EPR pair coherence. We propose an improved version of the control mode, and we discuss its relation to the already-known attacks that undermine the QDC security. It follows that the new control mode detects these attacks with high probability and independently on a quantum channel type. As a result, an asymptotic security of the QDC communication can be maintained for imperfect quantum channels, also in the regime of dense information coding.
17 CFR 229.1101 - (Item 1101) Definitions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...
17 CFR 229.1101 - (Item 1101) Definitions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...
17 CFR 229.1101 - (Item 1101) Definitions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...
17 CFR 229.1101 - (Item 1101) Definitions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... information regarding the asset-backed securities being offered and the structure and basic parameters of the..., anticipated ratings, and other similar information relating to the proposed structure of the offering); (2... flows of a discrete pool of receivables or other financial assets, either fixed or revolving, that by...
7 CFR 3431.17 - VMLRP service agreement offer.
Code of Federal Regulations, 2011 CFR
2011-01-01
... AND AGRICULTURE VETERINARY MEDICINE LOAN REPAYMENT PROGRAM Administration of the Veterinary Medicine... successful applicants to enter into an agreement with the Secretary to provide veterinary services under the... defined in the RFA, to secure an offer of employment or establish and/or maintain a veterinary practice in...
Optical identity authentication technique based on compressive ghost imaging with QR code
NASA Astrophysics Data System (ADS)
Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang
2018-04-01
With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.
The Psychology of Working Theory.
Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L
2016-03-01
In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).
Experimental plug and play quantum coin flipping.
Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni
2014-04-24
Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-03
... for certificates representing units of fractional undivided interest in the Series' portfolio (``Units... offering price plus a front-end sales charge. If such a market is not maintained at any time for any Series... Equity Series will not restrict their portfolio investments to ``eligible trust securities.'' D. Capital...
The Causes of Poverty: Thinking Critically about a Key Economic Issue
ERIC Educational Resources Information Center
Otlin, Josh
2008-01-01
Economics is a central part of civic education. Students need to know about the Constitution and the party system, but active citizenship in the twenty-first century requires much more than the standard civics courses offer. Economic issues dominate public policy debates ranging from Social Security to immigration to international security. If…
29 CFR 2510.3-101 - Definition of “plan assets”-plan investments.
Code of Federal Regulations, 2011 CFR
2011-07-01
...-offered security nor a security issued by an investment company registered under the Investment Company... other than the investment of capital. The term “operating company” includes an entity which is not...) The date on which the company makes a “new portfolio investment”, or (B) The expiration of 10 years...
17 CFR 230.430A - Prospectus in a registration statement at the time of effectiveness.
Code of Federal Regulations, 2014 CFR
2014-04-01
... SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Form and Content of Prospectuses § 230.430A Prospectus in a registration statement at the time of effectiveness. (a) The form of... respect to the public offering price, underwriting syndicate (including any material relationships between...
17 CFR 230.457 - Computation of fee.
Code of Federal Regulations, 2012 CFR
2012-04-01
... offered solely for market-making purposes by an affiliate of the registrant. (r) Where securities are to... fluctuating market prices, the registration fee is to be calculated upon the basis of the price of securities... registration fee is to be calculated upon the basis of the market value of such assets as of a specified date...
17 CFR 230.457 - Computation of fee.
Code of Federal Regulations, 2014 CFR
2014-04-01
... offered solely for market-making purposes by an affiliate of the registrant. (r) Where securities are to... fluctuating market prices, the registration fee is to be calculated upon the basis of the price of securities... registration fee is to be calculated upon the basis of the market value of such assets as of a specified date...
17 CFR 230.457 - Computation of fee.
Code of Federal Regulations, 2011 CFR
2011-04-01
... offered solely for market-making purposes by an affiliate of the registrant. (r) Where securities are to... fluctuating market prices, the registration fee is to be calculated upon the basis of the price of securities... registration fee is to be calculated upon the basis of the market value of such assets as of a specified date...
17 CFR 230.457 - Computation of fee.
Code of Federal Regulations, 2010 CFR
2010-04-01
... offered solely for market-making purposes by an affiliate of the registrant. (r) Where securities are to... fluctuating market prices, the registration fee is to be calculated upon the basis of the price of securities... registration fee is to be calculated upon the basis of the market value of such assets as of a specified date...
17 CFR 230.457 - Computation of fee.
Code of Federal Regulations, 2013 CFR
2013-04-01
... offered solely for market-making purposes by an affiliate of the registrant. (r) Where securities are to... fluctuating market prices, the registration fee is to be calculated upon the basis of the price of securities... registration fee is to be calculated upon the basis of the market value of such assets as of a specified date...
12 CFR 1026.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Special Rules Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.59... an annual percentage rate that applies to a credit card account under an open-end (not home-secured... percentage rates applicable to similar new credit card accounts under an open-end (not home-secured) consumer...
12 CFR 1026.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Special Rules Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.59... an annual percentage rate that applies to a credit card account under an open-end (not home-secured... percentage rates applicable to similar new credit card accounts under an open-end (not home-secured) consumer...
12 CFR 1026.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Special Rules Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.59... an annual percentage rate that applies to a credit card account under an open-end (not home-secured... percentage rates applicable to similar new credit card accounts under an open-end (not home-secured) consumer...
12 CFR 1026.52 - Limitations on fees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.52 Limitations on... required to pay with respect to a credit card account under an open-end (not home-secured) consumer credit... terms or other requirements of a credit card account under an open-end (not home-secured) consumer...
12 CFR 1026.52 - Limitations on fees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.52 Limitations on... required to pay with respect to a credit card account under an open-end (not home-secured) consumer credit... terms or other requirements of a credit card account under an open-end (not home-secured) consumer...
Macintosh Computer Classroom and Laboratory Security: Preventing Unwanted Changes to the System.
ERIC Educational Resources Information Center
Senn, Gary J.; Smyth, Thomas J. C.
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
ERIC Educational Resources Information Center
Grossman, Michael; Schortgen, Francis
2016-01-01
This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…
First Responders: Community Colleges on the Front Line of Security
ERIC Educational Resources Information Center
American Association of Community Colleges, 2006
2006-01-01
Although homeland security has gained prominence as a national focus and investment, it is clear that much of the most effective preparation must begin at local, state, and regional levels. This report reveals that an astonishing number of community colleges offer degree and certificate programs for first responders--law enforcement officers,…
Unjust Desserts: Financial Realities of Older Women.
ERIC Educational Resources Information Center
Estrine, Judith
This brochure presents the facts about the financial situation of older women. It explains the vital role of Social Security (SS) for women and offers suggestions to improve their financial outlook. A true/false checklist tests knowledge about women growing older and remaining financially secure. These reasons for poorer older women are outlined:…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Financing. 882.405 Section 882.405... § 882.405 Financing. (a) Types. Any type of public or private financing may be utilized with the... Contract as security for financing. An Owner may pledge, or offer as security for any loan or obligation...
Reliability, Compliance, and Security in Web-Based Course Assessments
ERIC Educational Resources Information Center
Bonham, Scott
2008-01-01
Pre- and postcourse assessment has become a very important tool for education research in physics and other areas. The web offers an attractive alternative to in-class paper administration, but concerns about web-based administration include reliability due to changes in medium, student compliance rates, and test security, both question leakage…
Code of Federal Regulations, 2012 CFR
2012-04-01
... forex transactions. 5.7 Section 5.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... exchange dealers and futures commission merchants offering or engaging in retail forex transactions. (a)(1)(i) Each futures commission merchant offering or engaging in retail forex transactions and each...
Code of Federal Regulations, 2014 CFR
2014-04-01
... forex transactions. 5.7 Section 5.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... exchange dealers and futures commission merchants offering or engaging in retail forex transactions. (a)(1)(i) Each futures commission merchant offering or engaging in retail forex transactions and each...
Code of Federal Regulations, 2013 CFR
2013-04-01
... forex transactions. 5.7 Section 5.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... exchange dealers and futures commission merchants offering or engaging in retail forex transactions. (a)(1)(i) Each futures commission merchant offering or engaging in retail forex transactions and each...
17 CFR 270.23c-3 - Repurchase offers by closed-end companies.
Code of Federal Regulations, 2010 CFR
2010-04-01
... a repurchase offer, or after a shareholder vote adopting the fundamental policy specifying a company... pursuant to a fundamental policy, changeable only by a majority vote of the outstanding voting securities... management by the investment adviser, the company's board of directors shall adopt written procedures...
Widening the Tenure Track: A University Offers Some Instructors an Unusual Level of Job Security.
ERIC Educational Resources Information Center
Fogg, Piper
2003-01-01
Describes a program at Western Michigan University that offers full-time, nontenure-track employees the opportunity to earn tenure, providing new tenure rights to instructors who teach in certain professional fields. Describes opposition to the program and reactions of those affected. (SLD)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-28
.... SUMMARY: The Department of Labor (DOL) hereby announces the submission of the Employee Benefits Security... coverage for group health plans and health insurance issuers offering group or individual health insurance... health insurance issuer offering group or individual health insurance coverage generally must not rescind...
29 CFR 2590.701-7 - HMO affiliation period as an alternative to a preexisting condition exclusion.
Code of Federal Regulations, 2010 CFR
2010-07-01
... offering health insurance coverage through an HMO, or an HMO that offers health insurance coverage in... BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH PLANS Health Coverage Portability, Nondiscrimination, and Renewability § 2590.701-7 HMO...
29 CFR 2590.701-7 - HMO affiliation period as an alternative to a preexisting condition exclusion.
Code of Federal Regulations, 2011 CFR
2011-07-01
... offering health insurance coverage through an HMO, or an HMO that offers health insurance coverage in... BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH PLANS Health Coverage Portability, Nondiscrimination, and Renewability § 2590.701-7 HMO...
75 FR 44031 - Goldman, Sachs & Co., et al.; Notice of Application and Temporary Order
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... International (``GSAMI''), Goldman Sachs Hedge Fund Strategies LLC (``GSHFS''), Commonwealth Annuity and Life... marketing materials used in connection with residential mortgage-related securities offerings by Goldman... marketing materials, (iv) where Goldman Sachs is the lead underwriter of an offering of residential mortgage...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-06
... public disclosure. Sensitive personal information such as account numbers or Social Security numbers... in person and online? 4. What programs, policies, accommodations, or benefits do financial service... protections and fraud protections. 5. What unique assistance, if any, is currently offered by financial...
44 CFR 79.7 - Offers and appeals under the SRL program.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.7 Offers and appeals under the SRL program. (a) Consultation. States and communities... mitigation activity. These consultations shall be initiated in the early stages of the project development...
44 CFR 79.7 - Offers and appeals under the SRL program.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.7 Offers and appeals under the SRL program. (a) Consultation. States and communities... mitigation activity. These consultations shall be initiated in the early stages of the project development...
44 CFR 79.7 - Offers and appeals under the SRL program.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.7 Offers and appeals under the SRL program. (a) Consultation. States and communities... mitigation activity. These consultations shall be initiated in the early stages of the project development...
44 CFR 79.7 - Offers and appeals under the SRL program.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.7 Offers and appeals under the SRL program. (a) Consultation. States and communities... mitigation activity. These consultations shall be initiated in the early stages of the project development...
Capturing security requirements for software systems.
El-Hadary, Hassan; El-Kassas, Sherif
2014-07-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.
Capturing security requirements for software systems
El-Hadary, Hassan; El-Kassas, Sherif
2014-01-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara
2003-08-29
The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.
2001-01-31
before the nation, and to produce organizational competence capable of addressing those problems creatively. The key to our vision is the need for...influence and critical leadership role. We offer recommendations for organizational change in five key areas: ● ensuring the security of the American...homeland; ● recapitalizing America’s strengths in science and education; ● redesigning key institutions of the Executive Branch; ● overhauling the
A Social Infrastructure for Hometown Security: Advancing the Homeland Security Paradigm
2009-05-01
administration has issued a national call to service . This call offers an opportunity to invest in a social infrastructure for homeland security that will... Services , Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should...said, “We were ready…to answer a new call for our country, but the call never came.” “Instead of a call to service , we were asked to go shopping.”12
The climate change and energy security nexus
DOE Office of Scientific and Technical Information (OSTI.GOV)
King, Marcus Dubois; Gulledge, Jay
2013-01-01
The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategicmore » Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.« less
A genetic epidemiology approach to cyber-security.
Gil, Santiago; Kott, Alexander; Barabási, Albert-László
2014-07-16
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.
A genetic epidemiology approach to cyber-security
Gil, Santiago; Kott, Alexander; Barabási, Albert-László
2014-01-01
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security. PMID:25028059
Chalcogenide based rib waveguide for compact on-chip supercontinuum sources in mid-infrared domain
NASA Astrophysics Data System (ADS)
Saini, Than Singh; Tiwari, Umesh Kumar; Sinha, Ravindra Kumar
2017-08-01
We have designed and analysed a rib waveguide structure in recently reported Ga-Sb-S based highly nonlinear chalcogenide glass for nonlinear applications. The proposed waveguide structure possesses a very high nonlinear coefficient and can be used to generate broadband supercontinuum in mid-infrared domain. The reported design of the chalcogenide waveguide offers two zero dispersion values at 1800 nm and 2900 nm. Such rib waveguide structure is suitable to generate efficient supercontinuum generation ranging from 500 - 7400 μm. The reported waveguide can be used for the realization of the compact on-chip supercontinuum sources which are highly applicable in optical imaging, optical coherence tomography, food quality control, security and sensing.
Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?
2009-09-01
collaborative effort? C. RESEARCH METHODOLOGY This research project utilized a modified case study methodology. The traditional case study method ...discussing the research method , offering smart practices and culminate with findings and recommendations. Chapter II Homeland Security Collaboration...41 Centers for Regional Excellence, “Building Models.” 16 Chapter III Research Methodology: Modified Case Study Method is
Working Connections: Suzan Lee--UBS Securities LLC, New York
ERIC Educational Resources Information Center
Library Journal, 2004
2004-01-01
This article is about Suzan Lee of UBS Securities LLC in New York, a person who is dedicated to connecting aspiring professionals to opportunities in the world of special libraries. In 1999, Lee realized that most library students had only one resource for internships--their library schools--and that these offerings focused largely on public and…
17 CFR 230.800 - Definitions for §§ 230.800, 230.801 and 230.802.
Code of Federal Regulations, 2014 CFR
2014-04-01
... purchase initially is in proportion to the number of securities he or she holds of record on the record date for the rights offering. If an existing security holder holds depositary receipts, the proportion... or any regulatory body in the issuer's jurisdiction of incorporation or (if different) the non-U.S...
17 CFR 230.800 - Definitions for §§ 230.800, 230.801 and 230.802.
Code of Federal Regulations, 2012 CFR
2012-04-01
... purchase initially is in proportion to the number of securities he or she holds of record on the record date for the rights offering. If an existing security holder holds depositary receipts, the proportion... or any regulatory body in the issuer's jurisdiction of incorporation or (if different) the non-U.S...
17 CFR 230.800 - Definitions for §§ 230.800, 230.801 and 230.802.
Code of Federal Regulations, 2013 CFR
2013-04-01
... purchase initially is in proportion to the number of securities he or she holds of record on the record date for the rights offering. If an existing security holder holds depositary receipts, the proportion... or any regulatory body in the issuer's jurisdiction of incorporation or (if different) the non-U.S...
17 CFR 230.800 - Definitions for §§ 230.800, 230.801 and 230.802.
Code of Federal Regulations, 2011 CFR
2011-04-01
... purchase initially is in proportion to the number of securities he or she holds of record on the record date for the rights offering. If an existing security holder holds depositary receipts, the proportion... or any regulatory body in the issuer's jurisdiction of incorporation or (if different) the non-U.S...
ERIC Educational Resources Information Center
Lustig, Daniel C.; Strauser, David R.
2010-01-01
Access to health insurance is one of the critical aspects of securing employment for people with disabilities. This study investigated whether vocational rehabilitation consumers secured employment with an employer who offered health insurance at similar rates to workers in the general population. In general, the results show that vocational…
Security Is Not an Option--Learning in a Safe Environment. FEDA Paper.
ERIC Educational Resources Information Center
Coe, Beatrice
1997-01-01
A study examined what further education colleges in Britain were doing about security and what they planned for the future. A literature search found that a PEST (Political/legal, Economic, Sociocultural, and Technological) analysis was one way to examine the differential impact of external influences. A PEST analysis offered a strategy for…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... sales by customers in a narrow set of instances, such as when an issuer has made a tender offer for the... municipal securities transaction, to disclose to its customer, at or prior to the time of trade, all... Prepay Principal (March 19, 1991), Notice Concerning Disclosure of Call Information to Customers of...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... through a trading system that electronically matches bids and offers pursuant to a predetermined algorithm... participants with a time or place advantage or the ability to override a predetermined algorithm must submit an... override a predetermined algorithm from trading a security futures product for accounts in which these same...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... through a trading system that electronically matches bids and offers pursuant to a predetermined algorithm... participants with a time or place advantage or the ability to override a predetermined algorithm must submit an... override a predetermined algorithm from trading a security futures product for accounts in which these same...
13 CFR 108.825 - Purchasing securities from an underwriter or other third party.
Code of Federal Regulations, 2010 CFR
2010-01-01
... ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Financing of Small Businesses by NMVC Companies Structuring Nmvc Company's Financing of Eligible Small Businesses § 108.825 Purchasing securities from an... within 90 days of the date the public offering is first made; (2) Your purchase price is no more than the...
17 CFR 230.255 - Preliminary Offering Circulars.
Code of Federal Regulations, 2010 CFR
2010-04-01
... filing, a written offer of securities may be made if it meets the following requirements: (1) The outside..., and the following statement, which shall run along the left hand margin of the page and be printed perpendicular to the text, in boldfaced type at least as large as that used generally in the body of such...
75 FR 54464 - Delegation of Authority to the Director of Its Division of Enforcement
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-08
... Division of Enforcement, in connection with the collection of delinquent debts arising from actions to enforce the federal securities laws, to terminate collection activity or discharge debts, to accept or reject offers to compromise debts, and to accept or reject offers to enter into payment plans. This...
17 CFR 242.602 - Dissemination of quotations in NMS securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... FUTURES Regulation Nms-Regulation of the National Market System § 242.602 Dissemination of quotations in..., processing such bids, offers, and sizes, and making such bids, offers, and sizes available to vendors, as... responsible broker or dealer other than an exchange market maker which is cancelled or withdrawn if not...
19 CFR 12.91 - Electronic products offered for importation under the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., that the electronic product described in the declaration filed by the importer of record is in... 19 Customs Duties 1 2010-04-01 2010-04-01 false Electronic products offered for importation under... SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Electronic Products § 12.91 Electronic...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Exemptions. 563g.3 Section 563g.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.3 Exemptions... non-public offering which satisfies the requirements of § 563g.4 of this part; (e) That are debt...
Short-Term Benefits, Long-Term Harm? Alternative Training to Apprenticeships in Norway
ERIC Educational Resources Information Center
Aspøy, Tove Mogstad; Nyen, Torgeir
2017-01-01
Many countries with apprenticeship-based systems of VET face a shortage of apprenticeships. Some countries, including Denmark and Norway, address this supply-demand mismatch by offering alternative school-based routes to vocational qualifications for students not able to secure an apprenticeship. Other countries offer no alternative routes, but…
17 CFR 230.236 - Exemption of shares offered in connection with certain transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Exemptions § 230.236 Exemption of shares offered in connection with certain transactions. Shares of stock or... securities in lieu of issuing fractional shares, script certificates or order forms, in connection with a stock dividend, stock split, reverse stock split, conversion, merger or similar transaction, shall be...
12 CFR 563g.18 - Current and periodic reports.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Current and periodic reports. 563g.18 Section 563g.18 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.18 Current and periodic reports. (a) Each savings association which files an offering circular...
12 CFR 563g.13 - Public disclosure and confidential treatment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Public disclosure and confidential treatment. 563g.13 Section 563g.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.13 Public disclosure and confidential treatment. (a) Any offering circular...
12 CFR 563g.11 - Withdrawal or abandonment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Withdrawal or abandonment. 563g.11 Section 563g.11 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.11 Withdrawal or abandonment. (a) Any offering circular, amendment, or exhibit may be withdrawn...
Global Food Security in a Changing Climate: Considerations and Projections
NASA Astrophysics Data System (ADS)
Walsh, M. K.; Brown, M. E.; Backlund, P. W.; Antle, J. M.; Carr, E. R.; Easterling, W. E.; Funk, C. C.; Murray, A.; Ngugi, M.; Barrett, C. B.; Ingram, J. S. I.; Dancheck, V.; O'Neill, B. C.; Tebaldi, C.; Mata, T.; Ojima, D. S.; Grace, K.; Jiang, H.; Bellemare, M.; Attavanich, W.; Ammann, C. M.; Maletta, H.
2015-12-01
Global food security is an elusive challenge and important policy focus from the community to the globe. Food is provisioned through food systems that may be simple or labyrinthine, yet each has vulnerabilities to climate change through its effects on food production, transportation, storage, and other integral food system activities. At the same time, the future of food systems is sensitive to socioeconomic trajectories determined by choices made outside of the food system, itself. Constrictions for any reason can lead to decreased food availability, access, utilization, or stability - that is, to diminished food security. Possible changes in trade and other U.S. relationships to the rest of the world under changing conditions to the end of the century are considered through integrated assessment modelling under a range of emissions scenarios. Climate change is likely to diminish continued progress on global food security through production disruptions leading to local availability limitations and price increases, interrupted transport conduits, and diminished food safety, among other causes. In the near term, some high-latitude production export regions may benefit from changes in climate. The types and price of food imports is likely to change, as are export demands, affecting U.S. consumers and producers. Demands placed on foreign assistance programs may increase, as may demand for advanced technologies. Adaptation across the food system has great potential to manage climate change effects on food security, and the complexity of the food system offers multiple potential points of intervention for decision makers at every level. However, effective adaptation is subject to highly localized conditions and socioeconomic factors, and the technical feasibility of an adaptive intervention is not necessarily a guarantee of its application if it is unaffordable or does not provide benefits within a relatively short time frame.
Interpreting international governance standards for health IT use within general medical practice.
Mahncke, Rachel J; Williams, Patricia A H
2014-01-01
General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.
24-Hour Relativistic Bit Commitment.
Verbanis, Ephanielle; Martin, Anthony; Houlmann, Raphaël; Boso, Gianluca; Bussières, Félix; Zbinden, Hugo
2016-09-30
Bit commitment is a fundamental cryptographic primitive in which a party wishes to commit a secret bit to another party. Perfect security between mistrustful parties is unfortunately impossible to achieve through the asynchronous exchange of classical and quantum messages. Perfect security can nonetheless be achieved if each party splits into two agents exchanging classical information at times and locations satisfying strict relativistic constraints. A relativistic multiround protocol to achieve this was previously proposed and used to implement a 2-millisecond commitment time. Much longer durations were initially thought to be insecure, but recent theoretical progress showed that this is not so. In this Letter, we report on the implementation of a 24-hour bit commitment solely based on timed high-speed optical communication and fast data processing, with all agents located within the city of Geneva. This duration is more than 6 orders of magnitude longer than before, and we argue that it could be extended to one year and allow much more flexibility on the locations of the agents. Our implementation offers a practical and viable solution for use in applications such as digital signatures, secure voting and honesty-preserving auctions.
Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Wireless technology infrastructures for authentication of patients: PKI that rings.
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
Unconditional security of quantum key distribution over arbitrarily long distances
Lo; Chau
1999-03-26
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. The proof is reduced from a noisy quantum scheme to a noiseless quantum scheme and then from a noiseless quantum scheme to a noiseless classical scheme, which can then be tackled by classical probability theory.
Curiac, Daniel-Ioan
2016-04-07
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.
TealLock 5.20 security software program for handheld devices.
Tahil, Fatimah A
2004-07-01
The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.
Social Security and the Retirement and Savings Behavior of Low Income Households1
van der Klaauw, Wilbert; Wolpin, Kenneth I.
2011-01-01
In this paper, we develop and estimate a model of retirement and savings incorporating limited borrowing, stochastic wage offers, health status and survival, social security benefits, Medicare and employer provided health insurance coverage, and intentional bequests. The model is estimated on sample of relatively poor households from the first three waves of the Health and Retirement Study (HRS), for whom we would expect social security income to be of particular importance. The estimated model is used to simulate the responses to changes in social security rules, including changes in benefit levels, in the payroll tax, in the social security earnings tax and in early and normal retirement ages. Welfare and budget consequences are estimated. PMID:21566719
Infrared particle detection for battery electrode foils
NASA Astrophysics Data System (ADS)
Just, P.; Ebert, L.; Echelmeyer, T.; Roscher, M. A.
2013-11-01
Failures of electrochemical cells caused by internal shorts still are an important issue to be faced by the cell manufacturers and their customers. A major cause for internal shorts are contaminated electrode foils. These contaminations have to be detected securely via a non-destructive inspection technique integrated into the electrode manufacturing process. While optical detection already is state of the art, infrared detection of particles finds a new field of application in the battery electrode manufacturing process. This work presents two approaches focusing on electrode inspection by electromagnetic radiation (visible and infrared). Copper foils with a carbon based coating were intentionally contaminated by slivers of aluminum and copper as well as by abraded coating particles. Optical excitation by a flash and a luminescent lamp was applied at different angles in order to detect the reflected visible radiation. A laser impulse was used to heat up the specimen for infrared inspection. Both approaches resulted in setups providing a high contrast between contaminations and the coated electrode foil. It is shown that infrared detection offers a higher security thanks to its reliance on absorbance and emissivity instead of reflectivity as it is used for optical detection. Infrared Detection offers a potential since it is hardly influenced by the particle's shape and orientation and the electrode's waviness.
[State of supply services for industrial hygiene and safety in Colombia].
Varona, Marcela E; Torres, Carlos Humberto; Díaz, Sonia M; Palma, Ruth Marién; Checa, Diana Milena; Conde, Juan Vicente
2012-01-01
Institutions that supply occupational health services must offer services that are reliable and of high quality across the spectrum of industrial hygiene and safety needs. Services for occupational health were identified at several institutions, and the technical quality and reliability of these services were compared in different regions of Colombia. This descriptive study identified the services available for industrial hygiene and safety in 15 cities of Colombia. A survey was conducted in 192 institutions offering such services and a statistical analysis of these results was undertaken. This sample was taken from a nationwide list of institutions purportedly licensed for this activity. Thirty-two percent (61) of the evaluated institutions provided hygiene services, and 48% (93) provided safety services. The range of health services was provided on a subcontract basis both for professional personnel and the equipment. Six institutions in the area of industrial hygiene and 1 in the area of industrial security were supplying services with pending or suspended institutional licenses. Deficiencies in the quality, infrastructure and levels of automation were identified at institutions that supply services of hygiene and industrial security. The resulting recommendatios are that the Ministry of the Social Protection fortifies mechanisms for (1) the evaluation and control of the supplied services, and (2) verify that the institutional activity is in accordance with current and valid licensing.
High-Performance Secure Database Access Technologies for HEP Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthew Vranicar; John Weicher
2006-04-17
The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysismore » capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
... the issuer or its affiliates pursuant to an employee benefit plan established and administered in.... person or for the account or benefit of a U.S. person (other than a distributor); and (iii) Each... benefit of a U.S. person (other than a distributor); and (B) The securities are represented upon issuance...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63900; File No. SR-NASDAQ-2011-026] Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Offer Additional Routing Option February 14, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'')...
Code of Federal Regulations, 2010 CFR
2010-04-01
... text of disclosure requirements in the schedule or any document published, sent or given to security holders. Indicate clearly the coverage of the requirements without referring to the text of the items. F... holders. If pro forma financial information is required by this instruction, the historical financial...
2011-10-01
Fortunately, some products offer centralized management and deployment tools for local desktop implementation . Figure 5 illustrates the... implementation of a secure desktop infrastructure based on virtualization. It includes an overview of desktop virtualization, including an in-depth...environment in the data centre, whereas LHVD places it on the endpoint itself. Desktop virtualization implementation considerations and potential
The Systems Librarian: Implementing Wireless Networks without Compromising Security
ERIC Educational Resources Information Center
Breeding, Marshall
2005-01-01
Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…
ERIC Educational Resources Information Center
Smith, David J.
2007-01-01
A central mission of the United States Institute of Peace (USIP) is the promotion of international conflict resolution education by assisting and supporting colleges and universities in their efforts at developing and offering programs, courses, and activities that focus on international peace, conflict, and security. Over the years, a number of…
NASA Astrophysics Data System (ADS)
Burnett, M.
2010-12-01
One topic that is beginning to influence the systems that support these goals is that of Information Technology (IT) Security. Unsecure systems are vulnerable to increasing attacks and other negative consequences; sponsoring agencies are correspondingly responding with more refined policies and more stringent security requirements. These affect how EO systems can meet the goals of data and service interoperability and harmonization through open access, transformation and visualization services. Contemporary systems, including the vision of a system-of-systems (such as GEOSS, the Global Earth Observation System of Systems), utilize technologies that support a distributed, global, net-centric environment. These types of systems have a high reliance on the open systems, web services, shared infrastructure and data standards. The broader IT industry has developed and used these technologies in their business and mission critical systems for many years. Unfortunately, the IT industry, and their customers have learned the importance of protecting their assets and resources (computing and information) as they have been forced to respond to an ever increasing number and more complex illegitimate “attackers”. This presentation will offer an overview of work done by the CEOS WGISS organization in summarizing security threats, the challenges to responding to them and capturing the current state of the practice within the EO community.
Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.
Bao, Long; Yi, Shuang; Zhou, Yicong
2017-12-01
This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.
Combinatorial Production and Processing of Oxide Nanopowders for Transparent, Ceramic Lasers
2007-06-01
lasers have only recently been 10-16shown to offer power outputs superior to single crystal lasers. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...7 Although known for 30 years, 8 9 transparent ceramic lasers have only recently been shown to offer power outputs superior to single crystal lasers...offer: (1) higher energy production than single crystal lasers; (2) access to very large sizes and arbitrarily shaped gain media; (3) access to new
A Transferrable Belief Model Representation for Physical Security of Nuclear Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Gerts
This work analyzed various probabilistic methods such as classic statistics, Bayesian inference, possibilistic theory, and Dempster-Shafer theory of belief functions for the potential insight offered into the physical security of nuclear materials as well as more broad application to nuclear non-proliferation automated decision making theory. A review of the fundamental heuristic and basic limitations of each of these methods suggested that the Dempster-Shafer theory of belief functions may offer significant capability. Further examination of the various interpretations of Dempster-Shafer theory, such as random set, generalized Bayesian, and upper/lower probability demonstrate some limitations. Compared to the other heuristics, the transferrable beliefmore » model (TBM), one of the leading interpretations of Dempster-Shafer theory, can improve the automated detection of the violation of physical security using sensors and human judgment. The improvement is shown to give a significant heuristic advantage over other probabilistic options by demonstrating significant successes for several classic gedanken experiments.« less
Trade and commerce in improved crops and food: an essay on food security.
Kershen, Drew L
2010-11-30
Agricultural trade between nations is a significant proportion of total international trade. Agricultural trade in transgenic crops faces extra complications due to the existence of domestic and international regimes that focus specifically on agricultural biotechnology. These specialized regimes create legal and commercial challenges for trade in transgenic crops that have significant implications for the food security of the nations of the world. By food security, one should understand not just the available supply of food, but also the quality of the food and the environmental impact of agricultural production systems. These specialized regimes for transgenic crops can either encourage or hinder the adoption of agricultural biotechnology as a sustainable intensive agriculture. Sustainable intensive agriculture offers hope for agronomic improvements for agricultural production, socio-economic betterment for farmers and environmental benefits for societies. Sustainable intensive agriculture offers particular hope for the poorest farmers of the world because agricultural biotechnology is a technology in the seed. Copyright © 2010 Elsevier B.V. All rights reserved.
Science and the Energy Security Challenge: The Example of Solid-State Lighting
Philips, Julia [Sandia
2017-12-09
Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products â a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.
Sušnik, Janez; Vamvakeridou-Lyroudia, Lydia S; Baumert, Niklas; Kloos, Julia; Renaud, Fabrice G; La Jeunesse, Isabelle; Mabrouk, Badr; Savić, Dragan A; Kapelan, Zoran; Ludwig, Ralf; Fischer, Georg; Roson, Roberto; Zografos, Christos
2015-01-15
CLImate-induced changes on WAter and SECurity (CLIWASEC) was a cluster of three complementary EC-FP7 projects assessing climate-change impacts throughout the Mediterranean on: hydrological cycles (CLIMB - CLimate-Induced changes on the hydrology of Mediterranean Basins); water security (WASSERMed - Water Availability and Security in Southern EuRope and the Mediterranean) and human security connected with possible hydro-climatic conflicts (CLICO - CLImate change hydro-COnflicts and human security). The Nile delta case study was common between the projects. CLIWASEC created an integrated forum for modelling and monitoring to understand potential impacts across sectors. This paper summarises key results from an integrated assessment of potential challenges to water-related security issues, focusing on expected sea-level rise impacts by the middle of the century. We use this common focus to illustrate the added value of project clustering. CLIWASEC pursued multidisciplinary research by adopting a single research objective: sea-level rise related water security threats, resulting in a more holistic view of problems and potential solutions. In fragmenting research, policy-makers can fail to understand how multiple issues can materialize from one driver. By combining efforts, an integrated assessment of water security threats in the lower Nile is formulated, offering policy-makers a clearer picture of inter-related issues to society and environment. The main issues identified by each project (land subsidence, saline intrusion - CLIMB; water supply overexploitation, land loss - WASSERMed; employment and housing security - CLICO), are in fact related. Water overexploitation is exacerbating land subsidence and saline intrusion, impacting on employment and placing additional pressure on remaining agricultural land and the underdeveloped housing market. All these have wider implications for regional development. This richer understanding could be critical in making better policy decisions when attempting to mitigate climate and social change impacts. The CLIWASEC clustering offers an encouraging path for the new European Commission Horizon 2020 programme to follow. Copyright © 2014 Elsevier B.V. All rights reserved.
Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
Fernández, Gonzalo; López-Coronado, Miguel
2013-01-01
Background The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients’ medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. Objective To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. Methods To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Results Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Conclusions Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access and data breaches. Patients must be kept informed about how their data are being managed. PMID:23965254
Analysis of the security and privacy requirements of cloud-based electronic health records systems.
Rodrigues, Joel J P C; de la Torre, Isabel; Fernández, Gonzalo; López-Coronado, Miguel
2013-08-21
The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access and data breaches. Patients must be kept informed about how their data are being managed.
Risk assessment of climate systems for national security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean
2012-10-01
Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.
Privacy, confidentiality, and electronic medical records.
Barrows, R C; Clayton, P D
1996-01-01
The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450
Safe: a status update on information security and the hospital community.
Fundner, Rita
2003-01-01
IT Security and Privacy are becoming increasingly visible "hot topics" across the full spectrum of industry and service sectors. Legislation and global "best practices" are working hard to defend organizations and individuals against escalating, rapidly evolving cyber-threats. Predictably, the threat landscape is having an impact on all levels to varying degrees: governmental, organizational and individual. This article introduces the basic context for information security and offers insight into how a number of hospitals are addressing the situation, what barriers they currently face and what opportunities they see unfolding.
Redefining yield gaps at various spatial scales
NASA Astrophysics Data System (ADS)
Meng, K.; Fishman, R.; Norstrom, A. V.; Diekert, F. K.; Engstrom, G.; Gars, J.; McCarney, G. R.; Sjostedt, M.
2013-12-01
Recent research has highlighted the prevalence of 'yield gaps' around the world and the importance of closing them for global food security. However, the traditional concept of yield gap -defined as the difference between observed and optimal yield under biophysical conditions - omit relevant socio-economic and ecological constraints and thus offer limited guidance on potential policy interventions. This paper proposes alternative definitions of yield gaps by incorporating rich, high resolution, national and sub-national agricultural datasets. We examine feasible efforts to 'close yield gaps' at various spatial scales and across different socio-economic and ecological domains.
ERIC Educational Resources Information Center
Joana, Amankwa; Selase, Gbadegbe Richard; Selorm, Gbetodeme; Emefa, Agra Florence
2015-01-01
For a nation like Ghana to develop, it is necessary to pay much attention to Vocational and Technical Education. This is so because school programmes that place emphasis on theory courses or humanities are no longer useful to the nation.Graduates who offer such programmes find it very difficult to secure employment in the Ghanaian job market…
Robust Speaker Authentication Based on Combined Speech and Voiceprint Recognition
NASA Astrophysics Data System (ADS)
Malcangi, Mario
2009-08-01
Personal authentication is becoming increasingly important in many applications that have to protect proprietary data. Passwords and personal identification numbers (PINs) prove not to be robust enough to ensure that unauthorized people do not use them. Biometric authentication technology may offer a secure, convenient, accurate solution but sometimes fails due to its intrinsically fuzzy nature. This research aims to demonstrate that combining two basic speech processing methods, voiceprint identification and speech recognition, can provide a very high degree of robustness, especially if fuzzy decision logic is used.
NASA Astrophysics Data System (ADS)
Hoeft, B.; Epting, U.; Koenig, T.
2008-07-01
While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-05
... Rule Change To Adopt Reduced Fees for Historical ISE Open/Close Trade Profile Intraday Market Data... historical ISE Open/Close Trade Profile Intraday market data offering. The text of the proposed rule change... Change 1. Purpose ISE currently sells the ISE Open/Close Trade Profile Intraday, a market data offering...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Post-filing free writing..., other than the issuer, the participant has a reasonable belief that the issuer is not an ineligible... limitation through the use of a free writing prospectus, in the offering. [70 FR 44806, Aug. 3, 2005] ...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Post-filing free writing..., other than the issuer, the participant has a reasonable belief that the issuer is not an ineligible... limitation through the use of a free writing prospectus, in the offering. [70 FR 44806, Aug. 3, 2005] ...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Post-filing free writing..., other than the issuer, the participant has a reasonable belief that the issuer is not an ineligible... limitation through the use of a free writing prospectus, in the offering. [70 FR 44806, Aug. 3, 2005] ...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Post-filing free writing..., other than the issuer, the participant has a reasonable belief that the issuer is not an ineligible... limitation through the use of a free writing prospectus, in the offering. [70 FR 44806, Aug. 3, 2005] ...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Post-filing free writing..., other than the issuer, the participant has a reasonable belief that the issuer is not an ineligible... limitation through the use of a free writing prospectus, in the offering. [70 FR 44806, Aug. 3, 2005] ...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-30
... Data Products August 23 2012. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934... Proposed Rule Change The Exchange proposes to offer certain proprietary options data products. The text of... Rule Change 1. Purpose The Exchange proposes to offer certain proprietary options data products...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-06
... assessed different fees than other indexes.\\21\\ In addition, the concept of offering a volume discount to.... This volume discount on trading Options on Treasury Securities will serve to increase order flow, which... options transaction charge. It is also reasonable and equitable to offer a floor volume discount on...
12 CFR 563g.6 - Effective date.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Effective date. 563g.6 Section 563g.6 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.6 Effective date. (a) Except as provided for in paragraph (d) of this section, an offering circular filed by a...
An Analysis of Students Enrolled to an Undergraduate University Course Offered Also Online
ERIC Educational Resources Information Center
Scarabottolo, Nello
2016-01-01
This paper analyzes the main characteristics of the students enrolled to a three-years undergraduate course on Security of Computer Systems and Networks, offered in traditional, classroom based fashion as well as online at the University of Milan (Italy). This allows to compare classroom and online students from several points of view, and gives…
Nuclear instrumentation and measurement: a review based on the ANIMMA conferences
NASA Astrophysics Data System (ADS)
Giot, Michel; Vermeeren, Ludo; Lyoussi, Abdallah; Reynard-Carette, Christelle; Lhuillier, Christian; Mégret, Patrice; Deconinck, Frank; Gonçalves, Bruno Soares
2017-12-01
The ANIMMA conferences offer a unique opportunity to discover research carried out in all fields of nuclear measurements and instrumentation with applications extending from fundamental physics to fission and fusion reactors, medical imaging, environmental protection and homeland security. After four successful editions of the Conference, it was decided to prepare a review based to a large extent but not exclusively on the papers presented during the first four editions of the conference. This review is organized according to the measurement methodologies: neutronic, photonic, thermal, acoustic and optical measurements, as well as medical imaging and specific challenges linked to data acquisition and electronic hardening. The paper describes the main challenges justifying research in these different areas, and summarizes the recent progress reported. It offers researchers and engineers a way to quickly and efficiently access knowledge in highly specialized areas.
Feasibility of Using Distributed Wireless Mesh Networks for Medical Emergency Response
Braunstein, Brian; Trimble, Troy; Mishra, Rajesh; Manoj, B. S.; Rao, Ramesh; Lenert, Leslie
2006-01-01
Achieving reliable, efficient data communications networks at a disaster site is a difficult task. Network paradigms, such as Wireless Mesh Network (WMN) architectures, form one exemplar for providing high-bandwidth, scalable data communication for medical emergency response activity. WMNs are created by self-organized wireless nodes that use multi-hop wireless relaying for data transfer. In this paper, we describe our experience using a mesh network architecture we developed for homeland security and medical emergency applications. We briefly discuss the architecture and present the traffic behavioral observations made by a client-server medical emergency application tested during a large-scale homeland security drill. We present our traffic measurements, describe lessons learned, and offer functional requirements (based on field testing) for practical 802.11 mesh medical emergency response networks. With certain caveats, the results suggest that 802.11 mesh networks are feasible and scalable systems for field communications in disaster settings. PMID:17238308
Code of Federal Regulations, 2010 CFR
2010-04-01
... COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS Pt. 30, App. D Appendix D to Part 30—Information... trading of futures contracts on a group or index of securities on contract markets and derivatives... United States, a Futures Contract on a Foreign Non-Narrow-Based Security Index Traded on That Foreign...
2006-12-01
Supplement DOD Department of Defense DOL Department of Labor DTSA Defense Technology Security Administration EAR Export Administration Regulations...and outreach to companies on the export regulations. DOD: The Defense Technology Security Administration ( DTSA ) represents DOD on export control...and technologies, which DOD oversees. DTSA serves an advisory role in State’s and Commerce’s export license review processes and offers technical
Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin
2011-06-01
This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.
Steganography on quantum pixel images using Shannon entropy
NASA Astrophysics Data System (ADS)
Laurel, Carlos Ortega; Dong, Shi-Hai; Cruz-Irisson, M.
2016-07-01
This paper presents a steganographical algorithm based on least significant bit (LSB) from the most significant bit information (MSBI) and the equivalence of a bit pixel image to a quantum pixel image, which permits to make the information communicate secretly onto quantum pixel images for its secure transmission through insecure channels. This algorithm offers higher security since it exploits the Shannon entropy for an image.
Code of Federal Regulations, 2011 CFR
2011-04-01
... the Office of EDGAR and Information Analysis at (202) 551-3610. (2) If filing the Schedule in paper... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... Data Gathering, Analysis, and Retrieval (EDGAR) system in accordance with the EDGAR rules set forth in...
Code of Federal Regulations, 2014 CFR
2014-04-01
... the Office of EDGAR and Information Analysis at (202) 551-3610. (2) If filing the Schedule in paper... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... Data Gathering, Analysis, and Retrieval (EDGAR) system in accordance with the EDGAR rules set forth in...
Code of Federal Regulations, 2012 CFR
2012-04-01
... the Office of EDGAR and Information Analysis at (202) 551-3610. (2) If filing the Schedule in paper... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... Data Gathering, Analysis, and Retrieval (EDGAR) system in accordance with the EDGAR rules set forth in...
Code of Federal Regulations, 2013 CFR
2013-04-01
... the Office of EDGAR and Information Analysis at (202) 551-3610. (2) If filing the Schedule in paper... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... Data Gathering, Analysis, and Retrieval (EDGAR) system in accordance with the EDGAR rules set forth in...
Cultural Awareness in Nuclear Security Programs: A Critical Link
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Cultural Awareness in Nuclear Security Programs: A Critical Link
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
2016-11-20
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Applying New Network Security Technologies to SCADA Systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P
2006-11-01
Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators.more » 4This page intentionally left blank.« less
Curiac, Daniel-Ioan
2016-01-01
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601
Iotti, Bryan; Valazza, Alberto
2014-10-01
Picture Archiving and Communications Systems (PACS) are the most needed system in a modern hospital. As an integral part of the Digital Imaging and Communications in Medicine (DICOM) standard, they are charged with the responsibility for secure storage and accessibility of the diagnostic imaging data. These machines need to offer high performance, stability, and security while proving reliable and ergonomic in the day-to-day and long-term storage and retrieval of the data they safeguard. This paper reports the experience of the authors in developing and installing a compact and low-cost solution based on open-source technologies in the Veterinary Teaching Hospital for the University of Torino, Italy, during the course of the summer of 2012. The PACS server was built on low-cost x86-based hardware and uses an open source operating system derived from Oracle OpenSolaris (Oracle Corporation, Redwood City, CA, USA) to host the DCM4CHEE PACS DICOM server (DCM4CHEE, http://www.dcm4che.org ). This solution features very high data security and an ergonomic interface to provide easy access to a large amount of imaging data. The system has been in active use for almost 2 years now and has proven to be a scalable, cost-effective solution for practices ranging from small to very large, where the use of different hardware combinations allows scaling to the different deployments, while the use of paravirtualization allows increased security and easy migrations and upgrades.
Forecasting Higher Education's Future.
ERIC Educational Resources Information Center
Boyken, Don; Buck, Tina S.; Kollie, Ellen; Przyborowski, Danielle; Rondinelli, Joseph A.; Hunter, Jeff; Hanna, Jeff
2003-01-01
Offers predictions on trends in higher education to accommodate changing needs, lower budgets, and increased enrollment. They involve campus construction, security, administration, technology, interior design, athletics, and transportation. (EV)
ERIC Educational Resources Information Center
Kennedy, Mike
2003-01-01
Offers ten suggestions for schools and universities to maximize their budgets: energy upgrades, security technology, maintenance management systems, partnerships, modernized washrooms, windows, facilities assessment, outsourcing, alternative fuels, and building commissioning. (EV)
Hospital security: strengthening the weakest link--forensic patients.
Lashley, Joel
2008-01-01
In this article, reprinted with permission from CorrectionsOne.com, the online resource for the Corrections community, the author focuses on the responsibility of the hospital, its security department, and its healthcare staff when a forensic prisoner is brought in for treatment. Hospitals are responsible for all of their patients, he says, and as such, have every right to ask how much of a danger a given patient presents to their facility, and whether they should insist on a higher level of security. To avoid the tragic occurrences which have all to often taken place when forensic prisoners try to escape, hospitals should require their own security department to liaison with all agencies that maintain custody of patients inside their facility in order to assess any related security risks--and offer appropriate support. Even unarmed healthcare security personnel need to receive training in weapons retention and control, and all healthcare staff should be versed in tactical awareness.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-05
... decisions. The MSRB is firmly of the belief that the proposed rule change is within its statutory authority... Proposed Rule Change Relating to Rule G-32, on Disclosures in Connection With Primary Offerings, Form G-32... proposed rule change relating to Rule G-32, on disclosures in connection with primary offerings, Form G-32...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-13
... Macquarie Capital (New Zealand) Limited/Macquarie Securities (NZ) Limited (together, ``Joint Lead Managers... that the gross proceeds of the Proposed Global Offering will be approximately NZ$2.5 billion (approximately US$2.0 billion using the NZ$/US$ exchange rate as of July 29, 2013); 3. No more than 20% of the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... sales of securities issued by open-end investment companies or unit investment trusts registered or... reliance on this paragraph, U.S. holders of the foreign subject company must hold no more than 10 percent... chapter) by the first business day after publication or dissemination. If the offeror is a foreign company...
17 CFR 230.503 - Filing of notice of sales.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) When notice of sales on Form D is required and permitted to be filed. (1) An issuer offering or selling... containing the information required by Form D (17 CFR 239.500) for each new offering of securities no later... following. (2) An issuer may file an amendment to a previously filed notice of sales on Form D at any time...
17 CFR 230.503 - Filing of notice of sales.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) When notice of sales on Form D is required and permitted to be filed. (1) An issuer offering or selling... containing the information required by Form D (17 CFR 239.500) for each new offering of securities no later... following. (2) An issuer may file an amendment to a previously filed notice of sales on Form D at any time...
Lemnos interoperable security project.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halbgewachs, Ronald D.
2010-03-01
With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance inmore » a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.« less
Shelton, Shoshana R; Connor, Kathryn; Uscher-Pines, Lori; Pillemer, Francesca Matthews; Mullikin, James M; Kellermann, Arthur L
2012-12-01
The federal government plays a critical role in achieving national health security by providing strategic guidance and funding research to help prevent, respond to, mitigate, and recover from disasters, epidemics, and acts of terrorism. In this article we describe the first-ever inventory of nonclassified national health security-related research funded by civilian agencies of the federal government. Our analysis revealed that the US government's portfolio of health security research is currently weighted toward bioterrorism and emerging biological threats, laboratory methods, and development of biological countermeasures. Eight of ten other priorities identified in the Department of Health and Human Services' National Health Security Strategy-such as developing and maintaining a national health security workforce or incorporating recovery into planning and response-receive scant attention. We offer recommendations to better align federal spending with health security research priorities, including the creation of an interagency working group charged with minimizing research redundancy and filling persistent gaps in knowledge.
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of certain terms used in section 3(c)(1) of the Act with respect to certain debt securities offered by small business... COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.3c-3 Definition of certain...
Optical smart card using semipassive communication.
Glaser, I; Green, Shlomo; Dimkov, Ilan
2006-03-15
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Optical smart card using semipassive communication
NASA Astrophysics Data System (ADS)
Glaser, I.; Green, Shlomo; Dimkov, Ilan
2006-03-01
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Code of Federal Regulations, 2010 CFR
2010-04-01
... is in bankruptcy or receivership or has an accumulated capital deficit, in which case one-third of... Schedule shall be deemed “filed” for purposes of section 18 of the Exchange Act. C. The issuer's attention... reasonably calculated to draw security holder attention to it. Part II—Information Not Required To Be Sent to...
Code of Federal Regulations, 2010 CFR
2010-04-01
... has an accumulated capital deficit, in which case one-third of the principal amount, par value or... deemed “filed” for purposes of section 18 of the Exchange Act. C. The bidder's attention is directed to... the legend in any manner reasonably calculated to draw security holder attention to it. PART II...
1999-04-01
headquarters element focuses on command and control of the platoon. It travels with a scout squad for security, but it positions itself as needed... focus the scout platoon on its mission by telling the platoon leader what is expected of the reconnaissance or security effort in each phase of the...well as the tactical opportunities it offers. IPB products developed during this step focus on these effects; they include, but are not limited to
Code of Federal Regulations, 2010 CFR
2010-04-01
... withdrawal, except for social security account numbers, disclosure of which is voluntary. The information... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form BDW, notice of withdrawal... Offers § 249.501a Form BDW, notice of withdrawal from registration as broker-dealer pursuant to § 240...
Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bonior, Jason D; Evans, Philip G; Sheets, Gregory S
2017-01-01
Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.
A survey of visualization systems for network security.
Shiravi, Hadi; Shiravi, Ali; Ghorbani, Ali A
2012-08-01
Security Visualization is a very young term. It expresses the idea that common visualization techniques have been designed for use cases that are not supportive of security-related data, demanding novel techniques fine tuned for the purpose of thorough analysis. Significant amount of work has been published in this area, but little work has been done to study this emerging visualization discipline. We offer a comprehensive review of network security visualization and provide a taxonomy in the form of five use-case classes encompassing nearly all recent works in this area. We outline the incorporated visualization techniques and data sources and provide an informative table to display our findings. From the analysis of these systems, we examine issues and concerns regarding network security visualization and provide guidelines and directions for future researchers and visual system developers.
75 FR 32840 - Securities Offering Disclosures
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-09
... make an informed investment decision regarding a possible purchase or sale of a savings association's... control number. As part of the approval process, we invite comments on the following information...
KernPaeP - a web-based pediatric palliative documentation system for home care.
Hartz, Tobias; Verst, Hendrik; Ueckert, Frank
2009-01-01
KernPaeP is a new web-based on- and offline documentation system, which has been developed for pediatric palliative care-teams supporting patient documentation and communication among health care professionals. It provides a reliable system making fast and secure home care documentation possible. KernPaeP is accessible online by registered users using any web-browser. Home care teams use an offline version of KernPaeP running on a netbook for patient documentation on site. Identifying and medical patient data are strictly separated and stored on two database servers. The system offers a stable, enhanced two-way algorithm for synchronization between the offline component and the central database servers. KernPaeP is implemented meeting highest security standards while still maintaining high usability. The web-based documentation system allows ubiquitous and immediate access to patient data. Sumptuous paper work is replaced by secure and comprehensive electronic documentation. KernPaeP helps saving time and improving the quality of documentation. Due to development in close cooperation with pediatric palliative professionals, KernPaeP fulfils the broad needs of home-care documentation. The technique of web-based online and offline documentation is in general applicable for arbitrary home care scenarios.