Sample records for performing private security

  1. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-23

    ... Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the United.... 110-181, enacted January 28, 2008), section 862, entitled ``Contractors Performing Private Security... NDAA required standardization of rules for private security contractors that are performing in...

  2. 78 FR 37670 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-21

    ...] RIN 9000-AM20 Federal Acquisition Regulation; Contractors Performing Private Security Functions...-181). Section 862, entitled ``Contractors Performing Private Security Functions in Areas of Combat...), as amended, entitled ``Contractors Performing Private Security Functions in Areas of Combat...

  3. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... by Contractors performing private security functions; (A) All armored vehicles, helicopters, and... private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System... security functions. As prescribed in 225.370-6, insert the following clause: CONTRACTORS PERFORMING PRIVATE...

  4. 76 FR 52133 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security..., entitled ``Contractors Performing Private Security Functions in Areas of Combat Operations or Other... of DoD and other Governmental private security contractors. A clause to cover the interagency...

  5. 77 FR 70780 - Federal Acquisition Regulation; Submission for OMB Review; Contractors Performing Private...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... new information collection requirement concerning Contractors Performing Private Security Functions... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions Outside...

  6. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...

  7. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...

  8. 48 CFR 225.370-4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... personnel performing private security functions in designated areas are addressed in Department of Defense... contract is for the performance of private security functions or other supplies or services. (c) DoD... of the contractor who are responsible for performing private security functions comply with orders...

  9. 48 CFR 225.370-4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private security functions; (A) All armored vehicles, helicopters, and other military vehicles must be... personnel performing private security functions in designated areas are addressed in Department of Defense... performance of private security functions or other supplies or services. (c) DoD requires contractors...

  10. 77 FR 35883 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-15

    ... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security... Contractors (DoDI 3020.50) was revised on August 1, 2011, and the final rule to implement section 862 of the NDAA for FY 2008, as amended, 32 CFR part 159, Private Security Contractors Operating in Contingency...

  11. 48 CFR 25.302-4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... performing private security functions in designated areas are addressed at 32 CFR part 159, entitled “Private... for weapons; registering and identifying armored vehicles, helicopters, and other military vehicles; and reporting specified incidents in which personnel performing private security functions under a...

  12. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less

  13. 48 CFR 25.302-3 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... functions as a primary deliverable or the provision of private security functions is ancillary to the stated... entered into on a non-DoD contract for the performance of private security functions by individual... the Secretary of State. (b) Non-DoD agencies: This section applies to acquisitions by non-DoD agencies...

  14. 48 CFR 25.302-3 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... functions as a primary deliverable or the provision of private security functions is ancillary to the stated... entered into on a non-DoD contract for the performance of private security functions by individual... the Secretary of State. (b) Non-DoD agencies: This section applies to acquisitions by non-DoD agencies...

  15. Comment on "Secure quantum private information retrieval using phase-encoded queries"

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun

    2016-12-01

    In this Comment, we reexamine the security of phase-encoded quantum private query (QPQ). We find that the current phase-encoded QPQ protocols, including their applications, are vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database. Furthermore, we discuss how to overcome this security loophole and present an improved cheat-sensitive QPQ protocol without losing the good features of the original protocol.

  16. Should the U.S. Department of State Continue to Use Private Security Contractors to Protect U.S. Diplomats

    DTIC Science & Technology

    2008-06-13

    USE PRIVATE SECURITY CONTRACTORS TO PROTECT U.S. DIPLOMATS 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 6. AUTHOR( S ...Special Agent Derek Dela-Cruz 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College...

  17. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  18. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...

  19. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...

  20. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...

  1. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...

  2. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...

  3. Student Experiential Opportunities in National Security Careers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less

  4. Investigation and Remediation Records Concerning Incidents of Weapons Discharges by Private Security Contractors Can Be Improved

    DTIC Science & Technology

    2009-07-28

    Incidents of Weapons Discharges by Private Security Contractors Can Be Improved 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...for Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...Defense’s (DoD) oversight of incidents involving the firing—or discharge —of weapons reported from May 2008 through February 2009 by its PSCs

  5. Exploring the Public Health Impacts of Private Security Guards on People Who Use Drugs: a Qualitative Study.

    PubMed

    Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas

    2015-12-01

    Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD.

  6. Internet firewalls: questions and answers

    NASA Astrophysics Data System (ADS)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  7. From performance to performativity: The legitimization of US security contracting and its consequences.

    PubMed

    Krahmann, Elke

    2017-12-01

    Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity - that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors.

  8. From performance to performativity: The legitimization of US security contracting and its consequences

    PubMed Central

    Krahmann, Elke

    2017-01-01

    Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity – that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors. PMID:29276346

  9. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management Service...

  10. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    DTIC Science & Technology

    2013-04-25

    cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From  -­‐  To)   September 2012 - April 2013 4.  TITLE  AND  SUBTITLE   Private Military and Security Companies - Counterinsurgency and

  11. Addressing cargo security with strategies involving private sector.

    DOT National Transportation Integrated Search

    2008-12-01

    The public and private sectors contributing to goods movement agree that cargo security has : not been addressed nearly as much as physical and vessel security. Addressing cargo security : will require additional operational data that is not currentl...

  12. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1014) Fairness of the going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES...

  13. 31 CFR 25.403 - Registration.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25... Private Loan Portion or any Derivative to the extent that the Private Loan or the respective Private Loan...

  14. 32 CFR 159.2 - Applicability and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.2 Applicability and scope. This part: (a) Applies to: (1... PSCs and PSC personnel performing private security functions during contingency operations outside the...

  15. Relativistic quantum private database queries

    NASA Astrophysics Data System (ADS)

    Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou

    2015-04-01

    Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

  16. Medicare privatization and the erosion of retirement security.

    PubMed

    Polivka, Larry; Kwak, Jung

    2008-01-01

    This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.

  17. 26 CFR 1.141-4 - Private security or payment test.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... time that proceeds are used for a private business use. Payments for a use of proceeds include payments... business use (for example, a facility that is the subject of a management contract that results in private... time that property is used by a private business user. (6) Allocation of security among issues. In...

  18. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., Tagging, Labeling, and Marking of Government-Furnished Property, and physically marked in accordance with... countermeasures (other than the discharge of a weapon, including laser optical distracters, acoustic hailing...

  19. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., Tagging, Labeling, and Marking of Government-Furnished Property, and physically marked in accordance with... countermeasures (other than the discharge of a weapon, including laser optical distracters, acoustic hailing...

  20. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...

  1. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  2. A novel quantum solution to secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun

    2018-06-01

    Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.

  3. The business of medicine: how to overcome financial obstacles and secure financing for your private practice and ancillary services business.

    PubMed

    Nayor, David

    2012-01-01

    Doctors across the country who operate private medical practices are facing increasing financial obstacles, namely shrinking income as a result of rising costs and lower reimbursements. In addition, as hospitals have become overburdened many physicians have opened up private surgical centers; magnetic resonance imaging and computed tomography and positron emission tomography scanning facilities; pathology labs; colonoscopy/endoscopy suites; lithotripsy centers; and other medical businesses typically performed within the hospital. Moreover, many doctors seek loans to purchase existing practices or for their capital contribution in medical partnerships. The past decade has thus seen a significant increase in the number of doctors taking out small business loans. Indeed, banks view the healthcare industry as a large growth market. This article includes practical information, advice, and resources to help doctors to secure bank financing for their practices, ancillary services business, real estate, and equipment on the best possible market terms.

  4. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  5. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  6. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  7. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  8. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  9. The relationships between public and private pension schemes: an introductory overview.

    PubMed

    Horlick, M

    1987-07-01

    Only recently have social insurance and private pensions, collectively, come to be thought of in terms of a total social security benefit package. The economic problems brought on by the 1974 oil crisis initially triggered consideration of a common, integrated role for the two systems. The second oil crisis reinforced the relative expansion in private pension programs, as a supplement to social security. Before these events, private and public pension programs interacted in only a limited number of ways, confined to relatively few countries. These interactions were largely confined to collective bargaining, whereby private pensions were gradually extended to nearly all employees in France and Sweden; mandating, or legally requiring private supplementation of social security, debated in several countries in the early 1970's, but postponed by the 1974 oil crisis; and contracting out, or covering a part of the social security benefit under a private plan, as in the United Kingdom. Overall, the tradition of private pensions was not very strong or broadbased. The current debate centers on which public/private pension mix is desirable from the point of view of an old-age income-maintenance program. A new element is the rising support for a "third pillar"--individual tax-encouraged savings--not only as a supplement, but as an alternative to social insurance.

  10. System Access | High-Performance Computing | NREL

    Science.gov Websites

    ) systems. Photo of man looking at a large computer monitor with a colorful, visual display of data. System secure shell gateway (SSH) or virtual private network (VPN). User Accounts Request a user account

  11. 76 FR 62100 - Approval of Filing Fees for Exempt Reporting Advisers and Private Fund Advisers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-06

    ... fund assets, combined liquidity fund and registered money market fund assets or private equity fund... Fees for Exempt Reporting Advisers and Private Fund Advisers AGENCY: Securities and Exchange Commission... fund advisers filing Form PF. SUMMARY: The Securities and Exchange Commission (``Commission'') is...

  12. 75 FR 66822 - Study on Extraterritorial Private Rights of Action

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-29

    ... Extraterritorial Private Rights of Action AGENCY: Securities and Exchange Commission. ACTION: Request for Comments... and thereafter conduct a study to determine the extent to which private rights of action under the... United States to bring actions under Section 10(b) in cases involving transnational securities fraud...

  13. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less

  14. FRR: fair remote retrieval of outsourced private medical records in electronic health networks.

    PubMed

    Wang, Huaqun; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep

    2014-08-01

    Cloud computing is emerging as the next-generation IT architecture. However, cloud computing also raises security and privacy concerns since the users have no physical control over the outsourced data. This paper focuses on fairly retrieving encrypted private medical records outsourced to remote untrusted cloud servers in the case of medical accidents and disputes. Our goal is to enable an independent committee to fairly recover the original private medical records so that medical investigation can be carried out in a convincing way. We achieve this goal with a fair remote retrieval (FRR) model in which either t investigation committee members cooperatively retrieve the original medical data or none of them can get any information on the medical records. We realize the first FRR scheme by exploiting fair multi-member key exchange and homomorphic privately verifiable tags. Based on the standard computational Diffie-Hellman (CDH) assumption, our scheme is provably secure in the random oracle model (ROM). A detailed performance analysis and experimental results show that our scheme is efficient in terms of communication and computation. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Petri net modeling of encrypted information flow in federated cloud

    NASA Astrophysics Data System (ADS)

    Khushk, Abdul Rauf; Li, Xiaozhong

    2017-08-01

    Solutions proposed and developed for the cost-effective cloud systems suffer from a combination of secure private clouds and less secure public clouds. Need to locate applications within different clouds poses a security risk to the information flow of the entire system. This study addresses this by assigning security levels of a given lattice to the entities of a federated cloud system. A dynamic flow sensitive security model featuring Bell-LaPadula procedures is explored that tracks and authenticates the secure information flow in federated clouds. Additionally, a Petri net model is considered as a case study to represent the proposed system and further validate the performance of the said system.

  16. Between security and military identities: The case of Israeli security experts.

    PubMed

    Grassiani, Erella

    2018-02-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.

  17. Between security and military identities: The case of Israeli security experts

    PubMed Central

    Grassiani, Erella

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228

  18. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  19. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  20. A global trend: privatization and reform of social security pension plans.

    PubMed

    Poortvliet, W G; Laine, T P

    1995-01-01

    Ten years ago Chile successfully privatized its social security system, beginning a worldwide trend to solve the problem of an increasing burden on government-supported social security programs. Contributing factors include an aging population, fewer workers to support retirees, government budget deficits and the influence of politics.

  1. Secure multiparty computation of a comparison problem.

    PubMed

    Liu, Xin; Li, Shundong; Liu, Jian; Chen, Xiubo; Xu, Gang

    2016-01-01

    Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions.

  2. The Use of Private Security by the United Kingdom and the Subsequent Impacts on Operational Planning

    DTIC Science & Technology

    2014-05-22

    2003 and 2008.4 The UK and US dominate the global market for private military companies.5 Therefore, scholarly research on the UK should help explain...provide a certain military skill applicable to the conduct of warfare. Deborah Avant, in her 2005 work The Market for Force : The Consequences of...International Security," International Security 26, no. 3 (Winter 2001-2002): 186. 14Deborah D. Avant, The Market for Force : The Consequences of Privatizing

  3. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  4. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  5. Improving U.S. Competitiveness with K-12 STEM Education and Training. Heritage Special Report. SR-57. A Report on the STEM Education and National Security Conference, October 21-23, 2008

    ERIC Educational Resources Information Center

    Machi, Ethel

    2009-01-01

    From October 21 to 23, 2008, The Heritage Foundation, supported by the McCormick Tribune Foundation, convened leading education and national security experts as well as private-sector representatives to discuss methods for strengthening America's competitiveness by improving its performance in science, technology, engineering, and mathematics…

  6. Public-Private Collaboration in the Department of Defense

    DTIC Science & Technology

    2012-07-01

    In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.

  7. The Social Security Program and the Private Sector Alternative: Lessons from History.

    ERIC Educational Resources Information Center

    Quadagno, Jill

    1987-01-01

    Used historical evidence to analyze how private sector benefits worked in the past in light of the debate surrounding the Social Security benefits and the federal deficit. Among conclusions reached are that the private sector failed to provide adequate protection for older citizens, and that benefits were inequitably distributed on basis of gender…

  8. Private Security Training. Phase 1: Basic. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…

  9. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  10. Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.

    PubMed

    Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru

    2016-01-01

    The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.

  11. Performing private database queries in a real-world environment using a quantum protocol.

    PubMed

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-06-10

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.

  12. Performing private database queries in a real-world environment using a quantum protocol

    PubMed Central

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-01-01

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129

  13. Privatization of Peacekeeping: UN’s Institutional Capacity to Control Private Military and Security Companies

    DTIC Science & Technology

    2013-09-01

    SECURITY COMPANIES Huseyin Yigit Captain, Turkish Army B.S., Kara Harp Okulu, 2003 Submitted in partial fulfillment of the requirements for the...Collective Security Practice ............................................................. 34   C.   PEACEKEEPING...involvement in intrastate conflicts is inevitable and will be so. Furthermore, though UN attempts aim to restore peace, military force requirement is

  14. The reaction of private physicians to price deregulation in France.

    PubMed

    Carrere, M O

    1991-01-01

    French private physicians are paid on a fee-for-service basis and nearly all of them are under contract to the Social Security, which refunds part of the medical fee to the whole population. Previously the prices of medical services were fixed, but since 1980, a new option has been possible: a doctor can choose to fix the price of his services freely, provided he pays a higher social insurance contribution. But the amount refunded by Social Security does not vary, so that the consumer has to bear the extra charge. Our purpose here is to identify the factors that influence the physician's option. In Section 2, we define a model of the private physician's economic behaviour, of the classic income-leisure type. In Section 3, empirical tests are performed on a sample of observations in 95 'départements', gathering information about private GPs on the one hand, and the whole population on the other. According to our results, GPs' decisions depend on characteristics of both supply of and demand for GPs' services. One of our conclusions is that GPs seem to make up for low activity levels with higher prices, on condition the income of their practice allows it.

  15. Comparing replacement rates under private and federal retirement systems.

    PubMed

    Martin, Patricia P

    One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners (100 percent) high earners (160 percent), and maximum earners (earnings at the taxable maximum amount). Overall, this analysis found that: Excluding Social Security benefits and TSP and defined contribution annuities, CSRS retirees have a higher pre-retirement salary replacement rate than either FERS or private-sector retirees. Private-sector retirees, however, have higher replacement rate than their FERS counterparts. Including Social Security benefits but not TSP and defined contribution plan annuities, CSRS retirees who are maximum earners have a higher pre-retirement salary replacement rate (despite receiving no Social Security benefits) than FERS retirees with the same earnings. Private-sector retirees in all earnings categories have a higher replacement rate than federal retirees with the same earnings. Including Social Security and TSP and defined contribution plan annuities, private-sector retirees in all earnings categories have a higher replacement rate than federal retirees, but their rate is close to that of FERS retirees. The rate is higher for FERS retirees than for CSRS retirees in all earnings categories. This analysis shows that replacement creates could exceed 100 percent for FERS employees who contribute who contribute 6 percent of earnings to the TSP over full working career. Private-sector replacement rates were quite similar for those with both a defined benefit and a defined contribution pension plan. Social Security replacement rates make up the highest proportion of benefits for th private sector's lowest income quartile group. The replacement rate for 401(k) plans and the TSP account for a higher proportion of benefits than does Social Security for all other income groups, assuming the absence of a defined benefit plan.

  16. [The health system of Argentina].

    PubMed

    Belló, Mariana; Becerril-Montekio, Victor M

    2011-01-01

    This paper describes the health system of Argentina.This system has three sectors: public, social security and private.The public sector includes the national and provincial ministries as well as the network of public hospitals and primary health care units which provide care to the poor and uninsured population. This sector is financed with taxes and payments made by social security beneficiaries that use public health care facilities. The social security sector or Obras Sociales (OS) covers all workers of the formal economy and their families. Most OS operate through contracts with private providers and are financed with payroll contributions of employers and employees. Finally, the private sector includes all those private providers offering services to individuals, OS beneficiaries and all those with private health insurance.This sector also includes private insurance agencies called Prepaid Medicine Enterprises, financed mostly through premiums paid by families and/or employers.This paper also discusses some of the recent innovations implemented in Argentina, including the program Remediar.

  17. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  18. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  19. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  20. Small Technology Business Incubation Needs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    2007-12-31

    This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less

  1. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  2. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  3. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  4. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  5. 28 CFR 105.27 - Miscellaneous provisions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...

  6. Quantum solution to a class of two-party private summation problems

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Zhang, Shun

    2017-09-01

    In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.

  7. Oversight of Aegis’s Performance on Security Services Contracts in Iraq with the Department of Defense

    DTIC Science & Technology

    2009-01-14

    ORGANIZATION NAME(S) AND ADDRESS(ES) Office of the Special Inspector General for Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8...Congressional concerns about the adequacy of oversight given to private security contractors (PSCs) in Iraq increased after an incident involving Blackwater ...that resulted in the deaths of 17 Iraqi civilians. Blackwater is under contract with the Department of State. Responding to a congressional mandate

  8. SSeCloud: Using secret sharing scheme to secure keys

    NASA Astrophysics Data System (ADS)

    Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang

    2017-08-01

    With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.

  9. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution.

    PubMed

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-08-19

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.

  10. Private health insurance in South Korea: an international comparison.

    PubMed

    Shin, Jaeun

    2012-11-01

    The goal of this study is to present the historical and policy background of the expansion of private health insurance in South Korea in the context of the National Health Insurance (NHI) system, and to provide empirical evidence on whether the increased role of private health insurance may counterbalance government financing, social security contributions, out-of-pocket payments, and help stabilize total health care spending. Using OECD Health Data 2011, we used a fixed effects model estimation. In this model, we allow error terms to be serially correlated over time in order to capture the association of private health insurance financing with three other components of health care financing and total health care spending. The descriptive observation of the South Korean health care financing shows that social security contributions are relatively limited in South Korea, implying that high out-of-pocket payments may be alleviated through the enhancement of NHI benefit coverage and an increase in social security contributions. Estimation results confirm that private health insurance financing is unlikely to reduce government spending on health care and social security contributions. We find evidence that out-of-pocket payments may be offset by private health insurance financing, but to a limited degree. Private health insurance financing is found to have a statistically significant positive association with total spending on health care. This indicates that the duplicated coverage effect on service demand may cancel out the potential efficiency gain from market initiatives driven by the active involvement of private health insurance. This study finds little evidence for the benefit of private insurance initiatives in coping with the fiscal challenges of the South Korean NHI program. Further studies on the managerial interplay among public and private insurers and on behavioral responses of providers and patients to a given structure of private-public financing are warranted to formulate the adequate balance between private health insurance and publicly funded universal coverage. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  11. A novel quantum scheme for secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  12. Homeland Security and the Private Sector : a CBO Paper

    DTIC Science & Technology

    2004-12-01

    private sector and the nation as a whole that would underlie the expected costs of terrorist attacks and, hence, the broader benefits of security. This paper focuses on those industries for which the expected human and economic losses from a terrorist attack would be highest -- the country’s critical infrastructure. The analysis more narrowly focuses on those industries that reside largely in the private sector and for which an attack could lead to a direct loss of life. The paper also reviews the incentives for private actions to limit

  13. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  14. 75 FR 23327 - Asset-Backed Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ... information would be provided according to proposed standards and in a tagged data format using extensible... Market Developments, March 2008 (the ``PWG March 2008 Report'') at 9 (discussing subprime mortgages and... information about underlying asset pool performance.\\41\\ Our focus on both the public and private markets for...

  15. Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis

    DTIC Science & Technology

    2011-09-15

    Networks (VPNs), TLS protects massive amounts of private information, and protecting this data from Man-in-the-Middle ( MitM ) attacks is imperative to...keeping the information secure. This thesis illustrates how an attacker can successfully perform a MitM attack against a TLS connection without alerting...mechanism a user has against a MitM . The goal for this research is to determine if a time threshold exists that can indicate the presence of a MitM in this

  16. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution

    PubMed Central

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654

  17. Cloud-based Predictive Modeling System and its Application to Asthma Readmission Prediction

    PubMed Central

    Chen, Robert; Su, Hang; Khalilia, Mohammed; Lin, Sizhe; Peng, Yue; Davis, Tod; Hirsh, Daniel A; Searles, Elizabeth; Tejedor-Sojo, Javier; Thompson, Michael; Sun, Jimeng

    2015-01-01

    The predictive modeling process is time consuming and requires clinical researchers to handle complex electronic health record (EHR) data in restricted computational environments. To address this problem, we implemented a cloud-based predictive modeling system via a hybrid setup combining a secure private server with the Amazon Web Services (AWS) Elastic MapReduce platform. EHR data is preprocessed on a private server and the resulting de-identified event sequences are hosted on AWS. Based on user-specified modeling configurations, an on-demand web service launches a cluster of Elastic Compute 2 (EC2) instances on AWS to perform feature selection and classification algorithms in a distributed fashion. Afterwards, the secure private server aggregates results and displays them via interactive visualization. We tested the system on a pediatric asthma readmission task on a de-identified EHR dataset of 2,967 patients. We conduct a larger scale experiment on the CMS Linkable 2008–2010 Medicare Data Entrepreneurs’ Synthetic Public Use File dataset of 2 million patients, which achieves over 25-fold speedup compared to sequential execution. PMID:26958172

  18. 31 CFR 25.402 - Transferability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25.402 Transferability. Each Private Loan Note, with the Guaranty attached, shall be fully and freely...

  19. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records....m. to 12:00 noon. ADDRESSES: National Archives and Records Administration, 700 Pennsylvania Avenue...

  20. Correlates of quality educational programs.

    PubMed

    Chester, Deborah R; Tracy, Jessamyn A; Earp, Emily; Chauhan, Reetu

    2002-06-01

    Preliminary evaluation findings are presented that explore relationships between educational program quality and program characteristics such as program type, security level, aftercare, teacher certification, facility size, and private versus public provider. Several program characteristics are found to be related to measurements of educational program quality. Among the major quality characteristics are proportion of program teachers that are professionally certified, smaller sized facilities versus larger facilities, level of aftercare services, and provider sources, with private for-profit providers being the lowest performing and public providers being the highest performing. The article closes with description of the Juvenile Justice Educational Enhancement Program's continuing evaluation of correlates to educational program quality through the continued development of a comprehensive database.

  1. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  2. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  3. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  4. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  5. Social Security: A Present Value Analysis of Old Age Survivors Insurance (OASI) Taxes and Benefits.

    DTIC Science & Technology

    1995-12-01

    private sector plans and provides a spreadsheet model for making this comparison of plans using different assumptions. The investigation was done by collecting data from various books, Government publications, and various Government agencies to conduct a spreadsheet analysis of three different wage-earning groups, assuming various real interest rates potentially earned in the private sector . A comparison of Social Security with alternative private sector plans is important to the DoD/DoN because less constrained budgets could

  6. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...

  7. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...

  8. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...

  9. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...

  10. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...

  11. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    NASA Astrophysics Data System (ADS)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  12. Private Security Contractors: A Way of Combating Piracy in the Horn of Africa

    DTIC Science & Technology

    2014-05-22

    September 2011. 79Financial Action Task Force, “Financial Action Task Force Annual Report, 2010-2011,” FATF /OECD, 2011, 10. 80Andrew J. Shapiro...Report, 2010-2011.” FATF /OECD. Paris, 2011. Fox News. “Private Security Firms Join Battle Against Somali Pirates,” October 26, 2008. http

  13. The Department of Defense’s Use of Private Security Contractors in Afghanistan and Iraq: Background, Analysis, and Options for Congress

    DTIC Science & Technology

    2011-05-13

    running amok and armed Americans 45 Paul Richter , “Audit: U.S. Funds Went to Taliban, Subcontractors on... Anna Mulrine and Keith Whitelaw, “Private Security Contractors Face Incoming Political Fire,” U.S. News & World Report, October 15, 2007. 51 Charlie

  14. Private Security Contractors: The Other Force

    DTIC Science & Technology

    2011-03-22

    improving PSC oversight. This paper will not address private contractors conducting Police force training , governmental use of PSCs outside of Iraq...theater entry requirements, conduct mandatory training , conduct weapons training and qualification and conduct security verification and criminal...an effective oversight program including contractor deployment tracking, limited contract oversight personnel, and untrained Contract Officer

  15. 31 CFR 25.405 - Form of guaranty.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25.405 Form of guaranty. (a) The Guaranty that will be attached to the Private Loan Note on the Closing...

  16. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Currency for financial statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... General Instructions As to Financial Statements § 210.3-20 Currency for financial statements of foreign...

  17. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    ERIC Educational Resources Information Center

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  18. 76 FR 49650 - Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ...] Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or Other..., ``Contractor Personnel Authorized to Accompany the U.S. Armed Forces,'' which provides guidance for all DoD contractors operating in contingency operations. This Rule was published as an Interim Final Rule on July 17...

  19. Quantum And Relativistic Protocols For Secure Multi-Party Computation

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger

    2009-11-01

    After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. In the second part variable bias coin tossing is introduced. This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss. It is shown that this can be achieved with unconditional security for a specified range of biases, and with cheat-evident security for any bias. We also discuss two further protocols which are conjectured to be unconditionally secure for any bias. The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a general model for such computations, and show that, within this model, a wide range of functions are impossible to compute securely. We give explicit cheating attacks for such functions. In the final chapter we discuss the task of expanding a private random string, while dropping the usual assumption that the protocol's user trusts her devices. Instead we assume that all quantum devices are supplied by an arbitrarily malicious adversary. We give two protocols that we conjecture securely perform this task. The first allows a private random string to be expanded by a finite amount, while the second generates an arbitrarily large expansion of such a string.

  20. Open source system OpenVPN in a function of Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Skendzic, A.; Kovacic, B.

    2017-05-01

    Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.

  1. How to Keep Your Health Information Private and Secure

    MedlinePlus

    ... permanently. When Using Mobile Devices · Research mobile apps – software programs that perform one or more specific functions – before you download and install any of them. Be sure to use known app websites or trusted sources. · Read the terms of service and the privacy notice of the mobile app ...

  2. A rhythm-based authentication scheme for smart media devices.

    PubMed

    Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.

  3. A Rhythm-Based Authentication Scheme for Smart Media Devices

    PubMed Central

    Lee, Jae Dong; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743

  4. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  5. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  6. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  7. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring securemore » hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.« less

  9. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...

  10. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...

  11. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...

  12. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...

  13. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...

  14. Retirement Trends and Public Policy: The Carrot and the Stick.

    ERIC Educational Resources Information Center

    Quinn, Joseph F.; Burkhauser, Richard V.

    Recent trends toward earlier retirement have exacerbated the financial problems facing the Social Security system and many other public and private pension plans. The massive commitment of public and private funds to Social Security and pension funds is partly responsible for the trend to early retirement. This, in fact, was one of the early goals…

  15. Monitoring Responsibilities for Serious Incidents Involving Private Security Contractors Once U.S. Military Forces Leave Iraq Have Not Been Determined

    DTIC Science & Technology

    2011-07-29

    SPECIAL INSPE CTOR GENE RAL FOR IRAQ RECONSTRUCTION 400 Army Navy Drive • Arlington, Virginia 22202 July 29, 2011 LETTER FOR...11-019) In September 2007, Blackwater , Inc., a private security contractor (PSC) under contract with the Department of State (DoS), was involved in

  16. A Weakest Precondition Approach to Robustness

    NASA Astrophysics Data System (ADS)

    Balliu, Musard; Mastroeni, Isabella

    With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.

  17. 31 CFR 306.85 - Private corporations and unincorporated associations (including nominees).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Private corporations and... Organizations § 306.85 Private corporations and unincorporated associations (including nominees). Securities registered in the name of, or assigned to, an unincorporated association, or a private corporation in its own...

  18. 75 FR 80082 - State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ..., Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight... State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC). The SLTPS-PAC will..., Tribal, and Private Sector Entities, as specified in Executive Order 13549 and its implementing directive...

  19. Design and implementation of a high performance network security processor

    NASA Astrophysics Data System (ADS)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  20. The neoliberal political economy and erosion of retirement security.

    PubMed

    Polivka, Larry; Luo, Baozhen

    2015-04-01

    The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the private...

  2. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  3. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  4. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  5. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  6. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    DTIC Science & Technology

    2008-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited REDUCING THE...FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION...relationships. While leaders did not demonstrate a high level of concern regarding the threat of a local terrorist act occurring in the next five years

  7. Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    2007-01-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…

  8. Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles

    DTIC Science & Technology

    2016-04-01

    extraordinarily significant (Office of the Press Secretary, 2015). The White House added that cybersecurity is a shared responsibility between the...cannot, nor would Americans want it to, provide cybersecurity for every private network. Therefore, the private sector plays a crucial role in our... Cybersecurity Initiative,” that established the procedures the Acquisition community should use to manage future of Acquisition programs. Cyber Security

  9. Integrating QoS and security functions in an IP-VPN gateway

    NASA Astrophysics Data System (ADS)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  10. 78 FR 41959 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC); Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ...] State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC); Notice of Meeting AGENCY... Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities. FOR..., announcement is made for the following committee meeting. Name of Committee: State, Local, Tribal, and Private...

  11. Outsourcing, Managing, Supervising, and Regulating Private Military Companies in Contingency Operations

    DTIC Science & Technology

    2010-09-01

    the Rise of Privatized Military Industry, 88–100. 18 Steven Brayton , "Outsourcing War: Mercenaries and the Privatization of Peacekeeping,” Journal of...220. 50 Isenberg, Shadow Force: Private Security Contractors in Iraq, 1. 51 Brayton , "Outsourcing War: Mercenaries and the Privatization of...Review of Books, April 3, 2008, 29. 71 Singer, Corporate Warriors, The Rise of the Privatized Military Industry, 113. 72 Brayton , "Outsourcing War

  12. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    DTIC Science & Technology

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  13. 75 FR 67992 - Voluntary Private Sector Accreditation and Certification Preparedness Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2008-0017] Voluntary Private Sector Accreditation and Certification Preparedness Program AGENCY: Federal Emergency... on an initial small business plan to address small business concerns in the Voluntary Private Sector...

  14. Women and Private Pensions.

    ERIC Educational Resources Information Center

    Benson, Helene A.

    This speech focuses on women and private pension plans, such as private pension coverage and smaller benefit amounts. Pension issues affecting women as employees include participation in plans, vesting, break-in service, benefit accruals, integration with Social Security, sex-based actuarial tables, portability, inflation, and individual…

  15. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ..., interoperability, security, reliability, and resiliency; and (3) help ensure the deployment and evolution of the... how commercial off-the-shelf technologies and private sector best practices can be used to secure...

  16. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  17. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  18. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...

  19. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...

  20. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...

  1. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  2. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...

  3. 77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ..., Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight..., announcement is made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory..., Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on July 25, 2012, 10:00 a.m...

  4. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...

  5. Private randomness expansion with untrusted devices

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  6. Generalized variables for controlling Government Transfer Services with respect to performance measures

    NASA Technical Reports Server (NTRS)

    Johnson, F. D.

    1981-01-01

    The term Government Transfer Services is used in reference to any of the organized streams of public resources that flow into private economic activity. This includes such activities as offshore leasing, Social Security, and NASA technology transfer services. This paper describes a performance measure, empirical results, a theory, and a control model for such services. These are illustrated by a specific example (NASA). An agenda for developing this service control method is also presented.

  7. Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data

    NASA Astrophysics Data System (ADS)

    Mahmud H, Amir; Angga W, Bayu; Tommy; Marwan E, Andi; Siregar, Rosyidah

    2018-04-01

    A file security is one method to protect data confidentiality, integrity and information security. Cryptography is one of techniques used to secure and guarantee data confidentiality by doing conversion to the plaintext (original message) to cipher text (hidden message) with two important processes, they are encrypt and decrypt. Some researchers proposed a hybrid method to improve data security. In this research we proposed hybrid method of AES-blowfish (BF) to secure the patient’s medical report data into the form PDF file that sources from database. Generation method of private and public key uses two ways of approach, those are RSA method f RSA and ECC. We will analyze impact of these two ways of approach for hybrid method at AES-blowfish based on time and Throughput. Based on testing results, BF method is faster than AES and AES-BF hybrid, however AES-BF hybrid is better for throughput compared with AES and BF is higher.

  8. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...

  9. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...

  10. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...

  11. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...

  12. Managing the public-private mix to achieve universal health coverage.

    PubMed

    McPake, Barbara; Hanson, Kara

    2016-08-06

    The private sector has a large and growing role in health systems in low-income and middle-income countries. The goal of universal health coverage provides a renewed focus on taking a system perspective in designing policies to manage the private sector. This perspective requires choosing policies that will contribute to the performance of the system as a whole, rather than of any sector individually. Here we draw and extrapolate main messages from the papers in this Series and additional sources to inform policy and research agendas in the context of global and country level efforts to secure universal health coverage in low-income and middle-income countries. Recognising that private providers are highly heterogeneous in terms of their size, objectives, and quality, we explore the types of policy that might respond appropriately to the challenges and opportunities created by four stylised private provider types: the low-quality, underqualified sector that serves poor people in many countries; not-for-profit providers that operate on a range of scales; formally registered small-to-medium private practices; and the corporate commercial hospital sector, which is growing rapidly and about which little is known. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Computer Security and the Data Encryption Standard. Proceedings of the Conference on Computer Security and the Data Encryption Standard.

    ERIC Educational Resources Information Center

    Branstad, Dennis K., Ed.

    The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…

  14. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  15. ATIP Report: Cyber Security Research in China

    DTIC Science & Technology

    2015-06-05

    vulnerabilities. ATIP Document ID: 150605AR CYBER SECURITY RESEARCH IN CHINA 17 Le GUAN et al. at SKLOIS of IIE, CAS proposed a solution named “ Mimosa ...that protects RSA private keys against the above software-based and physical memory attacks. When the Mimosa service is in idle, private keys are...encrypted and reside in memory as ciphertext. During the cryptographic computing, Mimosa uses hardware transactional memory (HTM) to ensure that (a

  16. 17 CFR 240.12h-6 - Certification by a foreign private issuer regarding the termination of registration of a class of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... certifying to the Commission on Form 15F (17 CFR 249.324) that: (1) The foreign private issuer has had... average daily trading volume of the subject class of securities in the United States for a recent 12-month period has been no greater than 5 percent of the average daily trading volume of that class of securities...

  17. SSA Disability: Other Programs May Provide Lessons for Improving Return-to-Work Efforts. Testimony before the Subcommittee on Social Security, Committee on Ways and Means, House of Representatives.

    ERIC Educational Resources Information Center

    Bovbjerg, Barbara D.

    This report compares the Social Security Administration's Disability Insurance (DI) program and the practices of the private sector and other countries in helping people with severe disabilities return to work. Information was gathered in in-depth interviews and a review of policy documents and program data at three private sector disability…

  18. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea

    PubMed Central

    Park, Sohyun; Kim, Kirang

    2018-01-01

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants’ mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses. PMID:29370127

  19. The Mexican Social Security counterreform: pensions for profit.

    PubMed

    Laurell, A C

    1999-01-01

    The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.

  20. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea.

    PubMed

    Park, Sohyun; Kim, Kirang

    2018-01-25

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants' mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses.

  1. An approach for investigation of secure access processes at a combined e-learning environment

    NASA Astrophysics Data System (ADS)

    Romansky, Radi; Noninska, Irina

    2017-12-01

    The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.

  2. A Unified Approach to Information Security Compliance

    ERIC Educational Resources Information Center

    Adler, M. Peter

    2006-01-01

    The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…

  3. Sharing the Knowledge: Government-Private Sector Partnerships to Enhance Information Security

    DTIC Science & Technology

    2000-05-01

    private sector . However, substantial barriers threaten to block information exchanges between the government and private sector . These barriers include concerns over release of sensitive material under Freedom of Information Act requests, antitrust actions, protection of business confidential and other private material, possible liability due to shared information, disclosure of classified information, and burdens entailed with cooperating with law enforcement agencies. There is good cause to believe that the government and private

  4. The welfare state, pensions, privatization: the case of Social Security in the United States.

    PubMed

    Du Boff, R B

    1997-01-01

    In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.

  5. 76 FR 41826 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records... Information Program for State, Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on...

  6. 49 CFR 1580.105 - Reporting significant security concerns.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615-5150. (c...

  7. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  8. Secure quantum private information retrieval using phase-encoded queries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olejnik, Lukasz

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less

  9. 17 CFR 240.3b-4 - Definition of “foreign government,” “foreign issuer” and “foreign private issuer”.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... voting securities beneficially owned by residents of the United States as reported on reports of... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of âforeign... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES...

  10. Loss-tolerant measurement-device-independent quantum private queries

    NASA Astrophysics Data System (ADS)

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-01

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.

  11. Loss-tolerant measurement-device-independent quantum private queries.

    PubMed

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-04

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.

  12. Productivity Analysis of Public and Private Airports: A Causal Investigation

    NASA Technical Reports Server (NTRS)

    Vasigh, Bijan; Gorjidooz, Javad

    2007-01-01

    Around the world, airports are being viewed as enterprises, rather than public services, which are expected to be managed efficiently and provide passengers with courteous customer services. Governments are, increasingly, turning to the private sectors for their efficiency in managing the operation, financing, and development, as well as providing security for airports. Operational and financial performance evaluation has become increasingly important to airport operators due to recent trends in airport privatization. Assessing performance allows the airport operators to plan for human resources and capital investment as efficiently as possible. Productivity measurements may be used as comparisons and guidelines in strategic planning, in the internal analysis of operational efficiency and effectiveness, and in assessing the competitive position of an airport in transportation industry. The primary purpose of this paper is to investigate the operational and financial efficiencies of 22 major airports in the United States and Europe. These airports are divided into three groups based on private ownership (7 British Airport Authority airports), public ownership (8 major United States airports), and a mix of private and public ownership (7 major European Union airports. The detail ownership structures of these airports are presented in Appendix A. Total factor productivity (TFP) model was utilized to measure airport performance in terms of financial and operational efficiencies and to develop a benchmarking tool to identify the areas of strength and weakness. A regression model was then employed to measure the relationship between TFP and ownership structure. Finally a Granger causality test was performed to determine whether ownership structure is a Granger cause of TFP. The results of the analysis presented in this paper demonstrate that there is not a significant relationship between airport TFP and ownership structure. Airport productivity and efficiency is, however dependent upon the level of competition, choice of the market, and regulatory control.

  13. Secure multi-party quantum summation based on quantum Fourier transform

    NASA Astrophysics Data System (ADS)

    Yang, Hui-Yi; Ye, Tian-Yu

    2018-06-01

    In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.

  14. In the Face of Cybersecurity: How the Common Information Model Can Be Used

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Skare, Paul; Falk, Herbert; Rice, Mark

    2016-01-01

    Efforts are underway to combine smart grid information, devices, networking, and emergency response information to create messages that are not dependent on specific standards development organizations (SDOs). This supports a future-proof approach of allowing changes in the canonical data models (CDMs) going forward without having to perform forklift replacements of solutions that use the messages. This also allows end users (electric utilities) to upgrade individual components of a larger system while keeping the message payload definitions intact. The goal is to enable public and private information sharing securely in a standards-based approach that can be integrated into existing operations. Wemore » provide an example architecture that could benefit from this multi-SDO, secure message approach. This article also describes how to improve message security« less

  15. 33 CFR 66.01-3 - Delegation of authority to District Commanders.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...

  16. 33 CFR 66.01-3 - Delegation of authority to District Commanders.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...

  17. 33 CFR 66.01-3 - Delegation of authority to District Commanders.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...

  18. 33 CFR 66.01-3 - Delegation of authority to District Commanders.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...

  19. 33 CFR 66.01-3 - Delegation of authority to District Commanders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...

  20. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...

  1. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...

  2. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...

  3. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...

  4. Private Schools Put Spotlight on Safety

    ERIC Educational Resources Information Center

    Zehr, Mary Ann

    2005-01-01

    Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…

  5. Private Schooling and Labour Market Outcomes

    ERIC Educational Resources Information Center

    Green, Francis; Henseke, Golo; Vignoles, Anna

    2017-01-01

    Though a relative small part of the school sector, private schools have an important role in British society, and there are policy concerns about their negative effect on social mobility. Other studies show that individuals who have attended a private school go on to have higher levels of educational achievement, are more likely to secure a…

  6. 75 FR 32360 - Proposed Information Collection; Comment Request; Licensing of Private Remote-Sensing Space Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... Collection; Comment Request; Licensing of Private Remote-Sensing Space Systems AGENCY: National Oceanic and.... Abstract NOAA has established requirements for the licensing of private operators of remote-sensing space... Land Remote- Sensing Policy Act of 1992 and with the national security and international obligations of...

  7. Security enhancement of optical encryption based on biometric array keys

    NASA Astrophysics Data System (ADS)

    Yan, Aimin; Wei, Yang; Zhang, Jingtao

    2018-07-01

    A novel optical image encryption method is proposed by using Dammann grating and biometric array keys. Dammann grating is utilized to create a 2D finite uniform-intensity spot array. In encryption, a fingerprint array is used as private encryption keys. An original image can be encrypted by a scanning Fresnel zone plate array. Encrypted signals are processed by an optical coherent heterodyne detection system. Biometric array keys and optical scanning cryptography are integrated with each other to enhance information security greatly. Numerical simulations are performed to demonstrate the feasibility and validity of this method. Analyses on key sensitivity and the resistance against to possible attacks are provided.

  8. A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

    PubMed Central

    Yu, Jianping; Zhang, Peng; Wang, Shulan

    2015-01-01

    A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes. PMID:25873989

  9. A fingerprint encryption scheme based on irreversible function and secure authentication.

    PubMed

    Yang, Yijun; Yu, Jianping; Zhang, Peng; Wang, Shulan

    2015-01-01

    A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

  10. Relationship of Employees’ Achievement Motivation and Quality of Working Life with Their Self-efficacy at Selected Hospitals with a Multi-group Analysis: Moderating Role of Organizational Ownership

    PubMed Central

    Mahmoudi, Ghahraman; Rostami, Fahimeh Hoseinian; Mahmoudjanloo, Shaharbanoo; Jahani, Mohammad Ali

    2017-01-01

    Introduction: Motivational deficiencies and the low quality of working life significantly reduce employees’ work performance and consequently their efficacy (effectiveness and proper performance in doing a task or specific tasks). Aim: The aim of this study was to determine the relationship between achievement motivation and quality of working life with self-efficacy among staff working in Mazandaran hospitals, by taking organizational ownership as a mediator variable. Materials and Methods: This study was an applied descriptive-correlation. Research population consisted of all staff working in selected hospitals of Mazandaran Province, Iran. 341 employees were selected with randomly-stratified sampling as the statistical sample. Three valid questionnaires were used for data collection. Data were analysis based on structured equations and path analysis with SPSS19 and AMOS. Results: In private hospitals, there was a significant relationship between the quality of working life and self-efficacy (p<0.001). In relationship between achievement motivation and self-efficacy, there was no significant differences between university hospitals and social security hospitals, but relationship between the quality of working life and self-efficacy was significant (p <0. 05). Considering achievement motivation and self-efficacy in private hospitals and university hospitals, a significant differences was observed (p<0. 05). Conclusion: The hospital ownership has a moderating in relationship of achievement motivation and quality of working life with self-efficacy. Staff’s empowerment courses for university hospitals and improvement in the overall space of job, increase in job security, reducing salary differences is suggested for private hospitals. PMID:29284991

  11. Relationship of Employees' Achievement Motivation and Quality of Working Life with Their Self-efficacy at Selected Hospitals with a Multi-group Analysis: Moderating Role of Organizational Ownership.

    PubMed

    Mahmoudi, Ghahraman; Rostami, Fahimeh Hoseinian; Mahmoudjanloo, Shaharbanoo; Jahani, Mohammad Ali

    2017-12-01

    Motivational deficiencies and the low quality of working life significantly reduce employees' work performance and consequently their efficacy (effectiveness and proper performance in doing a task or specific tasks). The aim of this study was to determine the relationship between achievement motivation and quality of working life with self-efficacy among staff working in Mazandaran hospitals, by taking organizational ownership as a mediator variable. This study was an applied descriptive-correlation. Research population consisted of all staff working in selected hospitals of Mazandaran Province, Iran. 341 employees were selected with randomly-stratified sampling as the statistical sample. Three valid questionnaires were used for data collection. Data were analysis based on structured equations and path analysis with SPSS19 and AMOS. In private hospitals, there was a significant relationship between the quality of working life and self-efficacy (p<0.001). In relationship between achievement motivation and self-efficacy, there was no significant differences between university hospitals and social security hospitals, but relationship between the quality of working life and self-efficacy was significant (p <0. 05). Considering achievement motivation and self-efficacy in private hospitals and university hospitals, a significant differences was observed (p<0. 05). The hospital ownership has a moderating in relationship of achievement motivation and quality of working life with self-efficacy. Staff's empowerment courses for university hospitals and improvement in the overall space of job, increase in job security, reducing salary differences is suggested for private hospitals.

  12. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    PubMed

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. © London School of Economics and Political Science 2011.

  13. Abortion services at hospitals in Istanbul.

    PubMed

    O'Neil, Mary Lou

    2017-04-01

    Despite the existence of a liberal law on abortion in Turkey, there is growing evidence that actually securing an abortion in Istanbul may prove difficult. This study aimed to determine whether or not state hospitals and private hospitals that accept state health insurance in Istanbul are providing abortion services and for what indications. Between October and December 2015, a mystery patient telephone survey of 154 hospitals, 43 public and 111 private, in Istanbul was conducted. 14% of the state hospitals in Istanbul perform abortions without restriction as to reason provided in the current law while 60% provide the service if there is a medical necessity. A quarter of state hospitals in Istanbul do not provide abortion services at all. 48.6% of private hospitals that accept the state health insurance also provide for abortion without restriction while 10% do not provide abortion services under any circumstances. State and private hospitals in Istanbul are not providing abortion services to the full extent allowed under the law. The low numbers of state hospitals offering abortions without restriction indicates a de facto privatization of the service. This same trend is also visible in many private hospitals partnering with the state that do not provide abortion care. While many women may choose a private provider, the lack of provision of abortion care at state hospitals and those private hospitals working with the state leaves women little option but to purchase these services from private providers at some times subtantial costs.

  14. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    PubMed Central

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices. PMID:25695104

  15. Constructing RBAC based security model in u-healthcare service platform.

    PubMed

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  16. Design of real-time encryption module for secure data protection of wearable healthcare devices.

    PubMed

    Kim, Jungchae; Lee, Byuck Jin; Yoo, Sun K

    2013-01-01

    Wearable devices for biomedical instrumentation could generate the medical data and transmit to a repository on cloud service through wireless networks. In this process, the private medical data will be disclosed by man in the middle attack. Thus, the archived data for healthcare services would be protected by non-standardized security policy by healthcare service provider (HSP) because HIPAA only defines the security rules. In this paper, we adopted the Advanced Encryption Standard (AES) for security framework on wearable devices, so healthcare applications using this framework could support the confidentiality easily. The framework developed as dynamic loadable module targeted for lightweight microcontroller such as msp430 within embedded operating system. The performance was shown that the module can support the real-time encryption using electrocardiogram and photoplethysmogram. In this regard, the processing load for enabling security is distributed to wearable devices, and the customized data protection method could be composed by HSP for a trusted healthcare service.

  17. 75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... electronic security, the market is estimated at US$ 1.5 billion. Today, electronic security equipment is not... market information and to provide access to key government officials and potential business partners for... both the public sector (e.g., public security authorities and officials) and private business (e.g...

  18. Private Security Contractors in Iraq and Afghanistan: Legal Issues

    DTIC Science & Technology

    2010-01-07

    involving Blackwater Worldwide private security guards on contract with the State Department, who reportedly opened fire in the crowded traffic circle in the...Background and Analysis, by Moshe Schwartz. 2 See James Risen and Mark Mazzetti, Blackwater Guards Tied to Secret C.I.A. Raids, NY TIMES, December 10...0360 (RMU), slip op. (D.D.C, .Dec. 31, 2009). 6 See Iraq: U.S. Blackwater Case Dismissal “Unacceptable,” REUTERS, Jan. 1, 2010. 7 See Iraq to

  19. Transportation Security: Issues for the 111th Congress

    DTIC Science & Technology

    2009-05-15

    results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports

  20. National Strategy for Aviation Security

    DTIC Science & Technology

    2007-03-26

    for Aviation Security (hereafter referred to as the Strategy) to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort

  1. 75 FR 26171 - Cyber Security Certification Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ...-sector auditors who will examine those provider's adherence to stringent cyber security practices that... the auditors who will conduct security assessments of communications service providers; (3) establish... whether the auditors should also be private-sector entities. If so, in order to prevent conflicts of...

  2. 20 CFR 416.1121 - Types of unearned income.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...

  3. 20 CFR 416.1121 - Types of unearned income.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...

  4. Interactive analysis of geographically distributed population imaging data collections over light-path data networks

    NASA Astrophysics Data System (ADS)

    van Lew, Baldur; Botha, Charl P.; Milles, Julien R.; Vrooman, Henri A.; van de Giessen, Martijn; Lelieveldt, Boudewijn P. F.

    2015-03-01

    The cohort size required in epidemiological imaging genetics studies often mandates the pooling of data from multiple hospitals. Patient data, however, is subject to strict privacy protection regimes, and physical data storage may be legally restricted to a hospital network. To enable biomarker discovery, fast data access and interactive data exploration must be combined with high-performance computing resources, while respecting privacy regulations. We present a system using fast and inherently secure light-paths to access distributed data, thereby obviating the need for a central data repository. A secure private cloud computing framework facilitates interactive, computationally intensive exploration of this geographically distributed, privacy sensitive data. As a proof of concept, MRI brain imaging data hosted at two remote sites were processed in response to a user command at a third site. The system was able to automatically start virtual machines, run a selected processing pipeline and write results to a user accessible database, while keeping data locally stored in the hospitals. Individual tasks took approximately 50% longer compared to a locally hosted blade server but the cloud infrastructure reduced the total elapsed time by a factor of 40 using 70 virtual machines in the cloud. We demonstrated that the combination light-path and private cloud is a viable means of building an analysis infrastructure for secure data analysis. The system requires further work in the areas of error handling, load balancing and secure support of multiple users.

  5. Clinicians, security and information technology support services in practice settings--a pilot study.

    PubMed

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  6. Applying Systems Engineering to Improve the Main Gas Turbine Exhaust System Maintenance Strategy for the CG-47 Ticonderoga Class Cruiser

    DTIC Science & Technology

    2015-09-01

    15 4. Commander, Naval Regional Maintenance Center .................. 15 5 . Private Ship Repair Industry...TURBINE EXHAUST SYSTEM MAINTENANCE STRATEGY FOR THE CG-47 TICONDEROGA CLASS CRUISER 5 . FUNDING NUMBERS 6. AUTHOR(S) Sparks, Robert D. 7. PERFORMING...condition-based maintenance, condition-directed, failure finding, fault tree analysis 15 . NUMBER OF PAGES 133 16. PRICE CODE 17. SECURITY

  7. Teachers' Time Management and the Performance of Students: A Comparison of Government and Private Schools of Hyderabad, Sindh, Pakistan

    ERIC Educational Resources Information Center

    Sahito, Zafarullah; Khawaja, Mumtaz; Panhwar, Uzma Murad; Siddiqui, Abida; Saeed, Humera

    2016-01-01

    Time is a precious and so important thing as well as the blessing of the Creator in the world. It is the time which makes, changes, creates, decorates, maintains, develops, strengthens, and successes the present and secures the future of the people and the nations. Time considers a great cure and care for any unethical, unsocial and invaluable…

  8. EHR/PHR Basics

    MedlinePlus

    ... a hospital, an insurance company, or an employer. Electronic Health Records—Are They Secure? Many people wonder ... information is kept private and secure in an electronic health record system. In an electronic health record, ...

  9. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  10. Experimental extraction of secure correlations from a noisy private state.

    PubMed

    Dobek, K; Karpiński, M; Demkowicz-Dobrzański, R; Banaszek, K; Horodecki, P

    2011-01-21

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.

  11. The Department of Defense’s Use of Private Security Contractors in Iraq and Afghanistan: Background, Analysis, and Options for Congress

    DTIC Science & Technology

    2010-06-22

    Congress has generally accepted the concept of using unarmed contractors to carry out support functions in military operations, such as providing food and...countries where stability generally is not an issue. 3 According to one report, “Not since the 17th century has there been such a reliance on private...Institution has estimated that citizens of some 30 countries have worked as security contractors in Iraq.6 PSC employees are generally divided by

  12. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  13. Review of Private Sector Personnel Screening Practices

    DTIC Science & Technology

    2000-10-01

    private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor

  14. National Security Technology Incubator Evaluation Process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less

  15. The Graduate MIS Security Course: Objectives and Challenges

    ERIC Educational Resources Information Center

    Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew

    2009-01-01

    Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…

  16. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  17. Comparing the performance of the public, social security and private health subsystems in Argentina by core dimensions of primary health care

    PubMed Central

    Yavich, Natalia; Báscolo, Ernesto Pablo; Haggerty, Jeannie

    2016-01-01

    Abstract Background Most Latin American health systems are comprised of public (PubS), social security (SSS) and private (PrS) subsystems. These subsystems coexist, causing health care fragmentation and population segmentation. Objective To estimate the extent of subsystem cross-coverage in a geographically bounded population (Rosario city) and to compare the subsystems’ performance on primary health care (PHC) dimensions. Methods Through a cross-sectional, interviewer-administered survey to a representative sample (n = 822) of the Rosario population, we measured the percentage of cross-coverage (people with usual source of care in one subsystem but also covered by another subsystem) and the health services’ performance by core PHC dimensions, as reported by each subsystem’s usual users. We compared the subsystems’ performance using chi-square analysis and one-way analysis of variance testing. We analyzed whether the observed differences were coherent with the predominant institutional and organizational features of each subsystem. Results Overall, 39.3% of the population was affiliated with the PubS, 44.8% with the SSS and 15.9% with the PrS. Cross-coverage was reported by 40.6% of respondents. The performance of the PubS was weak on accessibility but strong on person-and-community-oriented care, the opposite of the PrS. The SSS combined the strengths of the other two subsystems. Conclusion Rosario’s health system has a high percentage of cross-coverage, contributing to issues of fragmentation, segmentation, financial inequity and inefficiency. The overall performance of the SSS was better than that of the PrS and PubS, though each subsystem had a particular performance pattern with areas of strength and weakness that were consistent with their institutional and organizational profiles. PMID:27377651

  18. Nearest private query based on quantum oblivious key distribution

    NASA Astrophysics Data System (ADS)

    Xu, Min; Shi, Run-hua; Luo, Zhen-yu; Peng, Zhen-wan

    2017-12-01

    Nearest private query is a special private query which involves two parties, a user and a data owner, where the user has a private input (e.g., an integer) and the data owner has a private data set, and the user wants to query which element in the owner's private data set is the nearest to his input without revealing their respective private information. In this paper, we first present a quantum protocol for nearest private query, which is based on quantum oblivious key distribution (QOKD). Compared to the classical related protocols, our protocol has the advantages of the higher security and the better feasibility, so it has a better prospect of applications.

  19. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... evolution of NS/EP functions by or through the NPSBN. The Secure Government Communications Scoping Subcommittee is charged with examining how commercial-off-the-shelf technologies and private sector best...

  20. 31 CFR 25.406 - Savings clause.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25...

  1. Loss-tolerant measurement-device-independent quantum private queries

    PubMed Central

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-01

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors. PMID:28051101

  2. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  3. 48 CFR 225.7402-4 - Law of war training.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...

  4. 48 CFR 225.7402-4 - Law of war training.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...

  5. 48 CFR 225.7402-4 - Law of war training.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...

  6. Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration

    DTIC Science & Technology

    2007-03-01

    commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007] 16 The four core elements of CSI include:36 • Identify high...www.cbp.gov/xp/cgov/import/commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007]. 17 Connecting them

  7. The Private Military Firms: Historical Evolution and Industry Analysis

    DTIC Science & Technology

    2007-06-01

    Company, Private Military Firm, Supply Push, Demand Pull, Future Projections, Blackwater, DynCorp, Entrepreneurship 16. PRICE CODE 17. SECURITY...Business Administration, University of California, 1995. Baumol, W. J. Entrepreneurship , Management, and the Structure of Payoffs. Cambridge, MA: The MIT...P. F. Innovation and Entrepreneurship : Practice and Principles. Toronto: Fitzhenry & Whiteside Limited, 1985. Duffy, M. When Private Armies Take to

  8. SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards

    DTIC Science & Technology

    2002-05-01

    Report to Congressional Requesters United States General Accounting Office GAO May 2002 SOCIAL SECURITY NUMBERS Government Benefits from SSN Use...and Subtitle SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards Contract Number Grant Number Program...Social Security benefits . Since that time, the number has been used for myriad non-Social Security purposes. Private sector use of the SSN has grown

  9. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    PubMed

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  10. 'Lowering the threshold of effective deterrence'-Testing the effect of private security agents in public spaces on crime: A randomized controlled trial in a mass transit system.

    PubMed

    Ariel, Barak; Bland, Matthew; Sutherland, Alex

    2017-01-01

    Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations' complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory.

  11. 77 FR 58208 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    ... Department of Transportation (DOT), the Federal Aviation Administration and the Transportation Security... International Airport final application; the Transportation Security Administration will also participate... employees, airlines, aviation businesses and airport tenants, elected officials and community residents...

  12. Practices and technologies in hazardous material transportation and security.

    DOT National Transportation Integrated Search

    2011-11-23

    "The University of Arkansas (UA) team is responsible for investigating practices of : hazardous material transportation in the private sector. The UA team is a subcontractor : to the project Petrochemical Transportation Security, Development of...

  13. Terrorism: The Challenge to the Private Sector,

    DTIC Science & Technology

    private sector , security is a line management responsibility, particularly where goals and objectives, information protection, and protection of key assets are concerned. Each company in the corporate world has a different personality. The goals are pretty much the same, but once you get below that initial goal, then you go to beliefs. Some companies are very macho. Some companies won’t let a security man interview a suspect, some companies will. Companies are very hesitant to go th extremes. Companies are both image conscious and fundamentally ethical. They truly do

  14. Agencies Need Improved Financial Data Reporting for Private Security Contractors

    DTIC Science & Technology

    2008-10-30

    Source DoDa DoSb USAIDc Total 1 Multiple Funds Used for Contract $712.0 $1,443.3 $493.8 $2,649.1 2 Operations and Maintenance Account 1,150.1 0.0 0.0...display a currently valid OMB control number. 1 . REPORT DATE 30 OCT 2008 2 . REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND...routinely capturing financial information for all contracts and subcontracts for private security services, citing FAR 15.403- 1 (b)( 2 ) as prohibiting it

  15. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... trades or businesses under section 513(a); (2) References to “10 percent” and “proceeds” in the context of the private business use test and the private security or payment test mean “5 percent” and “net... business tests. In applying §§ 1.141-0 through 1.141-15 to section 145(a)— (1) References to governmental...

  16. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...

  17. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...

  18. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...

  19. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...

  20. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...

  1. Work climate in Mexican hemodialysis units: a cross-sectional study.

    PubMed

    Rojas Russell, M; Tirado Gómez, L L; Pacheco Domínguez, R L; Escamilla Santiago, R; López Cervantes, M

    2011-01-01

    The work climate (WC) affects the performance of service providers and has an impact on the care provided to users. This is important in the case of conditions that affect the quality of life, as is the case of chronic kidney disease (CKD) treated with haemodialysis. In Mexico, the demand for the care of CKD cases is increasing and the haemodialysis offer is limited. The purpose of this study was to describe and compare the WC in public, private and social security haemodialysis units in Mexico and to validate a tool to measure WC in haemodialysis units (HU). 372 professionals from 84 HU in 27 states were interviewed using a questionnaire. This included questions about the WC, quality of care and structure and organisation of the HU. Variables were compared by type of institution and profession. Significant correlations were observed between the WC and indicators of the quality of care. Nine out of fourteen variables presented important differences by type of unit, with a better perception of WC in private units and a poorer perception in social security ones. The perception of WC relies on the organisation and planning of the institutions, as well as on their infrastructure. In the case of Social Security HU in Mexico, these appear to be the areas that require improvement in order to encourage a better work climate.

  2. 32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...

  3. 32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...

  4. The Employee Retirement Income Security Act of 1974: Policies and Problems

    ERIC Educational Resources Information Center

    Alperin, Stuart N.; And Others

    1975-01-01

    Congress enacted the Employment Retirement Income Security Act of 1974 (ERISA) to help assure economic security in retirement. This analysis includes description of the growth, operation, and inequities within the private pension system and analysis of ERISA: (1) participation, vesting and joint and survivor annuities; (2) funding and plan…

  5. 7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 11 2011-01-01 2011-01-01 false Refinancing of existing secured debt-distribution and power supply borrowers. 1717.857 Section 1717.857 Agriculture Regulations of the Department of... Private Financing § 1717.857 Refinancing of existing secured debt—distribution and power supply borrowers...

  6. Parental Involvement in School and the Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2015-01-01

    Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…

  7. Motivating the Private vs. Public Sector Managers.

    ERIC Educational Resources Information Center

    Khojasteh, Mak

    1993-01-01

    A questionnaire on intrinsic/extrinsic rewards received 362 responses from 380 managers. Pay and security were greater motivators for private than for public sector managers. Recognition had higher motivating potential in the public sector. Both groups were motivated by achievement and advancement. (SK)

  8. 12 CFR 1228.1 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... continuing basis each time a property is transferred (except for transfers specifically excepted) for a period of time or indefinitely. A private transfer fee does not include fees, charges, payments, or other... SECURITY INTERESTS IN, MORTGAGES ON PROPERTIES ENCUMBERED BY CERTAIN PRIVATE TRANSFER FEE COVENANTS AND...

  9. Cyber Hygiene for Control System Security

    DOE PAGES

    Oliver, David

    2015-10-08

    There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.

  10. A governor's guide to emergency management. Volume two : homeland security

    DOT National Transportation Integrated Search

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  11. Social Security reform: implications for women.

    PubMed

    Williamson, J B; Rix, S E

    2000-01-01

    Despite recent economic gains for women, a substantial gender gap in financial security during old age remains, making women more dependent than men upon Social Security. Social Security plays an important role in providing for women's economic security. The implications for women of several proposed changes in Social Security policy, including the call for the partial privatization of Social Security via the introduction of individual accounts, are analyzed. Many of the proposals would have the effect of asking women, particularly low-income women, to shoulder a disproportionate share of the risks and burdens associated with the changes.

  12. 77 FR 60607 - National Cybersecurity Awareness Month, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... released the Blueprint for a Secure Cyber Future--a strategic plan to protect government, the private sector, and the public against cyber threats today and tomorrow. As we continue to improve our... infrastructure, facilitating greater cyber information sharing between government and the private sector, and...

  13. 12 CFR 1228.1 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of title to real estate, and payable on a continuing basis each time a property is transferred (except for transfers specifically excepted) for a period of time or indefinitely. A private transfer fee... SECURITY INTERESTS IN, MORTGAGES ON PROPERTIES ENCUMBERED BY CERTAIN PRIVATE TRANSFER FEE COVENANTS AND...

  14. Army Officer Counseling Training for Commanders: Participant Manual

    DTIC Science & Technology

    2011-04-01

    but also create high levels of stress , burnout , and frustration. o Even social events may be perceived as burdensome because they take away from... level of security is not always present in private-sector jobs . o Educational opportunities stand out as the most attractive benefit the Army offers...and one or more silent observers. If you are an observer, your role will be to take notes on the counselor‟s performance and provide feedback at the

  15. Opportunities to Improve Processes for Reporting, Investigating, and Remediating Serious Incidents Involving Private Security Contractors in Iraq

    DTIC Science & Technology

    2009-04-30

    Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...contractor, Blackwater , that resulted in the death of 17 Iraqi civilians. As a result of the incident, DoD and DoS agreed on core standards...have surfaced over the years concerning the oversight, control, cost, and legal status of PSCs, the Blackwater incident in September 2007, during which

  16. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  17. Economic Influences on Re-Enlistment. The Draft Era.

    DTIC Science & Technology

    1982-10-01

    for each individual in jobs covered by Social Security (over 90 percent of all private - sector jobs, plus military service and half of non-federal...disappeared as real military wages have increased significantly over cyclical swings in the private sector . Despite the Navy’s apparent success in...maintaining optimal retention rates in selective ratings is due to the wage pressures exerted in the private sector . Military wage increases must be

  18. Participation of the Private Sector in the Provision of Early Childhood Care, Development, and Education: Issues, Challenges, and Way Forward in Nigeria's Context

    ERIC Educational Resources Information Center

    Matthew, Ige Akindele

    2015-01-01

    While all children have a right to quality care and education in their early years, how to secure that right, especially in resource-limited contexts, is the subject of much debate. For some nations, private schools can seem like a good option, requiring few federal resources. However, the privatization of early education presents significant…

  19. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    DTIC Science & Technology

    2015-01-01

    very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering

  20. Analysis of Security Sector Reform in Post-Conflict Sierra Leone: A Comparison of Current versus Historical Capabilities

    DTIC Science & Technology

    2010-03-01

    6 A. M. Fitz -Gerald, Security Sector Reform in Sierra Leone. Shrivenham, GFN-SSR. 8–10. Osman Gbla...34Security Sector Reform: Bringing the Private in.", 1– 23; Peter Albrecht and Paul Jackson, eds. Security System Transformation in Sierra Leone, 1997–2007...veterans.38 33 John R. Cartwright, Political leadership in Sierra Leone (Toronto: University of

  1. Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query

    NASA Astrophysics Data System (ADS)

    Basak, Jyotirmoy; Maitra, Subhamoy

    2018-04-01

    In device-independent (DI) paradigm, the trustful assumptions over the devices are removed and CHSH test is performed to check the functionality of the devices toward certifying the security of the protocol. The existing DI protocols consider infinite number of samples from theoretical point of view, though this is not practically implementable. For finite sample analysis of the existing DI protocols, we may also consider strategies for checking device independence other than the CHSH test. In this direction, here we present a comparative analysis between CHSH and three-party Pseudo-telepathy game for the quantum private query protocol in DI paradigm that appeared in Maitra et al. (Phys Rev A 95:042344, 2017) very recently.

  2. Fragility of the provision of local public goods to private and collective risks.

    PubMed

    Cárdenas, Juan-Camilo; Janssen, Marco A; Ale, Manita; Bastakoti, Ram; Bernal, Adriana; Chalermphol, Juthathip; Gong, Yazhen; Shin, Hoon; Shivakoti, Ganesh; Wang, Yibo; Anderies, John M

    2017-01-31

    Smallholder agricultural systems, strongly dependent on water resources and investments in shared infrastructure, make a significant contribution to food security in developing countries. These communities are being increasingly integrated into the global economy and are exposed to new global climate-related risks that may affect their willingness to cooperate in community-level collective action problems. We performed field experiments on public goods with private and collective risks in 118 small-scale rice-producing communities in four countries. Our results indicate that increasing the integration of those communities with the broader economic system is associated with lower investments in public goods when facing collective risks. These findings indicate that local public good provision may be negatively affected by collective risks, especially in communities more integrated with the market economy.

  3. Fragility of the provision of local public goods to private and collective risks

    PubMed Central

    Cárdenas, Juan-Camilo; Ale, Manita; Bastakoti, Ram; Bernal, Adriana; Chalermphol, Juthathip; Gong, Yazhen; Shin, Hoon; Shivakoti, Ganesh; Wang, Yibo; Anderies, John M.

    2017-01-01

    Smallholder agricultural systems, strongly dependent on water resources and investments in shared infrastructure, make a significant contribution to food security in developing countries. These communities are being increasingly integrated into the global economy and are exposed to new global climate-related risks that may affect their willingness to cooperate in community-level collective action problems. We performed field experiments on public goods with private and collective risks in 118 small-scale rice-producing communities in four countries. Our results indicate that increasing the integration of those communities with the broader economic system is associated with lower investments in public goods when facing collective risks. These findings indicate that local public good provision may be negatively affected by collective risks, especially in communities more integrated with the market economy. PMID:28096383

  4. Rebuilding and the private cloud of the hospital information system by the virtualization technology.

    PubMed

    Yamashita, Yoshinori; Ogaito, Tatoku

    2013-01-01

    In our hospital, we managed an electronic health record system and many section subsystems as a hospital information system. By the expansion of these information systems, a system becomes complicated, and maintenance and operative cost increased. Furthermore, the environment that is available to medical information is demanded anywhere anytime by expansion of the computerization. However, the expansion of the information use becomes necessary for the expansion such as the personal protection of information for security. We became rebuilding and the private cloud of the hospital information system by the virtualization technology to solve such a problem. As a result, we were able to perform a decrease in number of the servers which constituted a system, a decrease in network traffic, reduction of the operative cost.

  5. 17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... obtain information about the amount of securities represented by accounts of customers resident in the... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... interest of investors. (c) Tier I. Any tender offer for the securities of a foreign private issuer as...

  6. Administering a healthy dose of security.

    PubMed

    Berry, D; Mullen, M; Murray, T

    The article describes how a hospital located in a poor, crime-ridden section of a large city has made the most of in-house resources and public-private liaisons to improve security at its 113-acre campus. Details on the facility's double-pronged approach--tight internal security and strong external liaisons with businesses, law enforcement, and community groups--are provided.

  7. Economic Analysis of Cyber Security

    DTIC Science & Technology

    2006-07-01

    vulnerability databases and track the number of incidents reported by U.S. organizations. Many of these are private organizations, such as the security...VULNERABILITY AND ATTACK ESTIMATES Numerous organizations compile vulnerability databases and patch information, and track the number of reported incidents... database / security focus Databases of vulnerabilities identifying the software versions that are susceptible, including information on the method of

  8. 75 FR 63714 - Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ..., in the aggregate, or by the private sector of $100,000,000 (adjusted for inflation) or more in any... Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone AGENCY: Coast... moving security zones around passenger vessels in the Sector Southeastern New England Captain of the Port...

  9. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    DTIC Science & Technology

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  10. Drug policing assemblages: Repressive drug policies and the zonal banning of drug users in Denmark's club land.

    PubMed

    Søgaard, Thomas F; Houborg, Esben; Pedersen, Michael M

    2017-03-01

    Zonal banning of disorderly and intoxicated young people has moved to centre stage in debates about nightlife governance. Whereas existing research has primarily focused on the use of zonal banning orders to address problems of alcohol-related harm and disorder, this article highlights how zonal banning is also used to target drug-using clubbers in Denmark. Based on ethnographic observations and interviews with nightlife control agents in two Danish cities, the article aims to provide new insights into how the enforcement of national drug policies on drug-using clubbers, is shaped by plural nightlife policing complexes. The paper demonstrates how the policing of drug-using clubbers is a growing priority for both police and private security agents. The article also demonstrates how the enforcement of zonal bans on drug-using clubbers involves complex collaborative relations between police, venue owners and private security agents. The paper argues that a third-party policing perspective combined with assemblage theory is useful for highlighting how the enforcement of national drug policies and nightlife banning systems is shaped by their embeddedness in local 'drug policing assemblages' characterized by inter-agency relation-building, the creative combination of public and private (legal) resources and internal power struggles. It also provides evidence of how drug policing assemblages give rise to many different, and often surprising, forms of jurisdiction involving divergent performances of spaces-, objects- and authorities of governance. Copyright © 2016 Elsevier B.V. All rights reserved.

  11. 33 CFR 66.10-1 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS..., the Uniform State Waterway Marking System's (USWMS) aids to navigation provisions for marking channels... waters for private aids to navigation and in those internal waters that are non-navigable waters of the U...

  12. 33 CFR 66.01-20 - Inspection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...

  13. 33 CFR 66.01-20 - Inspection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...

  14. 33 CFR 66.01-20 - Inspection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...

  15. 33 CFR 66.01-20 - Inspection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...

  16. 33 CFR 66.01-20 - Inspection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...

  17. 33 CFR 66.10-1 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS..., the Uniform State Waterway Marking System's (USWMS) aids to navigation provisions for marking channels... waters for private aids to navigation and in those internal waters that are non-navigable waters of the U...

  18. Unlawful Combatants at the Controls: The CIA, Armed RPAS and LOAC

    DTIC Science & Technology

    2011-02-16

    career judge advocate, beginning military service with the Judge Advocate General’s Corps, United States Navy . After a brief stint in private...of Xe Services, formerly known as Blackwater , the private security firm that has been at the forefront of other allegations concerning civilians

  19. 20 CFR 422.527 - Private printing and modification of prescribed applications, forms, and other publications.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... prescribed applications, forms, and other publications. 422.527 Section 422.527 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications and Related Forms § 422.527 Private..., institution, or organization wishing to reproduce, reprint, or distribute any application, form, or...

  20. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less

  1. ‘Lowering the threshold of effective deterrence’—Testing the effect of private security agents in public spaces on crime: A randomized controlled trial in a mass transit system

    PubMed Central

    Bland, Matthew; Sutherland, Alex

    2017-01-01

    Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations’ complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory. PMID:29211735

  2. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... in the issuer's consolidated financial statements and not located in a hyperinflationary environment..., Oct. 5, 1999] Consolidated and Combined Financial Statements ... SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES...

  3. Quantum Private Comparison Protocol with Linear Optics

    NASA Astrophysics Data System (ADS)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-12-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  4. The experiences of security industry contractors working in Iraq: an interpretative phenomenological analysis.

    PubMed

    Messenger, Katy; Farquharson, Lorna; Stallworthy, Pippa; Cawkill, Paul; Greenberg, Neil

    2012-07-01

    To explore the occupational experiences of private security contractors working in a war zone and how it impacts on their mental health. Semistructured interviews were conducted with seven contractors employed by a large UK-based private security company. Interpretative phenomenological analysis was used to analyze the interview transcripts. Participants also completed the 12-item General Health Questionnaire and the Posttraumatic Stress Disorder Checklist. Four overarching themes emerged: the appeal of the job; vulnerability; keep going; and seeking help for stress in the workplace. No clinically significant levels of distress were reported. Contractors are frequently exposed to stressors known to increase risk of psychiatric difficulty in military personnel. A number of potential protective factors were identified. Only a minority of participants were open to seeking help for mental health difficulties.

  5. Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs

    NASA Astrophysics Data System (ADS)

    Wang, Cong; Xu, Gang; Yang, Yi-Xian

    2013-07-01

    In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.

  6. [The health system of Venezuela].

    PubMed

    Bonvecchio, Anabelle; Becerril-Montekio, Victor; Carriedo-Lutzenkirchen, Angela; Landaeta-Jiménez, Maritza

    2011-01-01

    This paper describes the Venezuelan health system, including its structure and coverage, financial sources, human and material resources and its stewardship functions. This system comprises a public and a private sector. The public sector includes the Ministry of Popular Power for Health (MS) and several social security institutions, salient among them the Venezuelan Institute for Social Security (IVSS). The MH is financed with federal, state and county contributions. The IVSS is financed with employer, employee and government contributions. These two agencies provide services in their own facilities. The private sector includes providers offering services on an out-of-pocket basis and private insurance companies. The Venezuelan health system is undergoing a process of reform since the adoption of the 1999 Constitution which calls for the establishment of a national public health system. The reform process is now headed by the Barrio Adentro program.

  7. Secure Multiparty Quantum Computation for Summation and Multiplication.

    PubMed

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-21

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  8. Secure Multiparty Quantum Computation for Summation and Multiplication

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  9. 33 CFR 66.05-5 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...

  10. 33 CFR 66.10-1 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...

  11. 33 CFR 66.05-5 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...

  12. 33 CFR 66.10-1 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...

  13. 33 CFR 66.01-1 - Basic provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...

  14. 33 CFR 66.01-1 - Basic provisions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...

  15. 33 CFR 66.01-25 - Discontinuance and removal.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...

  16. 33 CFR 66.01-25 - Discontinuance and removal.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...

  17. 33 CFR 66.05-5 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...

  18. 33 CFR 66.01-1 - Basic provisions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...

  19. 33 CFR 66.10-1 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...

  20. 33 CFR 66.01-25 - Discontinuance and removal.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...

  1. 33 CFR 66.01-25 - Discontinuance and removal.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...

  2. 33 CFR 66.05-5 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...

  3. 33 CFR 66.05-5 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...

  4. 33 CFR 66.01-25 - Discontinuance and removal.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...

  5. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  6. Secure Fingerprint Identification of High Accuracy

    DTIC Science & Technology

    2014-01-01

    secure ) solution of complexity O(n3) based on Gaussian elimination. When it is applied to biometrics X and Y with mX and mY minutiae, respectively...collections of biometric data in use today include, for example, fingerprint, face, and iris images collected by the US Department of Homeland Security ...work we focus on fingerprint data due to popularity and good accuracy of this type of biometry. We formulate the problem of private, or secure , finger

  7. Digital camera with apparatus for authentication of images produced from an image file

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1993-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.

  8. Speeding decisions. Social security's information exchange program.

    PubMed

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  9. 42 CFR 23.33 - What security must be given for these loans?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false What security must be given for these loans? 23.33... NATIONAL HEALTH SERVICE CORPS Private Practice Special Loans for Former Corps Members § 23.33 What security must be given for these loans? The Secretary may require the borrower to pledge to the Secretary a...

  10. Performance Evaluation of a Field Programmable Gate Array-Based System for Detecting and Tracking Peer-to-Peer Protocols on a Gigabit Ethernet Network

    DTIC Science & Technology

    2010-06-01

    Ron’s Code 4 . . . . . . . . . . . . . . . . . . . 18 2.3.3 Virtual Private Network and Secure Shell Tunnels 19 2.3.4 Darknets ...created using Iodine. 2.2 Analyzing and Classifying Network Traffic Before the advent of Darknets and anonymizers like Tor (see Section 2.3), ana... darknets , and the Tor network. 2.3.1 Byte Padding. Byte padding is the most primitive obfuscation method used to hide payloads in network traffic. When byte

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solis, John Hector

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less

  12. Private genome analysis through homomorphic encryption

    PubMed Central

    2015-01-01

    Background The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. Methods We present evaluation algorithms for secure computation of the minor allele frequencies and χ2 statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes - the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. Results The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. Conclusions The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or χ2 test statistic in a case-control study. PMID:26733152

  13. The contribution of health selection to occupational status inequality in Germany - differences by gender and between the public and private sectors.

    PubMed

    Kröger, H

    2016-04-01

    Estimating the size of health inequalities between hierarchical levels of job status and the contribution of direct health selection to these inequalities for men and women in the private and public sector in Germany. The study uses prospective data from the Socio-Economic Panel study on 11,788 women and 11,494 men working in the public and private sector in Germany. Direct selection effects of self-rated health on job status are estimated using fixed-effects linear probability models. The contribution of health selection to overall health-related inequalities between high and low status jobs is calculated. Women in the private sector who report very good health have a 1.9 [95% CI: 0.275; 3.507] percentage point higher probability of securing a high status job than women in poor self-rated health. This direct selection effect constitutes 20.12% of total health inequalities between women in high and low status jobs. For men in the private and men and women in the public sector no relevant health selection effects were identified. The contribution of health selection to total health inequalities between high and low status jobs varies with gender and public versus private sector. Women in the private sector in Germany experience the strongest health selection. Possible explanations are general occupational disadvantages that women have to overcome to secure high status jobs. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  14. Risk Assessment Methodology for Water utilities (RAM-W) : the foundation for emergency response planning.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Danneels, Jeffrey John

    2005-03-01

    Concerns about acts of terrorism against critical infrastructures have been on the rise for several years. Critical infrastructures are those physical structures and information systems (including cyber) essential to the minimum operations of the economy and government. The President's Commission on Critical Infrastructure Protection (PCCIP) probed the security of the nation's critical infrastructures. The PCCIP determined the water infrastructure is highly vulnerable to a range of potential attacks. In October 1997, the PCCIP proposed a public/private partnership between the federal government and private industry to improve the protection of the nation's critical infrastructures. In early 2000, the EPA partnered withmore » the Awwa Research Foundation (AwwaRF) and Sandia National Laboratories to create the Risk Assessment Methodology for Water Utilities (RAM-W{trademark}). Soon thereafter, they initiated an effort to create a template and minimum requirements for water utility Emergency Response Plans (ERP). All public water utilities in the US serving populations greater than 3,300 are required to undertaken both a vulnerability assessment and the development of an emergency response plan. This paper explains the initial steps of RAM-W{trademark} and then demonstrates how the security risk assessment is fundamental to the ERP. During the development of RAM-W{trademark}, Sandia performed several security risk assessments at large metropolitan water utilities. As part of the scope of that effort, ERPs at each utility were reviewed to determine how well they addressed significant vulnerabilities uncovered during the risk assessment. The ERP will contain responses to other events as well (e.g. natural disasters) but should address all major findings in the security risk assessment.« less

  15. 75 FR 23196 - Exchange Visitor Program-Secondary School Students

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    .... diplomatic and foreign policy goals by encouraging this positive academic and social interaction. Experience... currently requires a private vendor name and social security number check of all potential host family... check or the name and social security number criminal background check. NCMEC would interpret...

  16. 32 CFR 159.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Purpose. 159.1 Section 159.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.1 Purpose. This part establishes policy, assigns responsibilities and provides...

  17. Health and social security reforms in Latin America: the convergence of the World Health Organization, the World Bank, and transnational corporations.

    PubMed

    Armada, F; Muntaner, C; Navarro, V

    2001-01-01

    International financial institutions have played an increasing role in the formation of social policy in Latin American countries over the last two decades, particularly in health and pension programs. World Bank loans and their attached policy conditions have promoted several social security reforms within a neoliberal framework that privileges the role of the market in the provision of health and pensions. Moreover, by endorsing the privatization of health services in Latin America, the World Health Organization has converged with these policies. The privatization of social security has benefited international corporations that become partners with local business elites. Thus the World Health Organization, international financial institutions, and transnational corporations have converged in the neoliberal reforms of social security in Latin America. Overall, the process represents a mechanism of resource transfer from labor to capital and sheds light on one of the ways in which neoliberalism may affect the health of Latin American populations.

  18. National Security Technology Incubator Business Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less

  19. Future Warfare: Anthology Revised Edition

    DTIC Science & Technology

    2001-06-01

    film “ Saving Private Ryan ” are compelling and chilling. But the information age promises to make ground combat considerably less destructive that the...116 Saving Private Ryan , 80–81 Schwarzkopf, Norman, 242, 243–244 Science and technology, 191–202 Scipio, 44 Security beyond the year 2010, 128–131, 137... Private Ryan ” where the true horror of face-to-face ground combat is driven into the psyche of the movie goer. I am increasingly convinced, however

  20. 17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...

  1. 17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...

  2. 17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...

  3. 17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...

  4. 17 CFR 240.15d-16 - Reports of foreign private issuers on Form 6-K [17 CFR 249.306].

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... issuers on Form 6-K [17 CFR 249.306]. 240.15d-16 Section 240.15d-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K [17 CFR 249.306]. (a) Every foreign private issuer which is subject to Rule 15d-1 [17 CFR 240.15d-1] shall make reports on Form 6-K, except that this rule shall not apply to...

  5. Two management systems in a nursing private practice group.

    PubMed

    Zahourek, R P

    1979-09-01

    Entry into private practice can be rewarding for nurses who are willing to risk personal, financial, and professional security. Among the problems faced by the nurse in this new role is the administration of the practice, since few, if any, adequate models exist. This article describes the struggle of nurses in one private nursing practice, Creative Health Services, to meet their needs for individual freedom within an organization that is regulated sufficiently to maintain its viability.

  6. The U.S. Army Reserve’s Private Public Partnership (P3) Program in Support of the Combatant Commander’s Security Cooperation Activities and the Readiness Opportunities for the U.S. Army Reserve

    DTIC Science & Technology

    2016-06-10

    reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership Program (P3). This...opportunities for the reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership...21 National Strategic Direction

  7. Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm

    NASA Astrophysics Data System (ADS)

    Kota, Sujatha; Padmanabhuni, Venkata Nageswara Rao; Budda, Kishor; K, Sruthi

    2018-05-01

    Elliptic Curve Cryptography (ECC) uses two keys private key and public key and is considered as a public key cryptographic algorithm that is used for both authentication of a person and confidentiality of data. Either one of the keys is used in encryption and other in decryption depending on usage. Private key is used in encryption by the user and public key is used to identify user in the case of authentication. Similarly, the sender encrypts with the private key and the public key is used to decrypt the message in case of confidentiality. Choosing the private key is always an issue in all public key Cryptographic Algorithms such as RSA, ECC. If tiny values are chosen in random the security of the complete algorithm becomes an issue. Since the Public key is computed based on the Private Key, if they are not chosen optimally they generate infinity values. The proposed Modified Elliptic Curve Cryptography uses selection in either of the choices; the first option is by using Particle Swarm Optimization and the second option is by using Cuckoo Search Algorithm for randomly choosing the values. The proposed algorithms are developed and tested using sample database and both are found to be secured and reliable. The test results prove that the private key is chosen optimally not repetitive or tiny and the computations in public key will not reach infinity.

  8. Comparing the performance of the public, social security and private health subsystems in Argentina by core dimensions of primary health care.

    PubMed

    Yavich, Natalia; Báscolo, Ernesto Pablo; Haggerty, Jeannie

    2016-06-01

    Most Latin American health systems are comprised of public (PubS), social security (SSS) and private (PrS) subsystems. These subsystems coexist, causing health care fragmentation and population segmentation. To estimate the extent of subsystem cross-coverage in a geographically bounded population (Rosario city) and to compare the subsystems' performance on primary health care (PHC) dimensions. Through a cross-sectional, interviewer-administered survey to a representative sample (n = 822) of the Rosario population, we measured the percentage of cross-coverage (people with usual source of care in one subsystem but also covered by another subsystem) and the health services' performance by core PHC dimensions, as reported by each subsystem's usual users. We compared the subsystems' performance using chi-square analysis and one-way analysis of variance testing. We analyzed whether the observed differences were coherent with the predominant institutional and organizational features of each subsystem. Overall, 39.3% of the population was affiliated with the PubS, 44.8% with the SSS and 15.9% with the PrS. Cross-coverage was reported by 40.6% of respondents. The performance of the PubS was weak on accessibility but strong on person-and-community-oriented care, the opposite of the PrS. The SSS combined the strengths of the other two subsystems. Rosario's health system has a high percentage of cross-coverage, contributing to issues of fragmentation, segmentation, financial inequity and inefficiency. The overall performance of the SSS was better than that of the PrS and PubS, though each subsystem had a particular performance pattern with areas of strength and weakness that were consistent with their institutional and organizational profiles. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. A Survey of Private Ohio Academic Libraries' Physical Processing Practices for Circulating Books.

    ERIC Educational Resources Information Center

    Factor, Olivia Spaid

    Little guidance is given in today's general technical services or cataloging textbooks to assist librarians in making decisions on procedures for the physical preparation of materials prior to placement on the shelves for public access. As small, private academic libraries face automation of circulation, addition of security systems, and debates…

  10. 7 CFR 1744.30 - Automatic lien accommodations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...

  11. 7 CFR 1744.30 - Automatic lien accommodations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...

  12. 7 CFR 1744.30 - Automatic lien accommodations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...

  13. Environmental Assessment: Military Housing Privatization Initiative, Los Angeles Air Force Base, California

    DTIC Science & Technology

    2006-11-01

    and 1648: demolition of Facility 451 (currently used as gym and Teen Center) that is adjacent to but not part of the privatization land lease...of the batteries and their relationship to the base end stations. (This marker is in place.) • The structure will be secured to prevent vandalism

  14. 21 CFR 1301.76 - Other security controls for practitioners.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...

  15. 21 CFR 1301.76 - Other security controls for practitioners.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...

  16. 21 CFR 1301.76 - Other security controls for practitioners.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...

  17. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...

  18. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...

  19. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...

  20. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...

  1. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...

  2. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  3. [Relations between official and private veterinary services in epidemiology and the control of contagious diseases].

    PubMed

    Moura, J A; Bedoya, M; Agudelo, M P

    2004-04-01

    Growing budget restrictions in many countries have meant that official Veterinary Services cannot assume responsibility for any new activities. The natural reaction is to turn to private veterinary services to provide the support needed to strengthen the control and surveillance of priority diseases and thereby support the development of the livestock sector and the establishment of safe international trade. In this context, official Veterinary Services must work together with private veterinarians, delegating various technical animal health activities, so that they may focus their efforts on those tasks that cannot be delegated: standardisation, control, auditing, general system co-ordination, epidemiological surveillance, etc., as well as organising veterinary policy in order to make best use of budget resources. For these relations to be efficient, a dynamic, two-way epidemiological information mechanism must be created, whereby private veterinarians periodically keep governments informed, on the basis of an agreed methodology. Moreover, the official Veterinary Services must systematically transmit information on List A and B diseases of the OIE (World organisation for animal health), and perform detailed analyses of epidemiologically significant events. The article proposes the establishment of relations between public and private veterinary services as a way in which to provide the livestock sector with the health and hygiene conditions that are necessary for effective disease control, which in turn provides greater security for international trade and increased consumer protection.

  4. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  5. Long-term care over an uncertain future: what can current retirees expect?

    PubMed

    Kemper, Peter; Komisar, Harriet L; Alecxih, Lisa

    The leading edge of the baby boom generation is nearing retirement and facing uncertainty about its need for long-term care (LTC). Using a microsimulation model, this analysis projected that people currently turning age 65 will need LTC for three years on average. An important share of needed care will be covered by public programs and some private insurance, but much of the care will be an uninsured private responsibility of individuals and their families--a responsibility that will be distributed unequally. While over a third of those now turning 65 are projected to never receive family care, three out of 10 will rely on family care for more than two years. Similarly, half of people turning 65 will have no private out-of-pocket expenditures for LTC, while more than one in 20 are projected to spend $100,000 or more of their own money (in present discounted value). Policy debate that focuses only on income security and acute care--and the corresponding Social Security and Medicare programs--misses the third, largely private, risk that retirees face: that of needing LTC.

  6. Two Quantum Protocols for Oblivious Set-member Decision Problem

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-10-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.

  7. Two Quantum Protocols for Oblivious Set-member Decision Problem

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-01-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology. PMID:26514668

  8. Two Quantum Protocols for Oblivious Set-member Decision Problem.

    PubMed

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-10-30

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.

  9. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  10. Awaiting Cyber 9/11

    DTIC Science & Technology

    2013-01-01

    tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the

  11. Social Security and Saving: A Time-Series Econometrics Pedagogical Example (With "R" Code)

    ERIC Educational Resources Information Center

    Wassell, Charles S., Jr.

    2018-01-01

    In 1974, and then again in 1996, Martin Feldstein published studies of the impact of the Social Security system on private saving in the U.S. economy. He found that Social Security depressed personal saving by a substantial amount--up to 50 percent. The author uses the Feldstein data and empirical models in this article to illustrate the steps in…

  12. Private sector involvement in civil space remote sensing. Volume 1: Report

    NASA Technical Reports Server (NTRS)

    1979-01-01

    A survey of private sector developers, users, and interpreters of Earth resources data was conducted in an effort to encourage private investment and participation in remote sensing systems. Results indicate positive interest in participation beyond the current hardware contracting level, however, there is a substantial gap between current market levels and system costs. Issues identified include the selection process for an operating entity, the public/private interface, data collection and access policies, price and profit regulation in a subsidized system, international participation, and the responsibility for research and development. It was agreed that the cost, complexity, and security implications of integrated systems need not be an absolute bar to their private operation.

  13. Noisy processing and distillation of private quantum States.

    PubMed

    Renes, Joseph M; Smith, Graeme

    2007-01-12

    We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In addition to a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.

  14. Borrowing to save: a critique of recent proposals to partially privatize Social Security.

    PubMed

    Dattalo, Patrick

    2007-07-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs are more likely to be a problem than a solution. Paradoxically, PSAs require the government to borrow to encourage current workers to save. The author recommends resources to help social workers remain informed about proposed program reforms and prepared to advocate for the concept of social insurance.

  15. Quantum private query with perfect user privacy against a joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min

    2016-12-01

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.

  16. Evolutionary Aspects for Technology Policy: the Case of Galileo Public-Private Partnership

    NASA Astrophysics Data System (ADS)

    Zervos, Vasilis

    2002-01-01

    This paper examines the impact of strategic interactions on Private-Public Partnerships (PPPs) in space. Though there is substantial business and economics literature on PPPs, it is traditionally focused on the relationships within the partnerships (low level) and the respective factors affecting its success. The contribution of this paper is that it examines the political economy of PPPs, analysing how `high-level' strategic interactions across public-private sectors in Europe and the US determine their behaviour and success. Within this context, the European case of Galileo and other national space projects, such as the US plans for a space-based anti- missile defence, are each based on different types of PPPs, confined within the geographical borders of the two areas. The security and commercial benefits of such programmes for the respective space industries and economies have a direct impact on the other area's industry and sense of security. The paper shows that trans- Atlantic cooperation at public policy level is essential to allow the respective industries to explore the benefits of cross-border strategic research partnerships (SRPs). This will reduce the costs of the respective programmes, addressing security concerns.

  17. 32 CFR 159.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... policies related to personnel allowed to carry weapons for self defense. 2 Available at http://www.dtic.mil... 32 National Defense 1 2011-07-01 2011-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...

  18. 32 CFR 159.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... policies related to personnel allowed to carry weapons for self defense. 2 Available at http://www.dtic.mil... 32 National Defense 1 2010-07-01 2010-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...

  19. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  20. 76 FR 28964 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ...' Social Security Number (SSN).'' * * * * * Retrievability: Delete entry and replace with ``Name, date of... site--The eMarine system is a protected network that will employ data encryption, data masking, secure virtual private network (VPN) and DoD approved methods for safeguarding and ensuring compliance. The...

  1. Security Issues for Mobile Medical Imaging: A Primer.

    PubMed

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  2. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    NASA Astrophysics Data System (ADS)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.

  3. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  4. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erickson, Michael Charles

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  5. Public/Private Partnerships with Hazardous Material Motor Carriers: Creating Incentives to Increase Security through Assessed Risk (STAR)

    DTIC Science & Technology

    2008-12-01

    Program,” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /fast/ (accessed October 14, 2008). 73 U.S. Customs and Border Protection, “What Is...Customs-Trade Partnership against Terrorism (C- TPAT)?” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /what_ctpat/ (accessed October 14, 2008...cgov/trade/cargo_security/ ctpat / (accessed September 12, 2008). 69 1. National Park Service Historic Preservation Tax Incentives The U.S. government

  6. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    NASA Astrophysics Data System (ADS)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  7. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  8. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  9. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  10. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  11. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  12. Homeland security and the non-federal healthcare sector: evaluation of your incident command system (ICS).

    PubMed

    Blair, James D

    2005-01-01

    Healthcare and other private sector industries have lagged behind federal agencies in fulfilling their security readiness mission, according to the author. A comprehensive and timely resource is now available, he reports, to help healthcare officials in improving emergency response and preparedness.

  13. 32 CFR 159.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... weapons for self defense. 3 Available at http://www.dtic.mil/whs/directives/corres/pdf/302041p.pdf. PSC... 32 National Defense 1 2013-07-01 2013-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...

  14. 32 CFR 159.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... weapons for self defense. 3 Available at http://www.dtic.mil/whs/directives/corres/pdf/302041p.pdf. PSC... 32 National Defense 1 2012-07-01 2012-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...

  15. 32 CFR 159.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... weapons for self defense. 3 Available at http://www.dtic.mil/whs/directives/corres/pdf/302041p.pdf. PSC... 32 National Defense 1 2014-07-01 2014-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...

  16. Toward Explaining Earlier Retirement after 1970.

    ERIC Educational Resources Information Center

    Ippolito, Richard A.

    1990-01-01

    Rule changes in the social security system and pension plans suggest that labor force participation rates for men aged 55 to 64 fell by 20 percent from 1970 through 1986 because of the increase in social security benefits and a change in private pension rules encouraging earlier retirement. (Author/JOW)

  17. 17 CFR 230.155 - Integration of abandoned offerings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Integration of abandoned... GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.155 Integration of abandoned offerings... from integration of private and registered offerings. Because of the objectives of Rule 155 and the...

  18. The Dilemma of Covert Action

    DTIC Science & Technology

    1989-04-20

    Pentagon in any way.14 23 To the outside world, Duncan would retire from the Army and set up a "private" consulting firm, which he would call Business ... Security International, known simply as BSI. It would claim to specialize in assisting domestic firms seeking security for overseas operations. In

  19. 31 CFR 25.400 - Loan provisions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Loan provisions. 25.400 Section 25... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25...

  20. Convergence: Yea or Nay?

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…

  1. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... who carry concealed firearms. Categories of records in the system: Individual's name; Social Security..., private and public schools, daycare facilities, children's camps, and childcare transportation providers... activity regarding child pornography, the touching of a child for sexual gratification, or child abuse. N...

  2. 32 CFR 159.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Policy. 159.4 Section 159.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.4 Policy. (a) Consistent with the requirements of paragraph (a)(2) of section 862...

  3. Financial wellness awareness: A step closer to achieve Millennium Development Goals for Pakistan

    PubMed Central

    Rehman, Rehana; Katpar, Shahjahan; Khan, Rakhshaan; Hussain, Mehwish

    2015-01-01

    Objective: To explore financial wellness (FW) awareness amongst public and private sector medical college students of Karachi. Methods: A cross sectional questionnaire based survey was conducted on medical students from 3 public and 5 private sector medical colleges of Karachi from February 2011 to December 2011. All ethnic groups having age range of 18-23 years were included. A questionnaire tailored from wellness wheel evaluated the responses of FW on a four point Likert’s scale ranging from 0-3(never, sometimes, mostly, and always). Factor analysis explored common FW factors among both public and private sector medical college (MC) students. Results: Private MC Students were better in terms of making short and long terms financial goals compared to students in public sector. The students of public MC were more focused to make and restricting to given budgets (p=0.05). The FW element of keeping savings in bank account was responded more by private MC candidates (P < 0.0001) but was spent thrift as well (P < 0.0001). Factor analysis revealed two factors; ‘Financial Security Wellness’ which was better in Private MC Students (p=0.001) and ‘Care towards Expenses Wellness” in which results were not significant. Conclusion: Both groups of medical college students lacked FW awareness element in terms of caring towards financial expenses. The awareness of importance of financial security was practiced better by private MC students in terms of making short and long term financial goals and keeping savings in bank accounts. They were however deficient in the knowledge of making and restricting themselves to budgets. PMID:25878613

  4. Financial wellness awareness: A step closer to achieve Millennium Development Goals for Pakistan.

    PubMed

    Rehman, Rehana; Katpar, Shahjahan; Khan, Rakhshaan; Hussain, Mehwish

    2015-01-01

    To explore financial wellness (FW) awareness amongst public and private sector medical college students of Karachi. A cross sectional questionnaire based survey was conducted on medical students from 3 public and 5 private sector medical colleges of Karachi from February 2011 to December 2011. All ethnic groups having age range of 18-23 years were included. A questionnaire tailored from wellness wheel evaluated the responses of FW on a four point Likert's scale ranging from 0-3(never, sometimes, mostly, and always). Factor analysis explored common FW factors among both public and private sector medical college (MC) students. Private MC Students were better in terms of making short and long terms financial goals compared to students in public sector. The students of public MC were more focused to make and restricting to given budgets (p=0.05). The FW element of keeping savings in bank account was responded more by private MC candidates (P < 0.0001) but was spent thrift as well (P < 0.0001). Factor analysis revealed two factors; 'Financial Security Wellness' which was better in Private MC Students (p=0.001) and 'Care towards Expenses Wellness" in which results were not significant. Both groups of medical college students lacked FW awareness element in terms of caring towards financial expenses. The awareness of importance of financial security was practiced better by private MC students in terms of making short and long term financial goals and keeping savings in bank accounts. They were however deficient in the knowledge of making and restricting themselves to budgets.

  5. 78 FR 42125 - Self-Regulatory Organizations; The Options Clearing Corporation; Notice of Filing of an Advance...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... Connection With a Proposed Change to its Operations in the Form of a Private Offering by OCC of Senior... change its operations in the form of a private offering of senior unsecured debt securities (``Offering... would provide OCC with access to additional liquidity for working capital needs and general corporate...

  6. 77 FR 31682 - U.S. Department of State Advisory Committee on Private International Law (ACPIL)-Online Dispute...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-29

    ... International Law (ACPIL)--Online Dispute Resolution (ODR) Study Group The Office of Private International Law, Office of the Legal Adviser, Department of State hereby gives notice that the ACPIL Online Dispute... through May 25, 2012, and will specifically address security issues relating to use of the ODR rules...

  7. Joint Interagency Coordination Group - Cyber: Empowering the Combatant Commanders against the no-borders threat

    DTIC Science & Technology

    2009-05-04

    inconvenience and denial of Internet service, CNAs pose a threat to national security, if the right computer is hacked , to every day operations, if baking...expert J3: Current Operations Rep Private Sector/Civilian: cyber/CNA SME J5 Future Operations Rep Private Sector/Civilian: cyber/CND SME Table 2

  8. Threats to and Alternatives for Financing Social Security

    DTIC Science & Technology

    2003-12-01

    3) Raise the payroll tax rate. 15. NUMBER OF PAGES 57 14. SUBJECT TERMS Social Security, Privatization, Personal Accounts...Over the next 30 years, the retirement of the baby -boom generation will pose new challenges for the Social Security program, the federal government...Ref. #1, pg1-3) This background helps one consider how to prepare for the retirement of the baby -boom generation and beyond. The objectives of this

  9. Real-Time Speaker Detection for User-Device Binding

    DTIC Science & Technology

    2010-12-01

    31 xi THIS PAGE INTENTIONALLY LEFT BLANK xii CHAPTER 1: Introduction The roll-out of commercial wireless networks continues to rise worldwide...in a secured facility. It could also be connected to the call server via a Virtual Private Network (VPN) or public lines if security is not a top...communications network [25]. Yet, James Arden Barnett, Jr., Chief of the Public Safety and Homeland Security Bureau, argues that emergency communications

  10. The DNA Bank: High-Security Bank Accounts to Protect and Share Your Genetic Identity.

    PubMed

    den Dunnen, Johan T

    2015-07-01

    With the cost of genome sequencing decreasing every day, DNA information has the potential of affecting the lives of everyone. Surprisingly, an individual has little knowledge about his own DNA information, can rarely access it, and has hardly any control over its use. This may result in preventable, life-threatening situations, and also significantly inhibits scientific progress. What we urgently need is a "DNA bank," a resource providing a secure personal account where, similar to a financial institution, you can store your DNA sequence. Using this private and secure DNA bank account, you govern your sequence-related business. For any genetic study performed, the data generated must be transferred (paid) to your DNA account. Using your account, you regulate access, knowing for what purpose (informed consent) and only for the genetic data you are willing to share. The DNA account ensures you are in the driver's seat, know what is known, and control what is happening with it. © 2015 WILEY PERIODICALS, INC.

  11. Contracting-out in the United Kingdom: a partnership between social security and private pension plans.

    PubMed

    Daykin, Chris

    2002-01-01

    Contracting-out was introduced in the United Kingdom in 1978 as part of the arrangements for the State Earnings-Related Pension Scheme (SERPS) in order to avoid duplication with the existing well-developed defined benefit occupational pension plan sector. Members and sponsors of contracted-out schemes were able to save on their social security contributions in recognition of the fact that they were accruing equivalent benefits through an occupational pension plan. Later on this concept was extended to those with individual money purchase pension plans. This article considers a brief history of contracting-out, the principles of contracting-out, some problems associated with contracting-out, the implications of the introduction of stakeholder pensions and State Second Pension, and the latest rebate review and rebate orders. It examines how U.K. pensions policy since 1978 has been based on a partnership between social security and private pension plans.

  12. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  13. The conduct of practice-based research in community clinics compared to private practices: similarities, differences, and challenges

    PubMed Central

    Gillette, Jane; Cunha-Cruz, Joana; Gilbert, Ann; Speed-McIntyre, Pollene; Zhou, Lingmei; DeRouen, Timothy

    2013-01-01

    Practice-based research should be performed in all practice settings if the results are to be applied to all settings. However, some practice settings, such as community clinics, have unique features that may make the conduct of such research more challenging. The purpose of this article is to describe and compare the similarities and unique challenges related to conducting research in community clinics compared to private practices within the Northwest Practice-Based REsearch Collaborative in Evidence-Based DENTistry (PRECEDENT) network. Information was obtained from meetings with general dentists, a survey of general dentists (N = 253), and a clinical examination and record review of a systemic random sample of patients visiting community clinics and private practices. (N = 1903)—all part of a dental practice-based research network. The processes of conducting research, the dentist and patient sociodemographic characteristics, the prevalence of oral diseases, and the dental treatments received in community clinics and private practices were compared. Both community clinics and private practices have the clinical treatment of the patients as their priority and have time constraints on research. The processes of research training, obtaining informed consent, and collecting, transmitting, and securely maintaining research data are also similar. The patient populations and treatment needs differ substantially between community clinics and private practices, with a higher prevalence of dental caries and higher restorative treatment needs in the community clinic patients. The process of study participant selection and follow-up for research and the dentist and staff work arrangements also vary between the two practice settings. Although community clinic patients and their dental healthcare providers have different research needs and challenges than their counterparts in private practice, practice-based research can be successfully PMID:25429251

  14. The Turkish commercial health insurance industry.

    PubMed

    Kisa, A

    2001-08-01

    Turkey has experienced significant development in the private health insurance market since 1991. Improvements in private health services, increased public awareness, and insufficient service delivery by the social security organizations have encouraged more people to buy private health insurance. The number of people covered by private health insurance has reached 600,000, forming a $200 million market. The Turkish insurance industry is targeting 6-8 million insurance holders before the year 2005. This study examines the structure of the commercial health insurance industry of Turkey and gives the latest policy and legal changes made in the insurance market by the Turkish government to affect supply and demand.

  15. A new method for generating an invariant iris private key based on the fuzzy vault system.

    PubMed

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  16. Hospital managers' attitude and commitment toward electronic medical records system in Isfahan hospitals 2014.

    PubMed

    Jahanbakhsh, Maryam; Karimi, Saeed; Hassanzadeh, Akbar; Beigi, Maliheh

    2017-01-01

    Electronic medical record system (EMRS) is a valuable system for safe access to the patient's data and increases health care quality. Manpower is one of the requirements for EMRS, among which manager is the most important person in any hospital. Taking into account manager's positive attitude and good commitments, EMRS will be implemented successfully. As such, we decided to assess manager's attitude and commitment toward EMRS in Isfahan hospitals in the year of 2014. This article aimed to determine the hospital managers' attitude and commitment toward the implementation of EMRS. The present article is an applied analytic study. Research society consisted of the managers of all the hospitals in Isfahan that include hospitals affiliated to Isfahan University of Medical Sciences, private, and social security hospitals. This study was done in 2014. Data collection tools included a questionnaire for which reliability and validity were determined. Data were analyzed by means of SPSS 20. Average score for the managers' attitude toward EMRS in the city of Isfahan was 77.5 out of 100 and their average score for commitment was 74.7. Manager's attitude in social security hospitals was more positive than the private and governmental ones (83.3%). In addition, the amount of commitment by the managers in social security hospitals was higher than the same in private and governmental hospitals (86.6%). At present, managers' attitude and commitment in Isfahan hospitals toward EMRS are very high and social security hospitals show more readiness in this respect.

  17. Advanced fingerprint verification software

    NASA Astrophysics Data System (ADS)

    Baradarani, A.; Taylor, J. R. B.; Severin, F.; Maev, R. Gr.

    2016-05-01

    We have developed a fingerprint software package that can be used in a wide range of applications from law enforcement to public and private security systems, and to personal devices such as laptops, vehicles, and door- locks. The software and processing units are a unique implementation of new and sophisticated algorithms that compete with the current best systems in the world. Development of the software package has been in line with the third generation of our ultrasonic fingerprinting machine1. Solid and robust performance is achieved in the presence of misplaced and low quality fingerprints.

  18. Computer Security Incident Response Team Effectiveness: A Needs Assessment

    PubMed Central

    Van der Kleij, Rick; Kleinhuis, Geert; Young, Heather

    2017-01-01

    Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response. PMID:29312051

  19. Computer Security Incident Response Team Effectiveness: A Needs Assessment.

    PubMed

    Van der Kleij, Rick; Kleinhuis, Geert; Young, Heather

    2017-01-01

    Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response.

  20. Secure data sharing in public cloud

    NASA Astrophysics Data System (ADS)

    Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.

    2012-04-01

    Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.

  1. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  2. A discrete-time chaos synchronization system for electronic locking devices

    NASA Astrophysics Data System (ADS)

    Minero-Ramales, G.; López-Mancilla, D.; Castañeda, Carlos E.; Huerta Cuellar, G.; Chiu Z., R.; Hugo García López, J.; Jaimes Reátegui, R.; Villafaña Rauda, E.; Posadas-Castillo, C.

    2016-11-01

    This paper presents a novel electronic locking key based on discrete-time chaos synchronization. Two Chen chaos generators are synchronized using the Model-Matching Approach, from non-linear control theory, in order to perform the encryption/decryption of the signal to be transmitted. A model/transmitter system is designed, generating a key of chaotic pulses in discrete-time. A plant/receiver system uses the above mentioned key to unlock the mechanism. Two alternative schemes to transmit the private chaotic key are proposed. The first one utilizes two transmission channels. One channel is used to encrypt the chaotic key and the other is used to achieve output synchronization. The second alternative uses only one transmission channel for obtaining synchronization and encryption of the chaotic key. In both cases, the private chaotic key is encrypted again with chaos to solve secure communication-related problems. The results obtained via simulations contribute to enhance the electronic locking devices.

  3. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... assets consist solely of shares of one or more registered investment companies, that have the same... annual financial statements, as of a date not more than 16 months preceding the date of sale under the... securities holdings in its financial statements on the basis of their market value, and no current...

  4. Life after College: Retirement Security for Higher Ed Employees

    ERIC Educational Resources Information Center

    Purcell, James; McGill, Robin; Brodeur, Philip; Hall, Erin

    2016-01-01

    The relationship between employer and employee has changed significantly over the past 40 years. One of the greatest changes in this relationship is in the nature of employee retirement. While pension reform at public and private colleges has helped ensure institutional financial viability, retirement security for employees has declined. With the…

  5. The Port Security Grant Program: Good Enough, or Can it be Made Better

    DTIC Science & Technology

    2016-06-01

    Private Sector ...... 107  5.  Core Capabilities as PSGP Objectives Must Be Revised...Goals. Source: NIPP 2013, Transportation Sector SSP. ........................................................... 42  Figure 12.  Port State Control Grant...American Association of Port Authorities ACP Area Contingency Plan AIS Automated Identification System AMSC Area Maritime Security Committee AMSP

  6. The Retirement Security of the Baby Boom Generation.

    ERIC Educational Resources Information Center

    Shoven, John B.

    1995-01-01

    The baby boom generation faces added uncertainty on their investments and perhaps lower realized rates of return on all components of their retirement savings, primarily because of their large number. Effects will be felt in the Social Security system and by pension plans and private investors. Individuals, employers, pension fund managers, and…

  7. 43 CFR 19.7 - Private contributions and gifts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...

  8. 43 CFR 19.7 - Private contributions and gifts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...

  9. 43 CFR 19.7 - Private contributions and gifts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...

  10. 43 CFR 19.7 - Private contributions and gifts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...

  11. 43 CFR 19.7 - Private contributions and gifts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...

  12. 75 FR 38530 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...: Request for Employment Information; Use: Section 1837(i) of the Social Security Act provides for a special...) based on current employment status. This form is used by the Social Security Administration to obtain... Public: Private Sector: Business or other for-profits and Not-for-profit institutions; Number of...

  13. 20 CFR 411.115 - Definitions of terms used in this part.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ....115 Section 411.115 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...) The Act means the Social Security Act, as amended. (b) Commissioner means the Commissioner of Social... network or EN means a qualified public or private entity that has entered into an agreement with us to...

  14. 20 CFR 411.115 - Definitions of terms used in this part.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....115 Section 411.115 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...) The Act means the Social Security Act, as amended. (b) Commissioner means the Commissioner of Social... network or EN means a qualified public or private entity that has entered into an agreement with us to...

  15. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... entity that are consolidated with the entity in its financial statements prepared in accordance with... annual financial statements, as of a date not more than 16 months preceding the date of sale under the... securities holdings in its financial statements on the basis of their market value, and no current...

  16. 24 CFR 882.405 - Financing.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Financing. 882.405 Section 882.405... § 882.405 Financing. (a) Types. Any type of public or private financing may be utilized with the... Contract as security for financing. An Owner may pledge, or offer as security for any loan or obligation...

  17. Application Mail Tracking Using RSA Algorithm As Security Data and HOT-Fit a Model for Evaluation System

    NASA Astrophysics Data System (ADS)

    Permadi, Ginanjar Setyo; Adi, Kusworo; Gernowo, Rahmad

    2018-02-01

    RSA algorithm give security in the process of the sending of messages or data by using 2 key, namely private key and public key .In this research to ensure and assess directly systems are made have meet goals or desire using a comprehensive evaluation methods HOT-Fit system .The purpose of this research is to build a information system sending mail by applying methods of security RSA algorithm and to evaluate in uses the method HOT-Fit to produce a system corresponding in the faculty physics. Security RSA algorithm located at the difficulty of factoring number of large coiled factors prima, the results of the prime factors has to be done to obtain private key. HOT-Fit has three aspects assessment, in the aspect of technology judging from the system status, the quality of system and quality of service. In the aspect of human judging from the use of systems and satisfaction users while in the aspect of organization judging from the structure and environment. The results of give a tracking system sending message based on the evaluation acquired.

  18. Printable, scannable biometric templates for secure documents and materials

    NASA Astrophysics Data System (ADS)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  19. Preventing the cure from being worse than the disease: special issues in hospital outsourcing.

    PubMed

    Beardwood, John; Alleyne, Andrew

    2004-01-01

    Like private sector organizations, hospitals are increasingly outsourcing services from food/cafeteria and security and facilities maintenance to the consulting and training of personnel and information technology (IT) functions. Also like private sector organizations, while hospitals seek the cure that will improve services at less cost, without careful management, the cure can be worse than the disease.

  20. Afghanistan: U.S. Foreign Assistance

    DTIC Science & Technology

    2009-07-14

    private sector, through micro and small business loans and by promoting bank reform to ease establishment of private banks. The Treasury Department...national land registry, and micro and small business credit activities. Funding of administration and oversight of these programs amounted to $25 million...Summary The U.S. program of assistance to Afghanistan is intended to stabilize and strengthen the Afghan economic, social , political, and security

  1. Higher Education: Stronger Federal Oversight Needed to Enforce Ban on Incentive Payments to School Recruiters. Report to Congressional Committees. GAO-11-10

    ERIC Educational Resources Information Center

    Iritani, Katherine M.

    2010-01-01

    In 1992, Congress banned schools participating in federal student aid programs from paying commissions, bonuses, or other financial incentives to individuals based on their success in enrolling students or securing their financial aid. The ban applies to all postsecondary schools, including private for-profit, public, and private nonprofit…

  2. Transnational tobacco company influence on tax policy during privatization of a state monopoly: British American Tobacco and Uzbekistan.

    PubMed

    Gilmore, Anna; Collin, Jeff; Townsend, Joy

    2007-11-01

    The International Monetary Fund encourages privatization of state-owned tobacco industries. Privatization tends to lower cigarette prices, which encourages consumption. This could be countered with effective tax policies. We explored how investment by British American Tobacco (BAT) influenced tax policy in Uzbekistan during privatization there. We obtained internal documents from BAT and analyzed them using a hermeneutic process to create a chronology of events. BAT thoroughly redesigned the tobacco taxation system in Uzbekistan. It secured (1) a reduction of approximately 50% in the excise tax on cigarettes, (2) an excise system to benefit its brands and disadvantage those of its competitors (particularly Philip Morris), and (3) a tax stamp system from which it hoped to be exempted, because this would likely facilitate its established practice of cigarette smuggling and further its competitive advantage.. Privatization can endanger effective tobacco excise policies. The International Monetary Fund should review its approach to privatization and differentiate the privatization of an industry whose product kills from privatization of other industries.

  3. An assessment of the cyber security legislation and its impact on the United States electrical sector

    NASA Astrophysics Data System (ADS)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  4. ERISA failures and the erosion of workers' rights: the urgent need to protect private & public workers' pension and benefits.

    PubMed

    Allen, James P; Bales, Richard A

    On March 11, 2011, Governor Scott Walker of Wisconsin signed into law a bill that eliminated most collective bargaining rights for the state's public-sector workers. Many other cash-strapped states followed Wisconsin's lead and introduced or enacted similar restraints on the rights of their workers. Thousands of public workers, whose only means of protecting their rights rested in their ability to collectively bargain, suddenly found their retirement benefits in jeopardy. This truth highlighted the lack of protections for public worker benefits similar to those of the private sector. However, the Employee Retirement Income Security Act, enacted for that purpose, has failed to secure these benefits. This article seeks to provide a broad overview of the crisis facing the pension and benefits system in the United States and offers some possible solutions. More importantly, the goal is to spur discourse on the urgent need to protect the benefits of all workers, public and private.

  5. The insurance industry and public-private collaborations as a vector to develop and spread EO technologies and techniques in the domain of Food Security: The Swiss Re case.

    NASA Astrophysics Data System (ADS)

    Coutu, S.; Ragaz, M.; Mäder, D.; Hammer, P.; Andriesse, M.; Güttinger, U.; Feyen, H.

    2017-12-01

    The insurance industry has been contributing to the resilient development of agriculture in multiple regions of the globe since the beginning of the 19th Century. It also has from the very beginning of the development of EO Sciences, kept a very close eye on the development of technologies and techniques in this domain. Recent advances in this area such as increased satellite imagery resolution, faster computation time and Big Data management combined with the ground-based knowledge from the insurance industry have offered farmers not only tools permitting better crop management, but also reliable and live yield coverage. This study presents several of these applications at different scales (industrial farming and micro-farming) and in different climate regions, with an emphasis on the limit of current products. Some of these limits such as lack of access of to ground data, R&D efforts or understanding of ground needs could be quickly overcome through closer public-private or private-private collaborations. However, despite a clear benefit for the Food Security nexus and potential win-win situations, those collaborations are not always simple to develop. We present here successful but also disappointing collaboration cases based on the Swiss Re experience, as a global insurance leader. As a conclusion, we highlight how academia, NGOs, governmental organization, start-ups and the insurance industry can get together to foster the development of EO in the domain of Food Security, and bring cutting-edge science to game changing industrial applications.

  6. A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools

    DTIC Science & Technology

    2015-07-14

    computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network

  7. Composite Bloom Filters for Secure Record Linkage.

    PubMed

    Durham, Elizabeth Ashley; Kantarcioglu, Murat; Xue, Yuan; Toth, Csaba; Kuzu, Mehmet; Malin, Bradley

    2014-12-01

    The process of record linkage seeks to integrate instances that correspond to the same entity. Record linkage has traditionally been performed through the comparison of identifying field values ( e.g., Surname ), however, when databases are maintained by disparate organizations, the disclosure of such information can breach the privacy of the corresponding individuals. Various private record linkage (PRL) methods have been developed to obscure such identifiers, but they vary widely in their ability to balance competing goals of accuracy, efficiency and security. The tokenization and hashing of field values into Bloom filters (BF) enables greater linkage accuracy and efficiency than other PRL methods, but the encodings may be compromised through frequency-based cryptanalysis. Our objective is to adapt a BF encoding technique to mitigate such attacks with minimal sacrifices in accuracy and efficiency. To accomplish these goals, we introduce a statistically-informed method to generate BF encodings that integrate bits from multiple fields, the frequencies of which are provably associated with a minimum number of fields. Our method enables a user-specified tradeoff between security and accuracy. We compare our encoding method with other techniques using a public dataset of voter registration records and demonstrate that the increases in security come with only minor losses to accuracy.

  8. Composite Bloom Filters for Secure Record Linkage

    PubMed Central

    Durham, Elizabeth Ashley; Kantarcioglu, Murat; Xue, Yuan; Toth, Csaba; Kuzu, Mehmet; Malin, Bradley

    2014-01-01

    The process of record linkage seeks to integrate instances that correspond to the same entity. Record linkage has traditionally been performed through the comparison of identifying field values (e.g., Surname), however, when databases are maintained by disparate organizations, the disclosure of such information can breach the privacy of the corresponding individuals. Various private record linkage (PRL) methods have been developed to obscure such identifiers, but they vary widely in their ability to balance competing goals of accuracy, efficiency and security. The tokenization and hashing of field values into Bloom filters (BF) enables greater linkage accuracy and efficiency than other PRL methods, but the encodings may be compromised through frequency-based cryptanalysis. Our objective is to adapt a BF encoding technique to mitigate such attacks with minimal sacrifices in accuracy and efficiency. To accomplish these goals, we introduce a statistically-informed method to generate BF encodings that integrate bits from multiple fields, the frequencies of which are provably associated with a minimum number of fields. Our method enables a user-specified tradeoff between security and accuracy. We compare our encoding method with other techniques using a public dataset of voter registration records and demonstrate that the increases in security come with only minor losses to accuracy. PMID:25530689

  9. Personal Retirement Accounts and Saving†

    PubMed Central

    Aguila, Emma

    2017-01-01

    Aging populations are leading countries worldwide to social security reforms. Many countries are moving from pay-as-you-go to personal retirement account (PRA) systems because of their financial sustainability and positive impact on private savings. PRA systems boost private savings at a macro level by converting a government liability into financial wealth managed by private fund managers. However, at a micro level, changes in retirement wealth affect individuals' saving and consumption patterns through their working lives. Retirement wealth increased for lower-income workers after Mexico introduced PRAs, crowding out saving, increasing consumption, and offsetting some of the PRA effect on private savings. (JEL D14, E21, H55, J26, O16) PMID:28286607

  10. Resilient and Robust High Performance Computing Platforms for Scientific Computing Integrity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jin, Yier

    As technology advances, computer systems are subject to increasingly sophisticated cyber-attacks that compromise both their security and integrity. High performance computing platforms used in commercial and scientific applications involving sensitive, or even classified data, are frequently targeted by powerful adversaries. This situation is made worse by a lack of fundamental security solutions that both perform efficiently and are effective at preventing threats. Current security solutions fail to address the threat landscape and ensure the integrity of sensitive data. As challenges rise, both private and public sectors will require robust technologies to protect its computing infrastructure. The research outcomes from thismore » project try to address all these challenges. For example, we present LAZARUS, a novel technique to harden kernel Address Space Layout Randomization (KASLR) against paging-based side-channel attacks. In particular, our scheme allows for fine-grained protection of the virtual memory mappings that implement the randomization. We demonstrate the effectiveness of our approach by hardening a recent Linux kernel with LAZARUS, mitigating all of the previously presented side-channel attacks on KASLR. Our extensive evaluation shows that LAZARUS incurs only 0.943% overhead for standard benchmarks, and is therefore highly practical. We also introduced HA2lloc, a hardware-assisted allocator that is capable of leveraging an extended memory management unit to detect memory errors in the heap. We also perform testing using HA2lloc in a simulation environment and find that the approach is capable of preventing common memory vulnerabilities.« less

  11. What's the P in PPP?

    NASA Astrophysics Data System (ADS)

    Heikkila, T.; Lall, U.

    2011-12-01

    Public, Private, Partnership, Participatory, Polycentric, Poor, Perfect, Purveyor, Planner, Positive, Plural, Practical, Political, Process, Pervasive, Phase, Physical, Passive, Progressive, Paradigm? As the world stands at the crossroads of a water scarcity crisis, many wonder whether the "well developed" central planner paradigm of water resources planning, management, investment and regulation that emerged in the last century has served us well. The negative impacts of centralized projects and their management are routinely decried. Service metrics of publicly managed systems continue to deteriorate as the ability to recover operational and maintenance costs continue to be weak. The political processes that portend to protect the access of the disadvantaged are said to contribute to the poor performance of the systems, especially for the disadvantaged. The institutionalization of "well formed" policies that prove inflexible in an environment where supply, demand and societal goals change calls for adaptive management. Stakeholder driven participatory processes and public private partnerships are touted as potential paradigms for progressive solutions that span the political domain and could help achieve positive water balance recognizing the dimensions of supply and demand at local or regional scales. This talk presents a proposed framework that postulates the prospective roles that different actors could play to provide an effective and practical strategy for securing water resources while promoting active allocation strategies, improving access and reliability while promoting profitability for private operators, including progressive farmers who given their usage patterns can make the most prolific contribution to water security. We label this the many P Paradigm. To develop this framework, we draw initial insights from the literature on participatory and decentralized watershed governance. We then apply findings from field experiments on water management reforms in India and Brazil to extend this literature and demonstrate the benefits of the framework to scholars and practitioners alike.

  12. Why Does Unemployment Hurt the Employed? Evidence from the Life Satisfaction Gap between the Public and the Private Sector

    ERIC Educational Resources Information Center

    Luechinger, Simon; Meier, Stephan; Stutzer, Alois

    2010-01-01

    High unemployment rates entail substantial costs to the working population in terms of reduced subjective well-being. This paper studies the importance of individual economic security, in particular job security, by exploiting sector-specific institutional differences in the exposure to economic shocks. Public servants have stricter dismissal…

  13. Counterfeit Compliance with the HIPAA Security Rule: A Study of Information System Success

    ERIC Educational Resources Information Center

    Johnson, James R.

    2013-01-01

    The intent of the security standards adopted by the Department of Health and Human Services (DHS) implementing some of the requirements of the Administrative Simplification (AS) subtitle of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was to improve Federal and private health care programs and to improve the…

  14. 78 FR 23811 - Privacy Act of 1974; Proposed New Routine Uses and System of Records Alterations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-22

    ..., and local law enforcement agencies and private security contractors to protect the safety of SSA... respect to activities that affect such safety and security, or activities that disrupt the operation of.... B. To Federal, State, and Local Law Enforcement To Protect the Safety of SSA Employees and Customers...

  15. 78 FR 21393 - Notice of Submission of Proposed Information Collection to OMB Ginnie Mae Multiclass Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ..., allowing the private sector to combine and restructure cash flows from Ginnie Mae Single Class MBS into... program, Ginnie Mae guarantees, with the full faith and credit of the United States, the timely payment of... combine and restructure cash flows from Ginnie Mae Single Class MBS into securities that meet unique...

  16. A Preliminary Economic Evaluation of Marine Corps Acquisition Practices: UHF Satellite Communication Ground Terminal Acquisitions

    DTIC Science & Technology

    1989-03-01

    34 Replace outdated teletypewriter/printer technology with the four AN/ UGC - 74’s; " Upgrade communication security (COMSEC) equipment to retain...unbiased information. In fact, the private user recognizes that good marketing techniques are required to receive favorable consideration for a private...developed in accounting, finance, economics, marketing , political science, sociology, and organizational behavior literature. "[The principal-agent

  17. 17 CFR 275.203(b)(3)-2 - Methods for counting clients in certain private funds.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Methods for counting clients....203(b)(3)-2 Methods for counting clients in certain private funds. (a) For purposes of section 203(b)(3) of the Act (15 U.S.C. 80b-3(b)(3)), you must count as clients the shareholders, limited partners...

  18. 17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... this chapter. (b) Such reports shall be transmitted promptly after the information required by Form 6-K is made public by the issuer, by the country of its domicile or under the laws of which it was... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports of foreign private...

  19. Three Essays on Terrorism, its Relationship with Natural Disasters, and its Effect on Female Labor Force Participation

    DTIC Science & Technology

    2011-09-01

    civilian, non- government organizations, private citizens and property, religious figures and institutions, tourists , transportation, and utilities...media, maritime – civilian, non- government organizations, private citizens and property, religious figures and institutions, tourists , transportation... government . A society vests much of its security within its government ?s ability to protect; thus, the effectiveness and efficiency of disaster preparedness

  20. Natural gas projects in the developing world: An empirical evaluation of merits, obstacles, and risks

    NASA Astrophysics Data System (ADS)

    Mor, Amit

    Significant amounts of natural gas have been discovered in developing countries throughout the years during the course of oil exploration. The vast majority of these resources have not been utilized. Some developing countries may benefit from a carefully planned utilization of their indigenous resources, which can either be exported or used domestically to substitute imported or exportable fuels or feedstock. Governments, potential private sector investors, and financiers have been searching for strategies to promote natural gas schemes, some of which have been in the pipeline for more than two decades. The purpose of this thesis is to identify the crucial factors determining the success or failure of launching natural gas projects in the developing world. The methodology used to evaluate these questions included: (1) establishing a representative sample of natural gas projects in developing countries that were either implemented or failed to materialize during the 1980-1995 period, (2) utilizing a Probit limited dependent variable econometric model in which the explained variable is project success or failure, and (3) choosing representing indicators to reflect the assumed factors affecting project success. The study identified two conditions for project success: (1) the economic viability of the project and (2) securing financing for the investment. The factors that explain the ability or inability of the sponsors to secure financing were: (1) the volume of investment that represented the large capital costs of gas transportation, distribution, and storage, (2) the level of foreign exchange constraint in the host country, and (3) the level of development of the country. The conditions for private sector participation in natural gas projects in developing countries were identified in the study by a Probit model in which the explained variable was private sector participation. The results showed that a critical condition for private sector participation is the financial profitability of a project. Other factors that explained private sector participation and the ability of the private-sector sponsor to secure financing for a project were: (1) the political risk associated with the project, (2) the foreign exchange constraint associated with the project, and (3) whether the project was domestic or export-oriented.

  1. Development of protected endorsement for online banking using mobile phones

    NASA Astrophysics Data System (ADS)

    Narayana, Galla; Venkateswarlu, Tammineni; Kumar, G. S. P.; Padmavathamma, Mokkala; Sreekanth, G.; Delhibabu, K.; Prasad, A. R.

    2013-03-01

    Securing Online Banking transactions for customer is the primary goal of financial institutions that provides Internet banking facility. Mobile phones play an important role in our society as more and more functions having been integrated within mobile phones, such as Internet browsing, mobile banking, and shopping. Mobiles phones can be used to secure ATM card pins by sending to the customer directly rather than in emails or by other means which has a possibility of hacking. In this paper we have proposed method of generating a Private Key Security Token by bank authentication servers which uses IMSI registers and IMEI number of client's mobile registered. The key is generated by implementing RIPE MD160 and Hex Encode Algorithm. Token received is valid only for that client mobile only and can be generated upon request by customer dynamically. The client is given a PIN and a Master Key when registered to the Online Banking Services. If in case a client's mobile is lost, authentication is done using Unique Master Key, else the Private Key Token is used there by making transactions secured and simple without the need of carrying any USB Tokens. The additional functionality provides the client more security on their transactions. Due to this Phishing attacks by the hackers is avoided.

  2. Secret weapon: the "new" Medicare as a route to health security.

    PubMed

    Schlesinger, Mark; Hacker, Jacob S

    2007-04-01

    Over the past twenty years, Medicare has been transformed from a single-payer insurer into a hybrid of complementary public and private insurance arrangements. Despite creating ongoing controversy, these changes have resulted in an ironic and largely overlooked strategic potential: Medicare's evolving hybrid form makes it the most promising vehicle for overcoming the historical obstacles to universal health insurance in the United States. To make this surprising case, we first explore the distinctive political dynamics of programs that, like today's Medicare, are hybrids of public and private arrangements. We then consider how these political dynamics might circumvent past barriers to universal health insurance. Finally, we discuss the strengths and weaknesses of alternative pathways through which Medicare could be expanded to promote health security.

  3. Hospital managers’ attitude and commitment toward electronic medical records system in Isfahan hospitals 2014

    PubMed Central

    Jahanbakhsh, Maryam; Karimi, Saeed; Hassanzadeh, Akbar; Beigi, Maliheh

    2017-01-01

    INTRODUCTION: Electronic medical record system (EMRS) is a valuable system for safe access to the patient's data and increases health care quality. Manpower is one of the requirements for EMRS, among which manager is the most important person in any hospital. Taking into account manager's positive attitude and good commitments, EMRS will be implemented successfully. As such, we decided to assess manager's attitude and commitment toward EMRS in Isfahan hospitals in the year of 2014. AIM: This article aimed to determine the hospital managers’ attitude and commitment toward the implementation of EMRS. MATERIALS AND METHODS: The present article is an applied analytic study. Research society consisted of the managers of all the hospitals in Isfahan that include hospitals affiliated to Isfahan University of Medical Sciences, private, and social security hospitals. This study was done in 2014. Data collection tools included a questionnaire for which reliability and validity were determined. Data were analyzed by means of SPSS 20. RESULTS: Average score for the managers’ attitude toward EMRS in the city of Isfahan was 77.5 out of 100 and their average score for commitment was 74.7. Manager's attitude in social security hospitals was more positive than the private and governmental ones (83.3%). In addition, the amount of commitment by the managers in social security hospitals was higher than the same in private and governmental hospitals (86.6%). CONCLUSION: At present, managers’ attitude and commitment in Isfahan hospitals toward EMRS are very high and social security hospitals show more readiness in this respect. PMID:28584837

  4. Vietnam: expanding the social security system.

    PubMed

    Pruzin, D

    1996-01-01

    Viet Nam's shift toward a market-oriented economy has been associated with annual gross domestic product growth of more than 8% over the past 5 years. At the same time, the emergence of private-sector enterprises and subsequent closure of many state-run enterprises have had profound implications for Viet Nam's social protection systems. At present, only 5.6 million of the country's 33 million workers are covered under the state-run social insurance system. In 1995, the government moved to include private enterprises with 10 or more employees in its state benefits system. The International Labor Organization (ILO) has been working with the Vietnamese Government to design and implement a social security system that would extend coverage progressively to excluded sectors and provide support to workers who have become unemployed as a result of the economic transition process. At its Eighth National Congress, the Vietnamese Communist Party approved a 5-year social and economic plan calling for such an expansion of the social insurance system as well as for a guaranteed standard of living for pensioners. To facilitate anticipated changes, activities that were previously divided between the Ministry of Labor, Invalids, and Social Affairs and the Vietnam General Confederation of Labor have been assigned to the newly formed Vietnam Social Insurance (VSI) Organization. Under consideration is a plan to combine some VSI activities with those of the Vietnam Health Insurance Organization. The ILO will assist with training, computerization, and social security fund investing. Noncompliance is a major obstacle to planned expansion of the social security system; about 90% of private firms are still not paying into the system.

  5. Generating unique IDs from patient identification data using security models.

    PubMed

    Mohammed, Emad A; Slack, Jonathan C; Naugler, Christopher T

    2016-01-01

    The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  6. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  7. The FBI is Leading the Way by Making the Private Sector an Integral Part of the Counterterrorism Homeland Security Enterprise

    DTIC Science & Technology

    2012-09-01

    Pentagon, U.S. National Parks and Monuments and Reagan National Airport. Amidst the PCC sits Pentagon City Mall, home to more than 170 stores, a movie...integrated into the homeland security apparatus. As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the...Advisor Dan Moran, PhD Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This thesis

  8. [Financing, organization, costs and services performance of the Argentinean health sub-systems.

    PubMed

    Yavich, Natalia; Báscolo, Ernesto Pablo; Haggerty, Jeannie

    2016-01-01

    To analyze the relationship between health system financing and services organization models with costs and health services performance in each of Rosario's health sub-systems. The financing and organization models were characterized using secondary data. Costs were calculated using the WHO/SHA methodology. Healthcare quality was measured by a household survey (n=822). Public subsystem:Vertically integrated funding and primary healthcare as a leading strategy to provide services produced low costs and individual-oriented healthcare but with weak accessibility conditions and comprehensiveness. Private subsystem: Contractual integration and weak regulatory and coordination mechanisms produced effects opposed to those of the public sub-system. Social security: Contractual integration and strong regulatory and coordination mechanisms contributed to intermediate costs and overall high performance. Each subsystem financing and services organization model had a strong and heterogeneous influence on costs and health services performance.

  9. The study and implementation of the wireless network data security model

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  10. Securing services in the cloud: an investigation of the threats and the mitigations

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  11. Transnational Tobacco Company Influence on Tax Policy During Privatization of a State Monopoly: British American Tobacco and Uzbekistan

    PubMed Central

    Gilmore, Anna; Collin, Jeff; Townsend, Joy

    2007-01-01

    Objectives. The International Monetary Fund encourages privatization of state-owned tobacco industries. Privatization tends to lower cigarette prices, which encourages consumption. This could be countered with effective tax policies. We explored how investment by British American Tobacco (BAT) influenced tax policy in Uzbekistan during privatization there. Methods. We obtained internal documents from BAT and analyzed them using a hermeneutic process to create a chronology of events. Results. BAT thoroughly redesigned the tobacco taxation system in Uzbekistan. It secured (1) a reduction of approximately 50% in the excise tax on cigarettes, (2) an excise system to benefit its brands and disadvantage those of its competitors (particularly Philip Morris), and (3) a tax stamp system from which it hoped to be exempted, because this would likely facilitate its established practice of cigarette smuggling and further its competitive advantage.. Conclusions. Privatization can endanger effective tobacco excise policies. The International Monetary Fund should review its approach to privatization and differentiate the privatization of an industry whose product kills from privatization of other industries. PMID:17138915

  12. Securing the State through the Production of "Global" Citizens: Analyzing Neo-Liberal Educational Reforms in Jordan and the USA

    ERIC Educational Resources Information Center

    Hantzopoulos, Maria; Shirazi, Roozbeh

    2014-01-01

    From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…

  13. 17 CFR 240.15d-19 - Reports by shell companies on Form 20-F.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.15d-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...

  14. 17 CFR 240.13a-19 - Reports by shell companies on Form 20-F.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.13a-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...

  15. 17 CFR 240.15d-19 - Reports by shell companies on Form 20-F.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.15d-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...

  16. 17 CFR 240.13a-19 - Reports by shell companies on Form 20-F.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.13a-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...

  17. Program Oversight of Contractors on the Battlefield

    DTIC Science & Technology

    2011-03-23

    contractor to another. For example, under Blackwater Security Firm‟s contract for private security services in Iraq, the contract paid workers guarding...subcontracting relationship with Blackwater . 38 The Coalition Provisional Authority (CPA) provided less than adequate control for approximately $8.8...the Army‟s LOGCAP, the Navy ‟s Construction Capabilities Contract Program, and the Air Force‟s Contract Augmentation Program. These programs remain

  18. Qualitative Case Study Exploring Operational Barriers Impeding Small and Private, Nonprofit Higher Education Institutions from Implementing Information Security Controls

    ERIC Educational Resources Information Center

    Liesen, Joseph J.

    2017-01-01

    The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…

  19. The Combatant Commander and Effective Operational HUMINT: Lessons From the Double Cross System of World War II and the CJ2X of Operation Joint Guard

    DTIC Science & Technology

    2003-05-19

    www.bbc.co.uk/cgi-bin/history/renderplain.pl?file=history/war/wwtwo/spying/sis_0/> [27 March 2003]. 37 Ibid. 38 “Operation Overlord,” Saving Private Ryan Online...Security, (Washington, DC: 2002), 17; National Strategy for Combating Terrorism. Washington, DC: 2003. “Operation Overlord,” Saving Private Ryan Online

  20. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  1. Privately Contracted Military Firms in the Twenty-First Century: Reclassifying, Redefining, and Reforming the Way We Fight

    DTIC Science & Technology

    2012-06-01

    52 2. Blackwater and Nisour Square.........................................................53 V. RECOGNITION VS. EFFECTIVE DEMOCRATIC...in a theater of war. He has worked extensively with various Privately Contracted Military Firms including but not limited to, Blackwater , DynCorp...Furthermore, the U.S. needed rapid security capabilities seemingly beyond the reach of the U.S. armed forces. Companies such as the former Blackwater

  2. Building the Bridge from War to Peace: Defining Interagency Roles in Rebuilding a Nation

    DTIC Science & Technology

    2009-11-01

    Politics of Strategic Assessment. Princeton: Princeton UP, 2008. (JF 195 .B76 2008) Carafano, James Jay. Private Sector , Public Wars: Contractors in... Private Security Companies in Iraq." Third World Quarterly 26.4-5 (June 2005): 777-96. Erdmann, Martin, Ambassador. "A Comprehensive Approach to Modern... Sectoral Comparisons. Washington: World Bank, Conflict Prevention & Reconstruction, Environmentally and Socially Sustainable Development Network, 2005

  3. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains

    NASA Astrophysics Data System (ADS)

    Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao

    2017-11-01

    A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.

  4. Practical quantum private query with better performance in resisting joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei

    2016-04-01

    As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.

  5. Stakeholder perceptions of a total market approach to family planning in Nicaragua.

    PubMed

    Drake, Jennifer Kidwell; Espinoza, Henry; Suraratdecha, Chutima; Lacayo, Yann; Keith, Bonnie M; Vail, Janet G

    2011-05-01

    To assess private-sector stakeholders' and donors' perceptions of a total market approach (TMA) to family planning in Nicaragua in the context of decreased funding; to build evidence for potential strategies and mechanisms for TMA implementation (including public-private partnerships (PPPs)); and to identify information gaps and future priorities for related research and advocacy. A descriptive exploratory study was conducted in various locations in Nicaragua from March to April 2010. A total of 24 key private-sector stakeholders and donors were interviewed and their responses analyzed using two questionnaires and a stakeholder analysis tool (PolicyMakerTM software). All survey participants supported a TMA, and public-private collaboration, in family planning in Nicaragua. Based on the survey responses, opportunities for further developing PPPs for family planning include building on and expanding existing governmental frameworks, such as Nicaragua's current coordination mechanism for contraceptive security. Obstacles include the lack of ongoing government engagement with the commercial (for-profit) sector and confusion about regulations for its involvement in family planning. Strategies for strengthening existing PPPs include establishing a coordination mechanism specifically for the commercial sector and collecting and disseminating evidence supporting public-private collaboration in family planning. There was no formal or absolute opposition to a TMA or PPPs in family planning in Nicaragua among a group of diverse nongovernmental stakeholders and donors. This type of study can help identify strategies to mobilize existing and potential advocates in achieving articulated policy goals, including diversification of funding sources for family planning to achieve contraceptive security.

  6. 40 CFR 280.105 - Local government financial test.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., employee benefits and compensation, office management, planning and zoning, capital projects, interest... agency funds, private trust funds, accounts receivable, value of real property, and other non-security...

  7. 40 CFR 280.105 - Local government financial test.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., employee benefits and compensation, office management, planning and zoning, capital projects, interest... agency funds, private trust funds, accounts receivable, value of real property, and other non-security...

  8. 40 CFR 280.105 - Local government financial test.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., employee benefits and compensation, office management, planning and zoning, capital projects, interest... agency funds, private trust funds, accounts receivable, value of real property, and other non-security...

  9. 7 CFR 1944.516 - Grant purposes.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... administrative costs such as workers' compensation, liability insurance, audit reports, travel to and attendance...'s share of Social Security and health benefits. Payments to private retirement funds are prohibited...

  10. 7 CFR 1944.516 - Grant purposes.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... administrative costs such as workers' compensation, liability insurance, audit reports, travel to and attendance...'s share of Social Security and health benefits. Payments to private retirement funds are prohibited...

  11. Enterprise systems security management: a framework for breakthrough protection

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2010-04-01

    Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.

  12. Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions

    NASA Astrophysics Data System (ADS)

    Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert

    The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.

  13. Home Modifications

    MedlinePlus

    ... income and ability to pay. Public and private financing options may also be available. Sources of support ... Learn more by visiting https://www.ncoa.org/economic-security/home-equity/ . Search for additional resources in ...

  14. 78 FR 57456 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-18

    ... collection. Title: Information Regarding Request for Refund of Social Security Tax Erroneously Withheld on..., and, if applicable, consent to an electronic funds withdrawal. Affected Public: Private Sector...

  15. Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning

    2013-06-01

    A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.

  16. High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis

    PubMed Central

    Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E.; Tkachenko, Valery; Torcivia-Rodriguez, John; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja

    2016-01-01

    The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure. The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu PMID:26989153

  17. High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis.

    PubMed

    Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E; Tkachenko, Valery; Torcivia-Rodriguez, John; Voskanian, Alin; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja

    2016-01-01

    The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure.The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu. © The Author(s) 2016. Published by Oxford University Press.

  18. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2016-05-01

    Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.

  19. Day, night and all-weather security surveillance automation synergy from combining two powerful technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Morellas, Vassilios; Johnson, Andrew; Johnston, Chris

    2006-07-01

    Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff andmore » landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)« less

  20. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation.

    PubMed

    Yigzaw, Kassaye Yitbarek; Michalas, Antonis; Bellika, Johan Gustav

    2017-01-03

    Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N - 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.

Top