48 CFR 252.225-7039 - Contractors performing private security functions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... by Contractors performing private security functions; (A) All armored vehicles, helicopters, and... private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System... security functions. As prescribed in 225.370-6, insert the following clause: CONTRACTORS PERFORMING PRIVATE...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
...] RIN 9000-AM20 Federal Acquisition Regulation; Contractors Performing Private Security Functions...-181). Section 862, entitled ``Contractors Performing Private Security Functions in Areas of Combat...), as amended, entitled ``Contractors Performing Private Security Functions in Areas of Combat...
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... new information collection requirement concerning Contractors Performing Private Security Functions... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions Outside...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-23
... Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the United.... 110-181, enacted January 28, 2008), section 862, entitled ``Contractors Performing Private Security... NDAA required standardization of rules for private security contractors that are performing in...
Code of Federal Regulations, 2011 CFR
2011-10-01
... private security functions; (A) All armored vehicles, helicopters, and other military vehicles must be... personnel performing private security functions in designated areas are addressed in Department of Defense... performance of private security functions or other supplies or services. (c) DoD requires contractors...
Code of Federal Regulations, 2013 CFR
2013-10-01
... personnel performing private security functions in designated areas are addressed in Department of Defense... contract is for the performance of private security functions or other supplies or services. (c) DoD... of the contractor who are responsible for performing private security functions comply with orders...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-19
... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security..., entitled ``Contractors Performing Private Security Functions in Areas of Combat Operations or Other... of DoD and other Governmental private security contractors. A clause to cover the interagency...
Code of Federal Regulations, 2014 CFR
2014-10-01
... performing private security functions in designated areas are addressed at 32 CFR part 159, entitled “Private... for weapons; registering and identifying armored vehicles, helicopters, and other military vehicles; and reporting specified incidents in which personnel performing private security functions under a...
48 CFR 25.302-3 - Applicability.
Code of Federal Regulations, 2013 CFR
2013-10-01
... functions as a primary deliverable or the provision of private security functions is ancillary to the stated... entered into on a non-DoD contract for the performance of private security functions by individual... the Secretary of State. (b) Non-DoD agencies: This section applies to acquisitions by non-DoD agencies...
48 CFR 25.302-3 - Applicability.
Code of Federal Regulations, 2014 CFR
2014-10-01
... functions as a primary deliverable or the provision of private security functions is ancillary to the stated... entered into on a non-DoD contract for the performance of private security functions by individual... the Secretary of State. (b) Non-DoD agencies: This section applies to acquisitions by non-DoD agencies...
77 FR 65393 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... evolution of NS/EP functions by or through the NPSBN. The Secure Government Communications Scoping Subcommittee is charged with examining how commercial-off-the-shelf technologies and private sector best...
Secure key storage and distribution
Agrawal, Punit
2015-06-02
This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
2010-06-22
Congress has generally accepted the concept of using unarmed contractors to carry out support functions in military operations, such as providing food and...countries where stability generally is not an issue. 3 According to one report, “Not since the 17th century has there been such a reliance on private...Institution has estimated that citizens of some 30 countries have worked as security contractors in Iraq.6 PSC employees are generally divided by
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas
2015-12-01
Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD.
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
2012-12-14
maintain order and to deliver minimum essential public services; 3) The private sector to ensure the orderly functioning of the economy and the...the private sector’s capability to ensure the orderly functioning of the economy and delivery of essential services 5 Have a negative effect on the... economy through the cascading disruption of other critical infrastructure and key resources 6 Undermine the public’s morale and confidence in our
Preventing the cure from being worse than the disease: special issues in hospital outsourcing.
Beardwood, John; Alleyne, Andrew
2004-01-01
Like private sector organizations, hospitals are increasingly outsourcing services from food/cafeteria and security and facilities maintenance to the consulting and training of personnel and information technology (IT) functions. Also like private sector organizations, while hospitals seek the cure that will improve services at less cost, without careful management, the cure can be worse than the disease.
32 CFR 159.2 - Applicability and scope.
Code of Federal Regulations, 2010 CFR
2010-07-01
... CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.2 Applicability and scope. This part: (a) Applies to: (1... PSCs and PSC personnel performing private security functions during contingency operations outside the...
48 CFR 252.225-7039 - Contractors performing private security functions.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., Tagging, Labeling, and Marking of Government-Furnished Property, and physically marked in accordance with... countermeasures (other than the discharge of a weapon, including laser optical distracters, acoustic hailing...
48 CFR 252.225-7039 - Contractors performing private security functions.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., Tagging, Labeling, and Marking of Government-Furnished Property, and physically marked in accordance with... countermeasures (other than the discharge of a weapon, including laser optical distracters, acoustic hailing...
[The health system of Venezuela].
Bonvecchio, Anabelle; Becerril-Montekio, Victor; Carriedo-Lutzenkirchen, Angela; Landaeta-Jiménez, Maritza
2011-01-01
This paper describes the Venezuelan health system, including its structure and coverage, financial sources, human and material resources and its stewardship functions. This system comprises a public and a private sector. The public sector includes the Ministry of Popular Power for Health (MS) and several social security institutions, salient among them the Venezuelan Institute for Social Security (IVSS). The MH is financed with federal, state and county contributions. The IVSS is financed with employer, employee and government contributions. These two agencies provide services in their own facilities. The private sector includes providers offering services on an out-of-pocket basis and private insurance companies. The Venezuelan health system is undergoing a process of reform since the adoption of the 1999 Constitution which calls for the establishment of a national public health system. The reform process is now headed by the Barrio Adentro program.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-04-01
This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less
6 CFR 11.7 - Private collection agencies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management Service...
Key Generation for Fast Inversion of the Paillier Encryption Function
NASA Astrophysics Data System (ADS)
Hirano, Takato; Tanaka, Keisuke
We study fast inversion of the Paillier encryption function. Especially, we focus only on key generation, and do not modify the Paillier encryption function. We propose three key generation algorithms based on the speeding-up techniques for the RSA encryption function. By using our algorithms, the size of the private CRT exponent is half of that of Paillier-CRT. The first algorithm employs the extended Euclidean algorithm. The second algorithm employs factoring algorithms, and can construct the private CRT exponent with low Hamming weight. The third algorithm is a variant of the second one, and has some advantage such as compression of the private CRT exponent and no requirement for factoring algorithms. We also propose the settings of the parameters for these algorithms and analyze the security of the Paillier encryption function by these algorithms against known attacks. Finally, we give experimental results of our algorithms.
Development of protected endorsement for online banking using mobile phones
NASA Astrophysics Data System (ADS)
Narayana, Galla; Venkateswarlu, Tammineni; Kumar, G. S. P.; Padmavathamma, Mokkala; Sreekanth, G.; Delhibabu, K.; Prasad, A. R.
2013-03-01
Securing Online Banking transactions for customer is the primary goal of financial institutions that provides Internet banking facility. Mobile phones play an important role in our society as more and more functions having been integrated within mobile phones, such as Internet browsing, mobile banking, and shopping. Mobiles phones can be used to secure ATM card pins by sending to the customer directly rather than in emails or by other means which has a possibility of hacking. In this paper we have proposed method of generating a Private Key Security Token by bank authentication servers which uses IMSI registers and IMEI number of client's mobile registered. The key is generated by implementing RIPE MD160 and Hex Encode Algorithm. Token received is valid only for that client mobile only and can be generated upon request by customer dynamically. The client is given a PIN and a Master Key when registered to the Online Banking Services. If in case a client's mobile is lost, authentication is done using Unique Master Key, else the Private Key Token is used there by making transactions secured and simple without the need of carrying any USB Tokens. The additional functionality provides the client more security on their transactions. Due to this Phishing attacks by the hackers is avoided.
Private Military and Security Companies - Counterinsurgency and Nation Building Strategy
2013-04-25
cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From -‐ To) September 2012 - April 2013 4. TITLE AND SUBTITLE Private Military and Security Companies - Counterinsurgency and
Addressing cargo security with strategies involving private sector.
DOT National Transportation Integrated Search
2008-12-01
The public and private sectors contributing to goods movement agree that cargo security has : not been addressed nearly as much as physical and vessel security. Addressing cargo security : will require additional operational data that is not currentl...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security... Contractors (DoDI 3020.50) was revised on August 1, 2011, and the final rule to implement section 862 of the NDAA for FY 2008, as amended, 32 CFR part 159, Private Security Contractors Operating in Contingency...
UCSC Xena | Informatics Technology for Cancer Research (ITCR)
UCSC Xena securely analyzes and visualizes your private functional genomics data set in the context of public and shared genomic/phenotypic data sets such as TCGA, ICGC, TARGET, GTEx, and GA4GH (TOIL).
17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1014) Fairness of the going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES...
Integrating QoS and security functions in an IP-VPN gateway
NASA Astrophysics Data System (ADS)
Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy
2001-10-01
IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.
Code of Federal Regulations, 2010 CFR
2010-07-01
... LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25... Private Loan Portion or any Derivative to the extent that the Private Loan or the respective Private Loan...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Solis, John Hector
In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
Yu, Jianping; Zhang, Peng; Wang, Shulan
2015-01-01
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes. PMID:25873989
A fingerprint encryption scheme based on irreversible function and secure authentication.
Yang, Yijun; Yu, Jianping; Zhang, Peng; Wang, Shulan
2015-01-01
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.
Medicare privatization and the erosion of retirement security.
Polivka, Larry; Kwak, Jung
2008-01-01
This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2010 CFR
2010-04-01
... time that proceeds are used for a private business use. Payments for a use of proceeds include payments... business use (for example, a facility that is the subject of a management contract that results in private... time that property is used by a private business user. (6) Allocation of security among issues. In...
Quantum And Relativistic Protocols For Secure Multi-Party Computation
NASA Astrophysics Data System (ADS)
Colbeck, Roger
2009-11-01
After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. In the second part variable bias coin tossing is introduced. This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss. It is shown that this can be achieved with unconditional security for a specified range of biases, and with cheat-evident security for any bias. We also discuss two further protocols which are conjectured to be unconditionally secure for any bias. The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a general model for such computations, and show that, within this model, a wide range of functions are impossible to compute securely. We give explicit cheating attacks for such functions. In the final chapter we discuss the task of expanding a private random string, while dropping the usual assumption that the protocol's user trusts her devices. Instead we assume that all quantum devices are supplied by an arbitrarily malicious adversary. We give two protocols that we conjecture securely perform this task. The first allows a private random string to be expanded by a finite amount, while the second generates an arbitrarily large expansion of such a string.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...
Securely Measuring the Overlap between Private Datasets with Cryptosets
Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon
2015-01-01
Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898
A novel quantum solution to secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun
2018-06-01
Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2014 CFR
2014-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2013 CFR
2013-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Analyzing and Specifying Reusable Security Requirements
2003-09-01
avionics applications and ecommerce applications need to specify levels of identification, authentication, authorization, integrity, privacy , etc. At...sections specifying functional requirements. Thus, the functional requirements for an embedded avionics application and an ecommerce website may have... Privacy (a.k.a., confidentiality), which is the degree to which sensitive data and communications are kept private from unauthorized individuals and
Firmware Modification Analysis in Programmable Logic Controllers
2014-03-27
security and operational requirements [18, 19]. Money is a factor for the DOD but not a driving one. With private industry, money is a primary influential... functions in the original firmware. A proof-of-concept experiment demonstrates the functionality of the analysis tool using different firmware versions...Opcode Difference Comparison . . . . . . . . . . . . . . 37 3.1.2.3 Function Difference Comparison . . . . . . . . . . . . . 37 3.1.2.4 Call Graph
The relationships between public and private pension schemes: an introductory overview.
Horlick, M
1987-07-01
Only recently have social insurance and private pensions, collectively, come to be thought of in terms of a total social security benefit package. The economic problems brought on by the 1974 oil crisis initially triggered consideration of a common, integrated role for the two systems. The second oil crisis reinforced the relative expansion in private pension programs, as a supplement to social security. Before these events, private and public pension programs interacted in only a limited number of ways, confined to relatively few countries. These interactions were largely confined to collective bargaining, whereby private pensions were gradually extended to nearly all employees in France and Sweden; mandating, or legally requiring private supplementation of social security, debated in several countries in the early 1970's, but postponed by the 1974 oil crisis; and contracting out, or covering a part of the social security benefit under a private plan, as in the United Kingdom. Overall, the tradition of private pensions was not very strong or broadbased. The current debate centers on which public/private pension mix is desirable from the point of view of an old-age income-maintenance program. A new element is the rising support for a "third pillar"--individual tax-encouraged savings--not only as a supplement, but as an alternative to social insurance.
76 FR 62100 - Approval of Filing Fees for Exempt Reporting Advisers and Private Fund Advisers
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-06
... fund assets, combined liquidity fund and registered money market fund assets or private equity fund... Fees for Exempt Reporting Advisers and Private Fund Advisers AGENCY: Securities and Exchange Commission... fund advisers filing Form PF. SUMMARY: The Securities and Exchange Commission (``Commission'') is...
75 FR 66822 - Study on Extraterritorial Private Rights of Action
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-29
... Extraterritorial Private Rights of Action AGENCY: Securities and Exchange Commission. ACTION: Request for Comments... and thereafter conduct a study to determine the extent to which private rights of action under the... United States to bring actions under Section 10(b) in cases involving transnational securities fraud...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-02-01
This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less
76 FR 19376 - Statement of Organizations, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-07
... safety mission. These outside groups include academic organizations, private organizations, and other Federal Agencies. 3. Coordinates the access to large databases for pharmacoepidemiologic and..., procedures, training, and security or databases available to OSE. 3. Acts as focal point for all hardware...
Between security and military identities: The case of Israeli security experts.
Grassiani, Erella
2018-02-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.
Between security and military identities: The case of Israeli security experts
Grassiani, Erella
2018-01-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228
Assessing Security of Supply: Three Methods Used in Finland
NASA Astrophysics Data System (ADS)
Sivonen, Hannu
Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.
A global trend: privatization and reform of social security pension plans.
Poortvliet, W G; Laine, T P
1995-01-01
Ten years ago Chile successfully privatized its social security system, beginning a worldwide trend to solve the problem of an increasing burden on government-supported social security programs. Contributing factors include an aging population, fewer workers to support retirees, government budget deficits and the influence of politics.
Secure multiparty computation of a comparison problem.
Liu, Xin; Li, Shundong; Liu, Jian; Chen, Xiubo; Xu, Gang
2016-01-01
Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions.
The Use of Private Security by the United Kingdom and the Subsequent Impacts on Operational Planning
2014-05-22
2003 and 2008.4 The UK and US dominate the global market for private military companies.5 Therefore, scholarly research on the UK should help explain...provide a certain military skill applicable to the conduct of warfare. Deborah Avant, in her 2005 work The Market for Force : The Consequences of...International Security," International Security 26, no. 3 (Winter 2001-2002): 186. 14Deborah D. Avant, The Market for Force : The Consequences of Privatizing
Public-Private Collaboration in the Department of Defense
2012-07-01
In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.
15 CFR 742.15 - Encryption items.
Code of Federal Regulations, 2011 CFR
2011-01-01
... information of the public and private sector is protected. Consistent with our international obligations as a... information, and thereby may be used by persons abroad to harm U.S. national security, foreign policy and law... encryption hardware, are controlled because of this functional capacity to encrypt information, and not...
The Social Security Program and the Private Sector Alternative: Lessons from History.
ERIC Educational Resources Information Center
Quadagno, Jill
1987-01-01
Used historical evidence to analyze how private sector benefits worked in the past in light of the debate surrounding the Social Security benefits and the federal deficit. Among conclusions reached are that the private sector failed to provide adequate protection for older citizens, and that benefits were inequitably distributed on basis of gender…
Private Security Training. Phase 1: Basic. Instructor Edition.
ERIC Educational Resources Information Center
Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.
This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…
Distributed generation of shared RSA keys in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Liu, Yi-Liang; Huang, Qin; Shen, Ying
2005-12-01
Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.
Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.
Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru
2016-01-01
The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.
2013-09-01
SECURITY COMPANIES Huseyin Yigit Captain, Turkish Army B.S., Kara Harp Okulu, 2003 Submitted in partial fulfillment of the requirements for the...Collective Security Practice ............................................................. 34 C. PEACEKEEPING...involvement in intrastate conflicts is inevitable and will be so. Furthermore, though UN attempts aim to restore peace, military force requirement is
Comparing replacement rates under private and federal retirement systems.
Martin, Patricia P
One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners (100 percent) high earners (160 percent), and maximum earners (earnings at the taxable maximum amount). Overall, this analysis found that: Excluding Social Security benefits and TSP and defined contribution annuities, CSRS retirees have a higher pre-retirement salary replacement rate than either FERS or private-sector retirees. Private-sector retirees, however, have higher replacement rate than their FERS counterparts. Including Social Security benefits but not TSP and defined contribution plan annuities, CSRS retirees who are maximum earners have a higher pre-retirement salary replacement rate (despite receiving no Social Security benefits) than FERS retirees with the same earnings. Private-sector retirees in all earnings categories have a higher replacement rate than federal retirees with the same earnings. Including Social Security and TSP and defined contribution plan annuities, private-sector retirees in all earnings categories have a higher replacement rate than federal retirees, but their rate is close to that of FERS retirees. The rate is higher for FERS retirees than for CSRS retirees in all earnings categories. This analysis shows that replacement creates could exceed 100 percent for FERS employees who contribute who contribute 6 percent of earnings to the TSP over full working career. Private-sector replacement rates were quite similar for those with both a defined benefit and a defined contribution pension plan. Social Security replacement rates make up the highest proportion of benefits for th private sector's lowest income quartile group. The replacement rate for 401(k) plans and the TSP account for a higher proportion of benefits than does Social Security for all other income groups, assuming the absence of a defined benefit plan.
NASA Astrophysics Data System (ADS)
Sui, Liansheng; Liu, Benqing; Wang, Qiang; Li, Ye; Liang, Junli
2015-12-01
A color image encryption scheme is proposed based on Yang-Gu mixture amplitude-phase retrieval algorithm and two-coupled logistic map in gyrator transform domain. First, the color plaintext image is decomposed into red, green and blue components, which are scrambled individually by three random sequences generated by using the two-dimensional Sine logistic modulation map. Second, each scrambled component is encrypted into a real-valued function with stationary white noise distribution in the iterative amplitude-phase retrieval process in the gyrator transform domain, and then three obtained functions are considered as red, green and blue channels to form the color ciphertext image. Obviously, the ciphertext image is real-valued function and more convenient for storing and transmitting. In the encryption and decryption processes, the chaotic random phase mask generated based on logistic map is employed as the phase key, which means that only the initial values are used as private key and the cryptosystem has high convenience on key management. Meanwhile, the security of the cryptosystem is enhanced greatly because of high sensitivity of the private keys. Simulation results are presented to prove the security and robustness of the proposed scheme.
[The health system of Argentina].
Belló, Mariana; Becerril-Montekio, Victor M
2011-01-01
This paper describes the health system of Argentina.This system has three sectors: public, social security and private.The public sector includes the national and provincial ministries as well as the network of public hospitals and primary health care units which provide care to the poor and uninsured population. This sector is financed with taxes and payments made by social security beneficiaries that use public health care facilities. The social security sector or Obras Sociales (OS) covers all workers of the formal economy and their families. Most OS operate through contracts with private providers and are financed with payroll contributions of employers and employees. Finally, the private sector includes all those private providers offering services to individuals, OS beneficiaries and all those with private health insurance.This sector also includes private insurance agencies called Prepaid Medicine Enterprises, financed mostly through premiums paid by families and/or employers.This paper also discusses some of the recent innovations implemented in Argentina, including the program Remediar.
Practical private database queries based on a quantum-key-distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph
2011-02-15
Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
Quantum solution to a class of two-party private summation problems
NASA Astrophysics Data System (ADS)
Shi, Run-Hua; Zhang, Shun
2017-09-01
In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.
ERIC Educational Resources Information Center
Baker, Bruce; Miron, Gary
2015-01-01
This research brief details some of the prominent ways that individuals, companies, and organizations secure financial gain and generate profit by controlling and running charter schools. To illustrate how charter school policy functions to promote privatization and profiteering, the authors explore differences between charter schools and…
How to Keep Your Health Information Private and Secure
... permanently. When Using Mobile Devices · Research mobile apps – software programs that perform one or more specific functions – before you download and install any of them. Be sure to use known app websites or trusted sources. · Read the terms of service and the privacy notice of the mobile app ...
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
Private health insurance in South Korea: an international comparison.
Shin, Jaeun
2012-11-01
The goal of this study is to present the historical and policy background of the expansion of private health insurance in South Korea in the context of the National Health Insurance (NHI) system, and to provide empirical evidence on whether the increased role of private health insurance may counterbalance government financing, social security contributions, out-of-pocket payments, and help stabilize total health care spending. Using OECD Health Data 2011, we used a fixed effects model estimation. In this model, we allow error terms to be serially correlated over time in order to capture the association of private health insurance financing with three other components of health care financing and total health care spending. The descriptive observation of the South Korean health care financing shows that social security contributions are relatively limited in South Korea, implying that high out-of-pocket payments may be alleviated through the enhancement of NHI benefit coverage and an increase in social security contributions. Estimation results confirm that private health insurance financing is unlikely to reduce government spending on health care and social security contributions. We find evidence that out-of-pocket payments may be offset by private health insurance financing, but to a limited degree. Private health insurance financing is found to have a statistically significant positive association with total spending on health care. This indicates that the duplicated coverage effect on service demand may cancel out the potential efficiency gain from market initiatives driven by the active involvement of private health insurance. This study finds little evidence for the benefit of private insurance initiatives in coping with the fiscal challenges of the South Korean NHI program. Further studies on the managerial interplay among public and private insurers and on behavioral responses of providers and patients to a given structure of private-public financing are warranted to formulate the adequate balance between private health insurance and publicly funded universal coverage. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
A novel quantum scheme for secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun
2017-12-01
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
Homeland Security and the Private Sector : a CBO Paper
2004-12-01
private sector and the nation as a whole that would underlie the expected costs of terrorist attacks and, hence, the broader benefits of security. This paper focuses on those industries for which the expected human and economic losses from a terrorist attack would be highest -- the country’s critical infrastructure. The analysis more narrowly focuses on those industries that reside largely in the private sector and for which an attack could lead to a direct loss of life. The paper also reviews the incentives for private actions to limit
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
NASA Astrophysics Data System (ADS)
Itoh, Masanao
This article aims to explain the role and function of the faculty archives affiliated with the faculty of economics, the University of Tokyo, which preserves corporate and private documents and records of importance as historical materials received from various corporations and individuals and makes them available to the researcher and public, and then to explain how and why we have hold the original documents and records of Yamaichi Securities Company which had failed in 1997.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654
Comment on "Secure quantum private information retrieval using phase-encoded queries"
NASA Astrophysics Data System (ADS)
Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun
2016-12-01
In this Comment, we reexamine the security of phase-encoded quantum private query (QPQ). We find that the current phase-encoded QPQ protocols, including their applications, are vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database. Furthermore, we discuss how to overcome this security loophole and present an improved cheat-sensitive QPQ protocol without losing the good features of the original protocol.
A rhythm-based authentication scheme for smart media devices.
Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.
A Rhythm-Based Authentication Scheme for Smart Media Devices
Lee, Jae Dong; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743
31 CFR 25.402 - Transferability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25.402 Transferability. Each Private Loan Note, with the Guaranty attached, shall be fully and freely...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records....m. to 12:00 noon. ADDRESSES: National Archives and Records Administration, 700 Pennsylvania Avenue...
Young physicians and the Finnish welfare state.
Saarinen, Arttu
2009-01-01
This article aims to focus on how young physicians in general and different subpopulations, in particular, see the role of the welfare state. The author seeks to compare young physicians' opinions with those of older physicians, a similar age group in the general population and all physicians. A random sample was picked from the Finnish Medical Association register (n = 1,092). Data were analysed using descriptive statistics and multinomial logistic regression analysis. Results show that young physicians--when compared with an overall population of the same age, with physicians overall, or with older physicians--are more critical of the degree of social security currently offered. Young physicians also want to give more responsibility to the private sector than do older physicians. On the other hand, young physicians are not very critical of healthcare system functionality. All in all, young physicians' opinions about the welfare state are not particularly radical. Results indicate that physicians' opinions about the welfare state will not change dramatically in the near future. Views on social security, healthcare system functionality and the role of the private sector correlate best with political orientation. There are some studies about physicians' attitudes towards the welfare state, but the opinions of young physicians have not been studied in countries with large social security systems. The paper addresses this gap because it is important to study young physicians' opinions because future services will be structured on them.
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
Social Security: A Present Value Analysis of Old Age Survivors Insurance (OASI) Taxes and Benefits.
1995-12-01
private sector plans and provides a spreadsheet model for making this comparison of plans using different assumptions. The investigation was done by collecting data from various books, Government publications, and various Government agencies to conduct a spreadsheet analysis of three different wage-earning groups, assuming various real interest rates potentially earned in the private sector . A comparison of Social Security with alternative private sector plans is important to the DoD/DoN because less constrained budgets could
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security
NASA Astrophysics Data System (ADS)
Choudhury, Debesh
2016-04-01
We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.
Private Security Contractors: A Way of Combating Piracy in the Horn of Africa
2014-05-22
September 2011. 79Financial Action Task Force, “Financial Action Task Force Annual Report, 2010-2011,” FATF /OECD, 2011, 10. 80Andrew J. Shapiro...Report, 2010-2011.” FATF /OECD. Paris, 2011. Fox News. “Private Security Firms Join Battle Against Somali Pirates,” October 26, 2008. http
2011-05-13
running amok and armed Americans 45 Paul Richter , “Audit: U.S. Funds Went to Taliban, Subcontractors on... Anna Mulrine and Keith Whitelaw, “Private Security Contractors Face Incoming Political Fire,” U.S. News & World Report, October 15, 2007. 51 Charlie
Private Security Contractors: The Other Force
2011-03-22
improving PSC oversight. This paper will not address private contractors conducting Police force training , governmental use of PSCs outside of Iraq...theater entry requirements, conduct mandatory training , conduct weapons training and qualification and conduct security verification and criminal...an effective oversight program including contractor deployment tracking, limited contract oversight personnel, and untrained Contract Officer
31 CFR 25.405 - Form of guaranty.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25.405 Form of guaranty. (a) The Guaranty that will be attached to the Private Loan Note on the Closing...
17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Currency for financial statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... General Instructions As to Financial Statements § 210.3-20 Currency for financial statements of foreign...
The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex
ERIC Educational Resources Information Center
Greenberg, David F.; Roush, Jeffrey B.
2009-01-01
Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
...] Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or Other..., ``Contractor Personnel Authorized to Accompany the U.S. Armed Forces,'' which provides guidance for all DoD contractors operating in contingency operations. This Rule was published as an Interim Final Rule on July 17...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Evaluation of Assessment Methodology to Support Combined Joint Task Force-Horn of Africa
2012-07-01
average annual income ……………………………………… Value function for unemployment ……………………………………………… Health score value function...internal relations is economic stability. While government and security sectors play a vital role...Page 5 Figure 1.4 Systemigram for african relations Ability to Move People & Goods Rapidly Private Sector Capital Mgmt., Investment
Retirement Trends and Public Policy: The Carrot and the Stick.
ERIC Educational Resources Information Center
Quinn, Joseph F.; Burkhauser, Richard V.
Recent trends toward earlier retirement have exacerbated the financial problems facing the Social Security system and many other public and private pension plans. The massive commitment of public and private funds to Social Security and pension funds is partly responsible for the trend to early retirement. This, in fact, was one of the early goals…
2011-07-29
SPECIAL INSPE CTOR GENE RAL FOR IRAQ RECONSTRUCTION 400 Army Navy Drive • Arlington, Virginia 22202 July 29, 2011 LETTER FOR...11-019) In September 2007, Blackwater , Inc., a private security contractor (PSC) under contract with the Department of State (DoS), was involved in
31 CFR 306.85 - Private corporations and unincorporated associations (including nominees).
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Private corporations and... Organizations § 306.85 Private corporations and unincorporated associations (including nominees). Securities registered in the name of, or assigned to, an unincorporated association, or a private corporation in its own...
75 FR 80082 - State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
..., Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight... State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC). The SLTPS-PAC will..., Tribal, and Private Sector Entities, as specified in Executive Order 13549 and its implementing directive...
The neoliberal political economy and erosion of retirement security.
Polivka, Larry; Luo, Baozhen
2015-04-01
The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the private...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
Safe and Secure Services Based on NGN
NASA Astrophysics Data System (ADS)
Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito
Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.
2008-06-13
USE PRIVATE SECURITY CONTRACTORS TO PROTECT U.S. DIPLOMATS 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 6. AUTHOR( S ...Special Agent Derek Dela-Cruz 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College...
Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security
ERIC Educational Resources Information Center
Dattalo, Patrick
2007-01-01
Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…
Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles
2016-04-01
extraordinarily significant (Office of the Press Secretary, 2015). The White House added that cybersecurity is a shared responsibility between the...cannot, nor would Americans want it to, provide cybersecurity for every private network. Therefore, the private sector plays a crucial role in our... Cybersecurity Initiative,” that established the procedures the Acquisition community should use to manage future of Acquisition programs. Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
...] State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC); Notice of Meeting AGENCY... Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities. FOR..., announcement is made for the following committee meeting. Name of Committee: State, Local, Tribal, and Private...
2010-09-01
the Rise of Privatized Military Industry, 88–100. 18 Steven Brayton , "Outsourcing War: Mercenaries and the Privatization of Peacekeeping,” Journal of...220. 50 Isenberg, Shadow Force: Private Security Contractors in Iraq, 1. 51 Brayton , "Outsourcing War: Mercenaries and the Privatization of...Review of Books, April 3, 2008, 29. 71 Singer, Corporate Warriors, The Rise of the Privatized Military Industry, 113. 72 Brayton , "Outsourcing War
2008-07-01
MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and
Student Experiential Opportunities in National Security Careers
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
Wen, Qiaoyan; Zhang, Hua; Jin, Zhengping; Li, Wenmin
2014-01-01
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. PMID:24982949
Two-cloud-servers-assisted secure outsourcing multiparty computation.
Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Zhang, Hua; Jin, Zhengping; Li, Wenmin
2014-01-01
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.
75 FR 67992 - Voluntary Private Sector Accreditation and Certification Preparedness Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-04
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2008-0017] Voluntary Private Sector Accreditation and Certification Preparedness Program AGENCY: Federal Emergency... on an initial small business plan to address small business concerns in the Voluntary Private Sector...
ERIC Educational Resources Information Center
Benson, Helene A.
This speech focuses on women and private pension plans, such as private pension coverage and smaller benefit amounts. Pension issues affecting women as employees include participation in plans, vesting, break-in service, benefit accruals, integration with Social Security, sex-based actuarial tables, portability, inflation, and individual…
77 FR 44641 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
..., interoperability, security, reliability, and resiliency; and (3) help ensure the deployment and evolution of the... how commercial off-the-shelf technologies and private sector best practices can be used to secure...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-12
..., Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight..., announcement is made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory..., Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on July 25, 2012, 10:00 a.m...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
Private randomness expansion with untrusted devices
NASA Astrophysics Data System (ADS)
Colbeck, Roger; Kent, Adrian
2011-03-01
Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.
France, Francis Roger
2011-02-01
eHealth platform is the official federal network in Belgium (created by law on 21 August 2008) devoted to a secure exchange of health data in many types of applications, such as health care purposes, simplification of administrative procedures and contribution to health policy. It implies a controlled access to decentralized databases and uses encrypted personal data. The national identification number has been chosen in order to authenticate the requester, the patient, and the receiver of information exchange. Authorizations have to be respected in order to obtain personal health data. Several questions are raised about its security: the lack of mandatory request for systematic journaling on accesses to the electronic patient record as well as the absence of explicit procedures for sanctions in case of unauthorized access, the new role of social security administration in managing security where a eHealth manager can be both judge and party (in the function of trusted third party for health data encryption and of a required lawyer for texts proposed by physicians to the Commission for the protection of private life). Another critic concerns the number of physicians in minority and the absence of patients' delegates in the eHealth Board. At a time when the patient is becoming a partner in the care team, should not he be the gate-keeper for the access to his own health record? How could networks help him to get the appropriate knowledge to contribute to care and to write his testament of life? Recent laws (on private life, patient rights and euthanasia) have contributed to a behavioural change in citizens and physician attitudes. Recommendations are made in order to improve the acceptability of eHealth platform. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Constructing RBAC Based Security Model in u-Healthcare Service Platform
Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil
2015-01-01
In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices. PMID:25695104
Klauser, Francisco
2009-06-01
The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance.
Constructing RBAC based security model in u-healthcare service platform.
Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil
2015-01-01
In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.
HIPAA--a real world perspective.
Nulan, C
2001-01-01
An effective and realistic approach to HIPAA compliance requires healthcare organizations to achieve a fundamental shift in attitude, awareness, habits and capabilities in the areas of privacy and security. They must create a sense of accountability among staff, and even patients, for the safeguarding of patient information. Only when this culture shift has occurred, along with the required technological advancements, can HIPAA compliance be realistically achieved. There is still ample time to create the organizational shift necessary, along with technological enhancements, to meet HIPAA requirements. Beyond compliance, HIPAA will benefit the healthcare industry by promoting administrative simplification--the original intention of the Act. And it will require the healthcare industry, in an abbreviated timeframe, to upgrade its level of sophistication in managing information. HIPAA certification springs from an organizational compliance method that has been underway in government for the past two decades. The HIPAA playbook is taken lock, stock and barrel from other Federal guidelines. HIPAA's legislative lineage includes the Healthcare Reform Act of 1993, Paperwork Reduction Act of 1980, Computer Security Act of 1987 and the Privacy Act of 1974. HIPAA means that public and private sector healthcare organizations are going to be required by law to adopt the same information-handling practices that have been in effect in the Federal government for years. That boils down to two things: Standardized formatting of data electronically exchanged between providers, payers and business partners (EDI) Federalization of security and privacy practices within private-sector healthcare information management The key to making HIPAA compliance achievable within a practical timeframe, as well as instituting the culture changes that go with enhanced privacy and security standards, is a process that is largely unfamiliar in the private sector, called administrative certification and accreditation. Certification is an organizational change-management methodology that drives accountability for security down to that level in the organization where it will concretely and tangibly get done. It is a comprehensive managerial assessment of the technical and non-technical security features and other safeguards of a system associated with its use and environment. The assessment seeks to establish and document the extent to which a particular system meets a set of specified security requirements. HIPAA accreditation occurs when all functional managers in an organization have completed reports of what they know they need to do in their areas. They submit that information to an executive official within the organization who functions as the accrediting official for the organization. Accreditation is the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and should be strongly based on the solvable vulnerabilities and residual risks identified during certification. Institutionalizing a practical and formal HIPAA certification program is important to support business activities and can provide several benefits including increased communication within an organization.
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stewart, John; Halbgewachs, Ron; Chavez, Adrian
The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relatingmore » to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.« less
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
Information Security Awareness On-Line Materials Design with Knowledge Maps
ERIC Educational Resources Information Center
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan
2011-01-01
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
ATIP Report: Cyber Security Research in China
2015-06-05
vulnerabilities. ATIP Document ID: 150605AR CYBER SECURITY RESEARCH IN CHINA 17 Le GUAN et al. at SKLOIS of IIE, CAS proposed a solution named “ Mimosa ...that protects RSA private keys against the above software-based and physical memory attacks. When the Mimosa service is in idle, private keys are...encrypted and reside in memory as ciphertext. During the cryptographic computing, Mimosa uses hardware transactional memory (HTM) to ensure that (a
Code of Federal Regulations, 2010 CFR
2010-04-01
... certifying to the Commission on Form 15F (17 CFR 249.324) that: (1) The foreign private issuer has had... average daily trading volume of the subject class of securities in the United States for a recent 12-month period has been no greater than 5 percent of the average daily trading volume of that class of securities...
ERIC Educational Resources Information Center
Bovbjerg, Barbara D.
This report compares the Social Security Administration's Disability Insurance (DI) program and the practices of the private sector and other countries in helping people with severe disabilities return to work. Information was gathered in in-depth interviews and a review of policy documents and program data at three private sector disability…
Park, Sohyun; Kim, Kirang
2018-01-01
This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants’ mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses. PMID:29370127
The Mexican Social Security counterreform: pensions for profit.
Laurell, A C
1999-01-01
The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.
Park, Sohyun; Kim, Kirang
2018-01-25
This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants' mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses.
An approach for investigation of secure access processes at a combined e-learning environment
NASA Astrophysics Data System (ADS)
Romansky, Radi; Noninska, Irina
2017-12-01
The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.
A Unified Approach to Information Security Compliance
ERIC Educational Resources Information Center
Adler, M. Peter
2006-01-01
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Sharing the Knowledge: Government-Private Sector Partnerships to Enhance Information Security
2000-05-01
private sector . However, substantial barriers threaten to block information exchanges between the government and private sector . These barriers include concerns over release of sensitive material under Freedom of Information Act requests, antitrust actions, protection of business confidential and other private material, possible liability due to shared information, disclosure of classified information, and burdens entailed with cooperating with law enforcement agencies. There is good cause to believe that the government and private
The welfare state, pensions, privatization: the case of Social Security in the United States.
Du Boff, R B
1997-01-01
In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.
76 FR 41826 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-15
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records... Information Program for State, Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on...
Masum, Abdul Kadar Muhammad; Azad, Md. Abul Kalam; Beh, Loo-See
2015-01-01
The job satisfaction of academics is related to a number of variables of complex function such as demographic characters, the work itself, pay, work responsibilities, variety of tasks, promotional opportunities, relationship with co-workers and others. Academics may be simultaneously satisfied with some facets of the job and dissatisfied with others. This paper aims at determining the influential factors that contribute to the enhancement or reduction of academics’ job satisfaction among private universities in Bangladesh with special reference to Dhaka, the capital city of Bangladesh. A total of 346 respondents are considered from ten private universities using non-probability sampling. A pre-tested and closed-ended questionnaire using a seven-point Likert scale is used for data collection. In this study, descriptive statistics, Pearson product moment correlation, multiple regression, and factor analysis are exercised as statistical tools. A conceptual model of job satisfaction is developed and applied for academics’ job satisfaction. The results reveal that compensation package, supervisory support, job security, training and development opportunities, team cohesion, career growth, working conditions, and organizational culture and policies are positively associated with the academics’ job satisfaction. Amongst them, three factors stood out as significant contributors for job satisfaction of academics i.e. compensation package, job security, and working conditions. Therefore, the management of private universities should focus their effort on these areas of human resource management for maintaining academics’ job satisfaction and employee retention. The study will be useful for university management in improving overall job satisfaction as it suggests some strategies for employee satisfaction practices. PMID:25699518
Masum, Abdul Kadar Muhammad; Azad, Md Abul Kalam; Beh, Loo-See
2015-01-01
The job satisfaction of academics is related to a number of variables of complex function such as demographic characters, the work itself, pay, work responsibilities, variety of tasks, promotional opportunities, relationship with co-workers and others. Academics may be simultaneously satisfied with some facets of the job and dissatisfied with others. This paper aims at determining the influential factors that contribute to the enhancement or reduction of academics' job satisfaction among private universities in Bangladesh with special reference to Dhaka, the capital city of Bangladesh. A total of 346 respondents are considered from ten private universities using non-probability sampling. A pre-tested and closed-ended questionnaire using a seven-point Likert scale is used for data collection. In this study, descriptive statistics, Pearson product moment correlation, multiple regression, and factor analysis are exercised as statistical tools. A conceptual model of job satisfaction is developed and applied for academics' job satisfaction. The results reveal that compensation package, supervisory support, job security, training and development opportunities, team cohesion, career growth, working conditions, and organizational culture and policies are positively associated with the academics' job satisfaction. Amongst them, three factors stood out as significant contributors for job satisfaction of academics i.e. compensation package, job security, and working conditions. Therefore, the management of private universities should focus their effort on these areas of human resource management for maintaining academics' job satisfaction and employee retention. The study will be useful for university management in improving overall job satisfaction as it suggests some strategies for employee satisfaction practices.
49 CFR 1580.105 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615-5150. (c...
Secure quantum private information retrieval using phase-encoded queries
NASA Astrophysics Data System (ADS)
Olejnik, Lukasz
2011-08-01
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.
Secure quantum private information retrieval using phase-encoded queries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olejnik, Lukasz
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less
17 CFR 240.3b-4 - Definition of “foreign government,” “foreign issuer” and “foreign private issuer”.
Code of Federal Regulations, 2010 CFR
2010-04-01
... voting securities beneficially owned by residents of the United States as reported on reports of... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of âforeign... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES...
Loss-tolerant measurement-device-independent quantum private queries
NASA Astrophysics Data System (ADS)
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
Loss-tolerant measurement-device-independent quantum private queries.
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-04
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
2018-05-11
SYSTEM PROTOTYPE DESIGNS DISCLAIMERS The opinions or assertions contained herein are the private views of the author(s) and are not to be construed as...FORM FACTOR EVALUATION OF OPEN BODY AREA NETWORK (OBAN) PHYSIOLOGICAL STATUS MONITORING (PSM) SYSTEM PROTOTYPE DESIGNS William J...security; and is designed to function for 72 hours or more. The test described in this report assesses proposed form-factor designs . Feedback using
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2012 CFR
2012-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2014 CFR
2014-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2013 CFR
2013-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2011 CFR
2011-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2010 CFR
2010-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2012 CFR
2012-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2011 CFR
2011-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2014 CFR
2014-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2013 CFR
2013-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
Private Schools Put Spotlight on Safety
ERIC Educational Resources Information Center
Zehr, Mary Ann
2005-01-01
Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…
Private Schooling and Labour Market Outcomes
ERIC Educational Resources Information Center
Green, Francis; Henseke, Golo; Vignoles, Anna
2017-01-01
Though a relative small part of the school sector, private schools have an important role in British society, and there are policy concerns about their negative effect on social mobility. Other studies show that individuals who have attended a private school go on to have higher levels of educational achievement, are more likely to secure a…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-08
... Collection; Comment Request; Licensing of Private Remote-Sensing Space Systems AGENCY: National Oceanic and.... Abstract NOAA has established requirements for the licensing of private operators of remote-sensing space... Land Remote- Sensing Policy Act of 1992 and with the national security and international obligations of...
A tainted trade? Moral ambivalence and legitimation work in the private security industry.
Thumala, Angélica; Goold, Benjamin; Loader, Ian
2011-06-01
The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. © London School of Economics and Political Science 2011.
75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... electronic security, the market is estimated at US$ 1.5 billion. Today, electronic security equipment is not... market information and to provide access to key government officials and potential business partners for... both the public sector (e.g., public security authorities and officials) and private business (e.g...
Private Security Contractors in Iraq and Afghanistan: Legal Issues
2010-01-07
involving Blackwater Worldwide private security guards on contract with the State Department, who reportedly opened fire in the crowded traffic circle in the...Background and Analysis, by Moshe Schwartz. 2 See James Risen and Mark Mazzetti, Blackwater Guards Tied to Secret C.I.A. Raids, NY TIMES, December 10...0360 (RMU), slip op. (D.D.C, .Dec. 31, 2009). 6 See Iraq: U.S. Blackwater Case Dismissal “Unacceptable,” REUTERS, Jan. 1, 2010. 7 See Iraq to
Transportation Security: Issues for the 111th Congress
2009-05-15
results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports
National Strategy for Aviation Security
2007-03-26
for Aviation Security (hereafter referred to as the Strategy) to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort
75 FR 26171 - Cyber Security Certification Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-11
...-sector auditors who will examine those provider's adherence to stringent cyber security practices that... the auditors who will conduct security assessments of communications service providers; (3) establish... whether the auditors should also be private-sector entities. If so, in order to prevent conflicts of...
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
Fernando, Juanita
2010-01-01
This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.
... a hospital, an insurance company, or an employer. Electronic Health Records—Are They Secure? Many people wonder ... information is kept private and secure in an electronic health record system. In an electronic health record, ...
NASA Astrophysics Data System (ADS)
Xu, Ling; Zhao, Zhiwen
2017-08-01
A new quantum protocol with the assistance of a semi-honest third party (TP) is proposed, which allows the participants comparing the equality of their private information without disclosing them. Different from previous protocols, this protocol utilizes quantum key distribution against the collective-dephasing noise and the collective-rotation noise, which is more robust and abandons few samples, to transmit the classical information. In addition, this protocol utilizes the GHZ-like state and the χ + state to produce the entanglement swapping. And the Bell basis and the dual basis are used to measure the particle pair so that 3 bits of each participant's private information can be compared in each comparison time, which is more efficient and consumes fewer comparison times. Meanwhile, there is no need of unitary operation and hash function in this protocol. At the end, various kinds of outside attack and participant attack are discussed and analyzed to be invalid, so it can complete the comparison in security.
Experimental extraction of secure correlations from a noisy private state.
Dobek, K; Karpiński, M; Demkowicz-Dobrzański, R; Banaszek, K; Horodecki, P
2011-01-21
We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.
2009-07-28
Incidents of Weapons Discharges by Private Security Contractors Can Be Improved 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...for Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...Defense’s (DoD) oversight of incidents involving the firing—or discharge —of weapons reported from May 2008 through February 2009 by its PSCs
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
Review of Private Sector Personnel Screening Practices
2000-10-01
private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor
The Graduate MIS Security Course: Objectives and Challenges
ERIC Educational Resources Information Center
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew
2009-01-01
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Nearest private query based on quantum oblivious key distribution
NASA Astrophysics Data System (ADS)
Xu, Min; Shi, Run-hua; Luo, Zhen-yu; Peng, Zhen-wan
2017-12-01
Nearest private query is a special private query which involves two parties, a user and a data owner, where the user has a private input (e.g., an integer) and the data owner has a private data set, and the user wants to query which element in the owner's private data set is the nearest to his input without revealing their respective private information. In this paper, we first present a quantum protocol for nearest private query, which is based on quantum oblivious key distribution (QOKD). Compared to the classical related protocols, our protocol has the advantages of the higher security and the better feasibility, so it has a better prospect of applications.
NASA Astrophysics Data System (ADS)
Basak, Jyotirmoy; Maitra, Subhamoy
2018-04-01
In device-independent (DI) paradigm, the trustful assumptions over the devices are removed and CHSH test is performed to check the functionality of the devices toward certifying the security of the protocol. The existing DI protocols consider infinite number of samples from theoretical point of view, though this is not practically implementable. For finite sample analysis of the existing DI protocols, we may also consider strategies for checking device independence other than the CHSH test. In this direction, here we present a comparative analysis between CHSH and three-party Pseudo-telepathy game for the quantum private query protocol in DI paradigm that appeared in Maitra et al. (Phys Rev A 95:042344, 2017) very recently.
31 CFR 25.406 - Savings clause.
Code of Federal Regulations, 2010 CFR
2010-07-01
... LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25...
Loss-tolerant measurement-device-independent quantum private queries
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors. PMID:28051101
Multi-Bit Quantum Private Query
NASA Astrophysics Data System (ADS)
Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing
2015-09-01
Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.
48 CFR 225.7402-4 - Law of war training.
Code of Federal Regulations, 2011 CFR
2011-10-01
... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...
48 CFR 225.7402-4 - Law of war training.
Code of Federal Regulations, 2012 CFR
2012-10-01
... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...
48 CFR 225.7402-4 - Law of war training.
Code of Federal Regulations, 2013 CFR
2013-10-01
... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...
Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration
2007-03-01
commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007] 16 The four core elements of CSI include:36 • Identify high...www.cbp.gov/xp/cgov/import/commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007]. 17 Connecting them
The Private Military Firms: Historical Evolution and Industry Analysis
2007-06-01
Company, Private Military Firm, Supply Push, Demand Pull, Future Projections, Blackwater, DynCorp, Entrepreneurship 16. PRICE CODE 17. SECURITY...Business Administration, University of California, 1995. Baumol, W. J. Entrepreneurship , Management, and the Structure of Payoffs. Cambridge, MA: The MIT...P. F. Innovation and Entrepreneurship : Practice and Principles. Toronto: Fitzhenry & Whiteside Limited, 1985. Duffy, M. When Private Armies Take to
SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards
2002-05-01
Report to Congressional Requesters United States General Accounting Office GAO May 2002 SOCIAL SECURITY NUMBERS Government Benefits from SSN Use...and Subtitle SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards Contract Number Grant Number Program...Social Security benefits . Since that time, the number has been used for myriad non-Social Security purposes. Private sector use of the SSN has grown
Ariel, Barak; Bland, Matthew; Sutherland, Alex
2017-01-01
Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations' complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory.
77 FR 58208 - Airport Privatization Pilot Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-19
... Department of Transportation (DOT), the Federal Aviation Administration and the Transportation Security... International Airport final application; the Transportation Security Administration will also participate... employees, airlines, aviation businesses and airport tenants, elected officials and community residents...
Practices and technologies in hazardous material transportation and security.
DOT National Transportation Integrated Search
2011-11-23
"The University of Arkansas (UA) team is responsible for investigating practices of : hazardous material transportation in the private sector. The UA team is a subcontractor : to the project Petrochemical Transportation Security, Development of...
Terrorism: The Challenge to the Private Sector,
private sector , security is a line management responsibility, particularly where goals and objectives, information protection, and protection of key assets are concerned. Each company in the corporate world has a different personality. The goals are pretty much the same, but once you get below that initial goal, then you go to beliefs. Some companies are very macho. Some companies won’t let a security man interview a suspect, some companies will. Companies are very hesitant to go th extremes. Companies are both image conscious and fundamentally ethical. They truly do
Agencies Need Improved Financial Data Reporting for Private Security Contractors
2008-10-30
Source DoDa DoSb USAIDc Total 1 Multiple Funds Used for Contract $712.0 $1,443.3 $493.8 $2,649.1 2 Operations and Maintenance Account 1,150.1 0.0 0.0...display a currently valid OMB control number. 1 . REPORT DATE 30 OCT 2008 2 . REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND...routinely capturing financial information for all contracts and subcontracts for private security services, citing FAR 15.403- 1 (b)( 2 ) as prohibiting it
26 CFR 1.145-2 - Application of private activity bond regulations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... trades or businesses under section 513(a); (2) References to “10 percent” and “proceeds” in the context of the private business use test and the private security or payment test mean “5 percent” and “net... business tests. In applying §§ 1.141-0 through 1.141-15 to section 145(a)— (1) References to governmental...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees
Code of Federal Regulations, 2011 CFR
2011-07-01
... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...
32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees
Code of Federal Regulations, 2013 CFR
2013-07-01
... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...
The Employee Retirement Income Security Act of 1974: Policies and Problems
ERIC Educational Resources Information Center
Alperin, Stuart N.; And Others
1975-01-01
Congress enacted the Employment Retirement Income Security Act of 1974 (ERISA) to help assure economic security in retirement. This analysis includes description of the growth, operation, and inequities within the private pension system and analysis of ERISA: (1) participation, vesting and joint and survivor annuities; (2) funding and plan…
7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 11 2011-01-01 2011-01-01 false Refinancing of existing secured debt-distribution and power supply borrowers. 1717.857 Section 1717.857 Agriculture Regulations of the Department of... Private Financing § 1717.857 Refinancing of existing secured debt—distribution and power supply borrowers...
Parental Involvement in School and the Role of School Security Measures
ERIC Educational Resources Information Center
Mowen, Thomas J.
2015-01-01
Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…
Motivating the Private vs. Public Sector Managers.
ERIC Educational Resources Information Center
Khojasteh, Mak
1993-01-01
A questionnaire on intrinsic/extrinsic rewards received 362 responses from 380 managers. Pay and security were greater motivators for private than for public sector managers. Recognition had higher motivating potential in the public sector. Both groups were motivated by achievement and advancement. (SK)
Code of Federal Regulations, 2013 CFR
2013-01-01
... continuing basis each time a property is transferred (except for transfers specifically excepted) for a period of time or indefinitely. A private transfer fee does not include fees, charges, payments, or other... SECURITY INTERESTS IN, MORTGAGES ON PROPERTIES ENCUMBERED BY CERTAIN PRIVATE TRANSFER FEE COVENANTS AND...
Cyber Hygiene for Control System Security
Oliver, David
2015-10-08
There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.
A governor's guide to emergency management. Volume two : homeland security
DOT National Transportation Integrated Search
2002-09-19
Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...
Social Security reform: implications for women.
Williamson, J B; Rix, S E
2000-01-01
Despite recent economic gains for women, a substantial gender gap in financial security during old age remains, making women more dependent than men upon Social Security. Social Security plays an important role in providing for women's economic security. The implications for women of several proposed changes in Social Security policy, including the call for the partial privatization of Social Security via the introduction of individual accounts, are analyzed. Many of the proposals would have the effect of asking women, particularly low-income women, to shoulder a disproportionate share of the risks and burdens associated with the changes.
77 FR 60607 - National Cybersecurity Awareness Month, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-04
... released the Blueprint for a Secure Cyber Future--a strategic plan to protect government, the private sector, and the public against cyber threats today and tomorrow. As we continue to improve our... infrastructure, facilitating greater cyber information sharing between government and the private sector, and...
Code of Federal Regulations, 2014 CFR
2014-01-01
... of title to real estate, and payable on a continuing basis each time a property is transferred (except for transfers specifically excepted) for a period of time or indefinitely. A private transfer fee... SECURITY INTERESTS IN, MORTGAGES ON PROPERTIES ENCUMBERED BY CERTAIN PRIVATE TRANSFER FEE COVENANTS AND...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.
Zhao, Zhenguo
2014-05-01
With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.
Small Private Key PKS on an Embedded Microprocessor
Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon
2014-01-01
Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722
Small private key MQPKS on an embedded microprocessor.
Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon
2014-03-19
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.
Economic Influences on Re-Enlistment. The Draft Era.
1982-10-01
for each individual in jobs covered by Social Security (over 90 percent of all private - sector jobs, plus military service and half of non-federal...disappeared as real military wages have increased significantly over cyclical swings in the private sector . Despite the Navy’s apparent success in...maintaining optimal retention rates in selective ratings is due to the wage pressures exerted in the private sector . Military wage increases must be
ERIC Educational Resources Information Center
Matthew, Ige Akindele
2015-01-01
While all children have a right to quality care and education in their early years, how to secure that right, especially in resource-limited contexts, is the subject of much debate. For some nations, private schools can seem like a good option, requiring few federal resources. However, the privatization of early education presents significant…
Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents
2015-01-01
very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering
2010-03-01
6 A. M. Fitz -Gerald, Security Sector Reform in Sierra Leone. Shrivenham, GFN-SSR. 8–10. Osman Gbla...34Security Sector Reform: Bringing the Private in.", 1– 23; Peter Albrecht and Paul Jackson, eds. Security System Transformation in Sierra Leone, 1997–2007...veterans.38 33 John R. Cartwright, Political leadership in Sierra Leone (Toronto: University of
17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.
Code of Federal Regulations, 2010 CFR
2010-04-01
... obtain information about the amount of securities represented by accounts of customers resident in the... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... interest of investors. (c) Tier I. Any tender offer for the securities of a foreign private issuer as...
Administering a healthy dose of security.
Berry, D; Mullen, M; Murray, T
The article describes how a hospital located in a poor, crime-ridden section of a large city has made the most of in-house resources and public-private liaisons to improve security at its 113-acre campus. Details on the facility's double-pronged approach--tight internal security and strong external liaisons with businesses, law enforcement, and community groups--are provided.
Economic Analysis of Cyber Security
2006-07-01
vulnerability databases and track the number of incidents reported by U.S. organizations. Many of these are private organizations, such as the security...VULNERABILITY AND ATTACK ESTIMATES Numerous organizations compile vulnerability databases and patch information, and track the number of reported incidents... database / security focus Databases of vulnerabilities identifying the software versions that are susceptible, including information on the method of
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
..., in the aggregate, or by the private sector of $100,000,000 (adjusted for inflation) or more in any... Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone AGENCY: Coast... moving security zones around passenger vessels in the Sector Southeastern New England Captain of the Port...
2008 Stability, Security, Transition and Reconstruction Operations Conference
2008-09-04
Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS..., the Uniform State Waterway Marking System's (USWMS) aids to navigation provisions for marking channels... waters for private aids to navigation and in those internal waters that are non-navigable waters of the U...
Code of Federal Regulations, 2012 CFR
2012-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2013 CFR
2013-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2014 CFR
2014-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2011 CFR
2011-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2010 CFR
2010-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS..., the Uniform State Waterway Marking System's (USWMS) aids to navigation provisions for marking channels... waters for private aids to navigation and in those internal waters that are non-navigable waters of the U...
Unlawful Combatants at the Controls: The CIA, Armed RPAS and LOAC
2011-02-16
career judge advocate, beginning military service with the Judge Advocate General’s Corps, United States Navy . After a brief stint in private...of Xe Services, formerly known as Blackwater , the private security firm that has been at the forefront of other allegations concerning civilians
Code of Federal Regulations, 2010 CFR
2010-04-01
... prescribed applications, forms, and other publications. 422.527 Section 422.527 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications and Related Forms § 422.527 Private..., institution, or organization wishing to reproduce, reprint, or distribute any application, form, or...
Bland, Matthew; Sutherland, Alex
2017-01-01
Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations’ complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory. PMID:29211735
17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... in the issuer's consolidated financial statements and not located in a hyperinflationary environment..., Oct. 5, 1999] Consolidated and Combined Financial Statements ... SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES...
Quantum Private Comparison Protocol with Linear Optics
NASA Astrophysics Data System (ADS)
Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu
2016-12-01
In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.
Messenger, Katy; Farquharson, Lorna; Stallworthy, Pippa; Cawkill, Paul; Greenberg, Neil
2012-07-01
To explore the occupational experiences of private security contractors working in a war zone and how it impacts on their mental health. Semistructured interviews were conducted with seven contractors employed by a large UK-based private security company. Interpretative phenomenological analysis was used to analyze the interview transcripts. Participants also completed the 12-item General Health Questionnaire and the Posttraumatic Stress Disorder Checklist. Four overarching themes emerged: the appeal of the job; vulnerability; keep going; and seeking help for stress in the workplace. No clinically significant levels of distress were reported. Contractors are frequently exposed to stressors known to increase risk of psychiatric difficulty in military personnel. A number of potential protective factors were identified. Only a minority of participants were open to seeking help for mental health difficulties.
Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs
NASA Astrophysics Data System (ADS)
Wang, Cong; Xu, Gang; Yang, Yi-Xian
2013-07-01
In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
Code of Federal Regulations, 2011 CFR
2011-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...
Code of Federal Regulations, 2014 CFR
2014-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...
33 CFR 66.01-1 - Basic provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...
33 CFR 66.01-1 - Basic provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2011 CFR
2011-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2012 CFR
2012-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
Code of Federal Regulations, 2013 CFR
2013-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
33 CFR 66.01-1 - Basic provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2013 CFR
2013-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2014 CFR
2014-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
Code of Federal Regulations, 2012 CFR
2012-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
Code of Federal Regulations, 2010 CFR
2010-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2010 CFR
2010-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Surya V.; Thronas, Aaron I.
2010-01-01
This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.
Secure Fingerprint Identification of High Accuracy
2014-01-01
secure ) solution of complexity O(n3) based on Gaussian elimination. When it is applied to biometrics X and Y with mX and mY minutiae, respectively...collections of biometric data in use today include, for example, fingerprint, face, and iris images collected by the US Department of Homeland Security ...work we focus on fingerprint data due to popularity and good accuracy of this type of biometry. We formulate the problem of private, or secure , finger
Digital camera with apparatus for authentication of images produced from an image file
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1993-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.
Network Computing Infrastructure to Share Tools and Data in Global Nuclear Energy Partnership
NASA Astrophysics Data System (ADS)
Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya
CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer-Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP.
Speeding decisions. Social security's information exchange program.
Winter, Kitt; Hastings, Bob
2011-05-01
The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.
42 CFR 23.33 - What security must be given for these loans?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 1 2010-10-01 2010-10-01 false What security must be given for these loans? 23.33... NATIONAL HEALTH SERVICE CORPS Private Practice Special Loans for Former Corps Members § 23.33 What security must be given for these loans? The Secretary may require the borrower to pledge to the Secretary a...
Rajagopalan, S. P.
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290
Alagarsamy, Sumithra; Rajagopalan, S P
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.
Kröger, H
2016-04-01
Estimating the size of health inequalities between hierarchical levels of job status and the contribution of direct health selection to these inequalities for men and women in the private and public sector in Germany. The study uses prospective data from the Socio-Economic Panel study on 11,788 women and 11,494 men working in the public and private sector in Germany. Direct selection effects of self-rated health on job status are estimated using fixed-effects linear probability models. The contribution of health selection to overall health-related inequalities between high and low status jobs is calculated. Women in the private sector who report very good health have a 1.9 [95% CI: 0.275; 3.507] percentage point higher probability of securing a high status job than women in poor self-rated health. This direct selection effect constitutes 20.12% of total health inequalities between women in high and low status jobs. For men in the private and men and women in the public sector no relevant health selection effects were identified. The contribution of health selection to total health inequalities between high and low status jobs varies with gender and public versus private sector. Women in the private sector in Germany experience the strongest health selection. Possible explanations are general occupational disadvantages that women have to overcome to secure high status jobs. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
75 FR 23196 - Exchange Visitor Program-Secondary School Students
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
.... diplomatic and foreign policy goals by encouraging this positive academic and social interaction. Experience... currently requires a private vendor name and social security number check of all potential host family... check or the name and social security number criminal background check. NCMEC would interpret...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Purpose. 159.1 Section 159.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.1 Purpose. This part establishes policy, assigns responsibilities and provides...
Armada, F; Muntaner, C; Navarro, V
2001-01-01
International financial institutions have played an increasing role in the formation of social policy in Latin American countries over the last two decades, particularly in health and pension programs. World Bank loans and their attached policy conditions have promoted several social security reforms within a neoliberal framework that privileges the role of the market in the provision of health and pensions. Moreover, by endorsing the privatization of health services in Latin America, the World Health Organization has converged with these policies. The privatization of social security has benefited international corporations that become partners with local business elites. Thus the World Health Organization, international financial institutions, and transnational corporations have converged in the neoliberal reforms of social security in Latin America. Overall, the process represents a mechanism of resource transfer from labor to capital and sheds light on one of the ways in which neoliberalism may affect the health of Latin American populations.
Future Warfare: Anthology Revised Edition
2001-06-01
film “ Saving Private Ryan ” are compelling and chilling. But the information age promises to make ground combat considerably less destructive that the...116 Saving Private Ryan , 80–81 Schwarzkopf, Norman, 242, 243–244 Science and technology, 191–202 Scipio, 44 Security beyond the year 2010, 128–131, 137... Private Ryan ” where the true horror of face-to-face ground combat is driven into the psyche of the movie goer. I am increasingly convinced, however
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2012 CFR
2012-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2011 CFR
2011-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2014 CFR
2014-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2013 CFR
2013-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.15d-16 - Reports of foreign private issuers on Form 6-K [17 CFR 249.306].
Code of Federal Regulations, 2012 CFR
2012-04-01
... issuers on Form 6-K [17 CFR 249.306]. 240.15d-16 Section 240.15d-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K [17 CFR 249.306]. (a) Every foreign private issuer which is subject to Rule 15d-1 [17 CFR 240.15d-1] shall make reports on Form 6-K, except that this rule shall not apply to...
Two management systems in a nursing private practice group.
Zahourek, R P
1979-09-01
Entry into private practice can be rewarding for nurses who are willing to risk personal, financial, and professional security. Among the problems faced by the nurse in this new role is the administration of the practice, since few, if any, adequate models exist. This article describes the struggle of nurses in one private nursing practice, Creative Health Services, to meet their needs for individual freedom within an organization that is regulated sufficiently to maintain its viability.
2016-06-10
reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership Program (P3). This...opportunities for the reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership...21 National Strategic Direction
NASA Astrophysics Data System (ADS)
Kota, Sujatha; Padmanabhuni, Venkata Nageswara Rao; Budda, Kishor; K, Sruthi
2018-05-01
Elliptic Curve Cryptography (ECC) uses two keys private key and public key and is considered as a public key cryptographic algorithm that is used for both authentication of a person and confidentiality of data. Either one of the keys is used in encryption and other in decryption depending on usage. Private key is used in encryption by the user and public key is used to identify user in the case of authentication. Similarly, the sender encrypts with the private key and the public key is used to decrypt the message in case of confidentiality. Choosing the private key is always an issue in all public key Cryptographic Algorithms such as RSA, ECC. If tiny values are chosen in random the security of the complete algorithm becomes an issue. Since the Public key is computed based on the Private Key, if they are not chosen optimally they generate infinity values. The proposed Modified Elliptic Curve Cryptography uses selection in either of the choices; the first option is by using Particle Swarm Optimization and the second option is by using Cuckoo Search Algorithm for randomly choosing the values. The proposed algorithms are developed and tested using sample database and both are found to be secured and reliable. The test results prove that the private key is chosen optimally not repetitive or tiny and the computations in public key will not reach infinity.
A Survey of Private Ohio Academic Libraries' Physical Processing Practices for Circulating Books.
ERIC Educational Resources Information Center
Factor, Olivia Spaid
Little guidance is given in today's general technical services or cataloging textbooks to assist librarians in making decisions on procedures for the physical preparation of materials prior to placement on the shelves for public access. As small, private academic libraries face automation of circulation, addition of security systems, and debates…
7 CFR 1744.30 - Automatic lien accommodations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...
7 CFR 1744.30 - Automatic lien accommodations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...
7 CFR 1744.30 - Automatic lien accommodations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...
2006-11-01
and 1648: demolition of Facility 451 (currently used as gym and Teen Center) that is adjacent to but not part of the privatization land lease...of the batteries and their relationship to the base end stations. (This marker is in place.) • The structure will be secured to prevent vandalism
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2014 CFR
2014-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2013 CFR
2013-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2012 CFR
2012-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
Long-term care over an uncertain future: what can current retirees expect?
Kemper, Peter; Komisar, Harriet L; Alecxih, Lisa
The leading edge of the baby boom generation is nearing retirement and facing uncertainty about its need for long-term care (LTC). Using a microsimulation model, this analysis projected that people currently turning age 65 will need LTC for three years on average. An important share of needed care will be covered by public programs and some private insurance, but much of the care will be an uninsured private responsibility of individuals and their families--a responsibility that will be distributed unequally. While over a third of those now turning 65 are projected to never receive family care, three out of 10 will rely on family care for more than two years. Similarly, half of people turning 65 will have no private out-of-pocket expenditures for LTC, while more than one in 20 are projected to spend $100,000 or more of their own money (in present discounted value). Policy debate that focuses only on income security and acute care--and the corresponding Social Security and Medicare programs--misses the third, largely private, risk that retirees face: that of needing LTC.
FRR: fair remote retrieval of outsourced private medical records in electronic health networks.
Wang, Huaqun; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep
2014-08-01
Cloud computing is emerging as the next-generation IT architecture. However, cloud computing also raises security and privacy concerns since the users have no physical control over the outsourced data. This paper focuses on fairly retrieving encrypted private medical records outsourced to remote untrusted cloud servers in the case of medical accidents and disputes. Our goal is to enable an independent committee to fairly recover the original private medical records so that medical investigation can be carried out in a convincing way. We achieve this goal with a fair remote retrieval (FRR) model in which either t investigation committee members cooperatively retrieve the original medical data or none of them can get any information on the medical records. We realize the first FRR scheme by exploiting fair multi-member key exchange and homomorphic privately verifiable tags. Based on the standard computational Diffie-Hellman (CDH) assumption, our scheme is provably secure in the random oracle model (ROM). A detailed performance analysis and experimental results show that our scheme is efficient in terms of communication and computation. Copyright © 2014 Elsevier Inc. All rights reserved.
Nayor, David
2012-01-01
Doctors across the country who operate private medical practices are facing increasing financial obstacles, namely shrinking income as a result of rising costs and lower reimbursements. In addition, as hospitals have become overburdened many physicians have opened up private surgical centers; magnetic resonance imaging and computed tomography and positron emission tomography scanning facilities; pathology labs; colonoscopy/endoscopy suites; lithotripsy centers; and other medical businesses typically performed within the hospital. Moreover, many doctors seek loans to purchase existing practices or for their capital contribution in medical partnerships. The past decade has thus seen a significant increase in the number of doctors taking out small business loans. Indeed, banks view the healthcare industry as a large growth market. This article includes practical information, advice, and resources to help doctors to secure bank financing for their practices, ancillary services business, real estate, and equipment on the best possible market terms.
2013-01-01
tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the
Social Security and Saving: A Time-Series Econometrics Pedagogical Example (With "R" Code)
ERIC Educational Resources Information Center
Wassell, Charles S., Jr.
2018-01-01
In 1974, and then again in 1996, Martin Feldstein published studies of the impact of the Social Security system on private saving in the U.S. economy. He found that Social Security depressed personal saving by a substantial amount--up to 50 percent. The author uses the Feldstein data and empirical models in this article to illustrate the steps in…
Private sector involvement in civil space remote sensing. Volume 1: Report
NASA Technical Reports Server (NTRS)
1979-01-01
A survey of private sector developers, users, and interpreters of Earth resources data was conducted in an effort to encourage private investment and participation in remote sensing systems. Results indicate positive interest in participation beyond the current hardware contracting level, however, there is a substantial gap between current market levels and system costs. Issues identified include the selection process for an operating entity, the public/private interface, data collection and access policies, price and profit regulation in a subsidized system, international participation, and the responsibility for research and development. It was agreed that the cost, complexity, and security implications of integrated systems need not be an absolute bar to their private operation.
Noisy processing and distillation of private quantum States.
Renes, Joseph M; Smith, Graeme
2007-01-12
We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In addition to a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.
Borrowing to save: a critique of recent proposals to partially privatize Social Security.
Dattalo, Patrick
2007-07-01
Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs are more likely to be a problem than a solution. Paradoxically, PSAs require the government to borrow to encourage current workers to save. The author recommends resources to help social workers remain informed about proposed program reforms and prepared to advocate for the concept of social insurance.
Quantum private query with perfect user privacy against a joint-measurement attack
NASA Astrophysics Data System (ADS)
Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min
2016-12-01
The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.
Evolutionary Aspects for Technology Policy: the Case of Galileo Public-Private Partnership
NASA Astrophysics Data System (ADS)
Zervos, Vasilis
2002-01-01
This paper examines the impact of strategic interactions on Private-Public Partnerships (PPPs) in space. Though there is substantial business and economics literature on PPPs, it is traditionally focused on the relationships within the partnerships (low level) and the respective factors affecting its success. The contribution of this paper is that it examines the political economy of PPPs, analysing how `high-level' strategic interactions across public-private sectors in Europe and the US determine their behaviour and success. Within this context, the European case of Galileo and other national space projects, such as the US plans for a space-based anti- missile defence, are each based on different types of PPPs, confined within the geographical borders of the two areas. The security and commercial benefits of such programmes for the respective space industries and economies have a direct impact on the other area's industry and sense of security. The paper shows that trans- Atlantic cooperation at public policy level is essential to allow the respective industries to explore the benefits of cross-border strategic research partnerships (SRPs). This will reduce the costs of the respective programmes, addressing security concerns.
Code of Federal Regulations, 2011 CFR
2011-07-01
... policies related to personnel allowed to carry weapons for self defense. 2 Available at http://www.dtic.mil... 32 National Defense 1 2011-07-01 2011-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...
Code of Federal Regulations, 2010 CFR
2010-07-01
... policies related to personnel allowed to carry weapons for self defense. 2 Available at http://www.dtic.mil... 32 National Defense 1 2010-07-01 2010-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...
Do You Lock Your Network Doors? Some Network Management Precautions.
ERIC Educational Resources Information Center
Neray, Phil
1997-01-01
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
76 FR 28964 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
...' Social Security Number (SSN).'' * * * * * Retrievability: Delete entry and replace with ``Name, date of... site--The eMarine system is a protected network that will employ data encryption, data masking, secure virtual private network (VPN) and DoD approved methods for safeguarding and ensuring compliance. The...
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Security Issues for Mobile Medical Imaging: A Primer.
Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George
2015-10-01
The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.
Bidirectional private key exchange using delay-coupled semiconductor lasers.
Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo
2016-06-15
We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11 Mbit/s over a public channel.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erickson, Michael Charles
Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.
2008-12-01
Program,” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /fast/ (accessed October 14, 2008). 73 U.S. Customs and Border Protection, “What Is...Customs-Trade Partnership against Terrorism (C- TPAT)?” http://www.cbp.gov/xp/cgov/trade/cargo_security/ ctpat /what_ctpat/ (accessed October 14, 2008...cgov/trade/cargo_security/ ctpat / (accessed September 12, 2008). 69 1. National Park Service Historic Preservation Tax Incentives The U.S. government
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
Blair, James D
2005-01-01
Healthcare and other private sector industries have lagged behind federal agencies in fulfilling their security readiness mission, according to the author. A comprehensive and timely resource is now available, he reports, to help healthcare officials in improving emergency response and preparedness.
Code of Federal Regulations, 2013 CFR
2013-07-01
... weapons for self defense. 3 Available at http://www.dtic.mil/whs/directives/corres/pdf/302041p.pdf. PSC... 32 National Defense 1 2013-07-01 2013-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...
Code of Federal Regulations, 2012 CFR
2012-07-01
... weapons for self defense. 3 Available at http://www.dtic.mil/whs/directives/corres/pdf/302041p.pdf. PSC... 32 National Defense 1 2012-07-01 2012-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...
Code of Federal Regulations, 2014 CFR
2014-07-01
... weapons for self defense. 3 Available at http://www.dtic.mil/whs/directives/corres/pdf/302041p.pdf. PSC... 32 National Defense 1 2014-07-01 2014-07-01 false Definitions. 159.3 Section 159.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS...
Toward Explaining Earlier Retirement after 1970.
ERIC Educational Resources Information Center
Ippolito, Richard A.
1990-01-01
Rule changes in the social security system and pension plans suggest that labor force participation rates for men aged 55 to 64 fell by 20 percent from 1970 through 1986 because of the increase in social security benefits and a change in private pension rules encouraging earlier retirement. (Author/JOW)
17 CFR 230.155 - Integration of abandoned offerings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Integration of abandoned... GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.155 Integration of abandoned offerings... from integration of private and registered offerings. Because of the objectives of Rule 155 and the...
1989-04-20
Pentagon in any way.14 23 To the outside world, Duncan would retire from the Army and set up a "private" consulting firm, which he would call Business ... Security International, known simply as BSI. It would claim to specialize in assisting domestic firms seeking security for overseas operations. In
31 CFR 25.400 - Loan provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Loan provisions. 25.400 Section 25... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25...
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... who carry concealed firearms. Categories of records in the system: Individual's name; Social Security..., private and public schools, daycare facilities, children's camps, and childcare transportation providers... activity regarding child pornography, the touching of a child for sexual gratification, or child abuse. N...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Policy. 159.4 Section 159.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.4 Policy. (a) Consistent with the requirements of paragraph (a)(2) of section 862...
Financial wellness awareness: A step closer to achieve Millennium Development Goals for Pakistan
Rehman, Rehana; Katpar, Shahjahan; Khan, Rakhshaan; Hussain, Mehwish
2015-01-01
Objective: To explore financial wellness (FW) awareness amongst public and private sector medical college students of Karachi. Methods: A cross sectional questionnaire based survey was conducted on medical students from 3 public and 5 private sector medical colleges of Karachi from February 2011 to December 2011. All ethnic groups having age range of 18-23 years were included. A questionnaire tailored from wellness wheel evaluated the responses of FW on a four point Likert’s scale ranging from 0-3(never, sometimes, mostly, and always). Factor analysis explored common FW factors among both public and private sector medical college (MC) students. Results: Private MC Students were better in terms of making short and long terms financial goals compared to students in public sector. The students of public MC were more focused to make and restricting to given budgets (p=0.05). The FW element of keeping savings in bank account was responded more by private MC candidates (P < 0.0001) but was spent thrift as well (P < 0.0001). Factor analysis revealed two factors; ‘Financial Security Wellness’ which was better in Private MC Students (p=0.001) and ‘Care towards Expenses Wellness” in which results were not significant. Conclusion: Both groups of medical college students lacked FW awareness element in terms of caring towards financial expenses. The awareness of importance of financial security was practiced better by private MC students in terms of making short and long term financial goals and keeping savings in bank accounts. They were however deficient in the knowledge of making and restricting themselves to budgets. PMID:25878613
Financial wellness awareness: A step closer to achieve Millennium Development Goals for Pakistan.
Rehman, Rehana; Katpar, Shahjahan; Khan, Rakhshaan; Hussain, Mehwish
2015-01-01
To explore financial wellness (FW) awareness amongst public and private sector medical college students of Karachi. A cross sectional questionnaire based survey was conducted on medical students from 3 public and 5 private sector medical colleges of Karachi from February 2011 to December 2011. All ethnic groups having age range of 18-23 years were included. A questionnaire tailored from wellness wheel evaluated the responses of FW on a four point Likert's scale ranging from 0-3(never, sometimes, mostly, and always). Factor analysis explored common FW factors among both public and private sector medical college (MC) students. Private MC Students were better in terms of making short and long terms financial goals compared to students in public sector. The students of public MC were more focused to make and restricting to given budgets (p=0.05). The FW element of keeping savings in bank account was responded more by private MC candidates (P < 0.0001) but was spent thrift as well (P < 0.0001). Factor analysis revealed two factors; 'Financial Security Wellness' which was better in Private MC Students (p=0.001) and 'Care towards Expenses Wellness" in which results were not significant. Both groups of medical college students lacked FW awareness element in terms of caring towards financial expenses. The awareness of importance of financial security was practiced better by private MC students in terms of making short and long term financial goals and keeping savings in bank accounts. They were however deficient in the knowledge of making and restricting themselves to budgets.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
... Connection With a Proposed Change to its Operations in the Form of a Private Offering by OCC of Senior... change its operations in the form of a private offering of senior unsecured debt securities (``Offering... would provide OCC with access to additional liquidity for working capital needs and general corporate...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... International Law (ACPIL)--Online Dispute Resolution (ODR) Study Group The Office of Private International Law, Office of the Legal Adviser, Department of State hereby gives notice that the ACPIL Online Dispute... through May 25, 2012, and will specifically address security issues relating to use of the ODR rules...
2009-05-04
inconvenience and denial of Internet service, CNAs pose a threat to national security, if the right computer is hacked , to every day operations, if baking...expert J3: Current Operations Rep Private Sector/Civilian: cyber/CNA SME J5 Future Operations Rep Private Sector/Civilian: cyber/CND SME Table 2
Threats to and Alternatives for Financing Social Security
2003-12-01
3) Raise the payroll tax rate. 15. NUMBER OF PAGES 57 14. SUBJECT TERMS Social Security, Privatization, Personal Accounts...Over the next 30 years, the retirement of the baby -boom generation will pose new challenges for the Social Security program, the federal government...Ref. #1, pg1-3) This background helps one consider how to prepare for the retirement of the baby -boom generation and beyond. The objectives of this
Real-Time Speaker Detection for User-Device Binding
2010-12-01
31 xi THIS PAGE INTENTIONALLY LEFT BLANK xii CHAPTER 1: Introduction The roll-out of commercial wireless networks continues to rise worldwide...in a secured facility. It could also be connected to the call server via a Virtual Private Network (VPN) or public lines if security is not a top...communications network [25]. Yet, James Arden Barnett, Jr., Chief of the Public Safety and Homeland Security Bureau, argues that emergency communications
Daykin, Chris
2002-01-01
Contracting-out was introduced in the United Kingdom in 1978 as part of the arrangements for the State Earnings-Related Pension Scheme (SERPS) in order to avoid duplication with the existing well-developed defined benefit occupational pension plan sector. Members and sponsors of contracted-out schemes were able to save on their social security contributions in recognition of the fact that they were accruing equivalent benefits through an occupational pension plan. Later on this concept was extended to those with individual money purchase pension plans. This article considers a brief history of contracting-out, the principles of contracting-out, some problems associated with contracting-out, the implications of the introduction of stakeholder pensions and State Second Pension, and the latest rebate review and rebate orders. It examines how U.K. pensions policy since 1978 has been based on a partnership between social security and private pension plans.
Triple symmetric key cryptosystem for data security
NASA Astrophysics Data System (ADS)
Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.
2017-11-01
As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.
Public sector reform and demand for human resources for health (HRH).
Lethbridge, Jane
2004-11-23
This article considers some of the effects of health sector reform on human resources for health (HRH) in developing countries and countries in transition by examining the effect of fiscal reform and the introduction of decentralisation and market mechanisms to the health sector.Fiscal reform results in pressure to measure the staff outputs of the health sector. Financial decentralisation often leads to hospitals becoming "corporatised" institutions, operating with business principles but remaining in the public sector. The introduction of market mechanisms often involves the formation of an internal market within the health sector and market testing of different functions with the private sector. This has immediate implications for the employment of health workers in the public sector, because the public sector may reduce its workforce if services are purchased from other sectors or may introduce more short-term and temporary employment contracts.Decentralisation of budgets and administrative functions can affect the health sector, often in negative ways, by reducing resources available and confusing lines of accountability for health workers. Governance and regulation of health care, when delivered by both public and private providers, require new systems of regulation.The increase in private sector provision has led health workers to move to the private sector. For those remaining in the public sector, there are often worsening working conditions, a lack of employment security and dismantling of collective bargaining agreements.Human resource development is gradually being recognised as crucial to future reforms and the formulation of health policy. New information systems at local and regional level will be needed to collect data on human resources. New employment arrangements, strengthening organisational culture, training and continuing education will also be needed.
Quantin, C; Fassa, M; Coatrieux, G; Riandey, B; Trouessin, G; Allaert, F A
2009-02-01
Compiling individual records which come from different sources remains very important for multicenter epidemiological studies, but at the same time European directives or other national legislation concerning nominal data processing have to be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, such an anonymization procedure is in contradiction with the common requirement in public health and biomedical research as it becomes almost impossible to link records from separate data collections where the same entity is not referenced in the same way. Solving this paradox by using methodology based on the combination of hashing and enciphering techniques is the main aim of this article. The method relies on one of the best known hashing functions (the secure hash algorithm) to ensure the anonymity of personal information while providing greater resistance to dictionary attacks, combined with encryption techniques. The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity. The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme. This methodology makes the stored data available for use in the field of public health for the benefit of patients, while respecting legal security requirements.
The Turkish commercial health insurance industry.
Kisa, A
2001-08-01
Turkey has experienced significant development in the private health insurance market since 1991. Improvements in private health services, increased public awareness, and insufficient service delivery by the social security organizations have encouraged more people to buy private health insurance. The number of people covered by private health insurance has reached 600,000, forming a $200 million market. The Turkish insurance industry is targeting 6-8 million insurance holders before the year 2005. This study examines the structure of the commercial health insurance industry of Turkey and gives the latest policy and legal changes made in the insurance market by the Turkish government to affect supply and demand.
A new method for generating an invariant iris private key based on the fuzzy vault system.
Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie
2008-10-01
Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.
Jahanbakhsh, Maryam; Karimi, Saeed; Hassanzadeh, Akbar; Beigi, Maliheh
2017-01-01
Electronic medical record system (EMRS) is a valuable system for safe access to the patient's data and increases health care quality. Manpower is one of the requirements for EMRS, among which manager is the most important person in any hospital. Taking into account manager's positive attitude and good commitments, EMRS will be implemented successfully. As such, we decided to assess manager's attitude and commitment toward EMRS in Isfahan hospitals in the year of 2014. This article aimed to determine the hospital managers' attitude and commitment toward the implementation of EMRS. The present article is an applied analytic study. Research society consisted of the managers of all the hospitals in Isfahan that include hospitals affiliated to Isfahan University of Medical Sciences, private, and social security hospitals. This study was done in 2014. Data collection tools included a questionnaire for which reliability and validity were determined. Data were analyzed by means of SPSS 20. Average score for the managers' attitude toward EMRS in the city of Isfahan was 77.5 out of 100 and their average score for commitment was 74.7. Manager's attitude in social security hospitals was more positive than the private and governmental ones (83.3%). In addition, the amount of commitment by the managers in social security hospitals was higher than the same in private and governmental hospitals (86.6%). At present, managers' attitude and commitment in Isfahan hospitals toward EMRS are very high and social security hospitals show more readiness in this respect.
Secure data sharing in public cloud
NASA Astrophysics Data System (ADS)
Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.
2012-04-01
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
Secure key from bound entanglement.
Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan
2005-04-29
We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.
Managing medical and insurance information through a smart-card-based information system.
Lambrinoudakis, C; Gritzalis, S
2000-08-01
The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.
17 CFR 230.144A - Private resales of securities to institutions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... assets consist solely of shares of one or more registered investment companies, that have the same... annual financial statements, as of a date not more than 16 months preceding the date of sale under the... securities holdings in its financial statements on the basis of their market value, and no current...
Life after College: Retirement Security for Higher Ed Employees
ERIC Educational Resources Information Center
Purcell, James; McGill, Robin; Brodeur, Philip; Hall, Erin
2016-01-01
The relationship between employer and employee has changed significantly over the past 40 years. One of the greatest changes in this relationship is in the nature of employee retirement. While pension reform at public and private colleges has helped ensure institutional financial viability, retirement security for employees has declined. With the…
The Port Security Grant Program: Good Enough, or Can it be Made Better
2016-06-01
Private Sector ...... 107 5. Core Capabilities as PSGP Objectives Must Be Revised...Goals. Source: NIPP 2013, Transportation Sector SSP. ........................................................... 42 Figure 12. Port State Control Grant...American Association of Port Authorities ACP Area Contingency Plan AIS Automated Identification System AMSC Area Maritime Security Committee AMSP
The Retirement Security of the Baby Boom Generation.
ERIC Educational Resources Information Center
Shoven, John B.
1995-01-01
The baby boom generation faces added uncertainty on their investments and perhaps lower realized rates of return on all components of their retirement savings, primarily because of their large number. Effects will be felt in the Social Security system and by pension plans and private investors. Individuals, employers, pension fund managers, and…
43 CFR 19.7 - Private contributions and gifts.
Code of Federal Regulations, 2011 CFR
2011-10-01
... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...
43 CFR 19.7 - Private contributions and gifts.
Code of Federal Regulations, 2014 CFR
2014-10-01
... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...
43 CFR 19.7 - Private contributions and gifts.
Code of Federal Regulations, 2013 CFR
2013-10-01
... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...
43 CFR 19.7 - Private contributions and gifts.
Code of Federal Regulations, 2010 CFR
2010-10-01
... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...
43 CFR 19.7 - Private contributions and gifts.
Code of Federal Regulations, 2012 CFR
2012-10-01
... section 6(b), may accept on behalf of the United States any sums of money, marketable securities or other... Secretary of the Interior, Washington, DC 20240, stating the amount of money or describing the securities or... set forth that the offeror is the owner of the property free and clear of all encumbrances and adverse...
75 FR 38530 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
...: Request for Employment Information; Use: Section 1837(i) of the Social Security Act provides for a special...) based on current employment status. This form is used by the Social Security Administration to obtain... Public: Private Sector: Business or other for-profits and Not-for-profit institutions; Number of...
20 CFR 411.115 - Definitions of terms used in this part.
Code of Federal Regulations, 2011 CFR
2011-04-01
....115 Section 411.115 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...) The Act means the Social Security Act, as amended. (b) Commissioner means the Commissioner of Social... network or EN means a qualified public or private entity that has entered into an agreement with us to...
20 CFR 411.115 - Definitions of terms used in this part.
Code of Federal Regulations, 2010 CFR
2010-04-01
....115 Section 411.115 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...) The Act means the Social Security Act, as amended. (b) Commissioner means the Commissioner of Social... network or EN means a qualified public or private entity that has entered into an agreement with us to...
17 CFR 230.144A - Private resales of securities to institutions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... entity that are consolidated with the entity in its financial statements prepared in accordance with... annual financial statements, as of a date not more than 16 months preceding the date of sale under the... securities holdings in its financial statements on the basis of their market value, and no current...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Financing. 882.405 Section 882.405... § 882.405 Financing. (a) Types. Any type of public or private financing may be utilized with the... Contract as security for financing. An Owner may pledge, or offer as security for any loan or obligation...
NASA Astrophysics Data System (ADS)
Permadi, Ginanjar Setyo; Adi, Kusworo; Gernowo, Rahmad
2018-02-01
RSA algorithm give security in the process of the sending of messages or data by using 2 key, namely private key and public key .In this research to ensure and assess directly systems are made have meet goals or desire using a comprehensive evaluation methods HOT-Fit system .The purpose of this research is to build a information system sending mail by applying methods of security RSA algorithm and to evaluate in uses the method HOT-Fit to produce a system corresponding in the faculty physics. Security RSA algorithm located at the difficulty of factoring number of large coiled factors prima, the results of the prime factors has to be done to obtain private key. HOT-Fit has three aspects assessment, in the aspect of technology judging from the system status, the quality of system and quality of service. In the aspect of human judging from the use of systems and satisfaction users while in the aspect of organization judging from the structure and environment. The results of give a tracking system sending message based on the evaluation acquired.
Printable, scannable biometric templates for secure documents and materials
NASA Astrophysics Data System (ADS)
Cambier, James L.; Musgrave, Clyde
2000-04-01
Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.
HIPAA: update on rule revisions and compliance requirements.
Maddox, P J
2002-01-01
Due to the highly technical requirements for HIPAA compliance and the numerous administrative and clinical functions and processes involved, guidance from experts who are knowledgeable about systems design and use to secure private data is necessary. In health care organizations, this will require individuals who are knowledgeable about clinical processes and those who understand health information technology, security, and privacy to work together to establish an entity's compliance plans and revise operations and practices accordingly. As a precondition of designing such systems, it is essential that covered entities understand the HIPAA's statutory requirements and timeline for compliance. An organization's success in preparing for HIPAA will depend upon an active program of assessment, planning, and implementation. Compliance with security and privacy standards can be expected to increase costs initially. However, greater use of EDI is expected to reduce costs and enhance revenues in the long run if processes and systems are improved. NOTE: Special protection for psychotherapy notes holds them to a higher standard of protection. Notes used only by a psychotherapist are not intended to be shared with anyone and are not considered part of the medical record.
Afghanistan: U.S. Foreign Assistance
2009-07-14
private sector, through micro and small business loans and by promoting bank reform to ease establishment of private banks. The Treasury Department...national land registry, and micro and small business credit activities. Funding of administration and oversight of these programs amounted to $25 million...Summary The U.S. program of assistance to Afghanistan is intended to stabilize and strengthen the Afghan economic, social , political, and security
ERIC Educational Resources Information Center
Iritani, Katherine M.
2010-01-01
In 1992, Congress banned schools participating in federal student aid programs from paying commissions, bonuses, or other financial incentives to individuals based on their success in enrolling students or securing their financial aid. The ban applies to all postsecondary schools, including private for-profit, public, and private nonprofit…
The reaction of private physicians to price deregulation in France.
Carrere, M O
1991-01-01
French private physicians are paid on a fee-for-service basis and nearly all of them are under contract to the Social Security, which refunds part of the medical fee to the whole population. Previously the prices of medical services were fixed, but since 1980, a new option has been possible: a doctor can choose to fix the price of his services freely, provided he pays a higher social insurance contribution. But the amount refunded by Social Security does not vary, so that the consumer has to bear the extra charge. Our purpose here is to identify the factors that influence the physician's option. In Section 2, we define a model of the private physician's economic behaviour, of the classic income-leisure type. In Section 3, empirical tests are performed on a sample of observations in 95 'départements', gathering information about private GPs on the one hand, and the whole population on the other. According to our results, GPs' decisions depend on characteristics of both supply of and demand for GPs' services. One of our conclusions is that GPs seem to make up for low activity levels with higher prices, on condition the income of their practice allows it.
Gilmore, Anna; Collin, Jeff; Townsend, Joy
2007-11-01
The International Monetary Fund encourages privatization of state-owned tobacco industries. Privatization tends to lower cigarette prices, which encourages consumption. This could be countered with effective tax policies. We explored how investment by British American Tobacco (BAT) influenced tax policy in Uzbekistan during privatization there. We obtained internal documents from BAT and analyzed them using a hermeneutic process to create a chronology of events. BAT thoroughly redesigned the tobacco taxation system in Uzbekistan. It secured (1) a reduction of approximately 50% in the excise tax on cigarettes, (2) an excise system to benefit its brands and disadvantage those of its competitors (particularly Philip Morris), and (3) a tax stamp system from which it hoped to be exempted, because this would likely facilitate its established practice of cigarette smuggling and further its competitive advantage.. Privatization can endanger effective tobacco excise policies. The International Monetary Fund should review its approach to privatization and differentiate the privatization of an industry whose product kills from privatization of other industries.
Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-01-01
A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-03-31
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
NASA Astrophysics Data System (ADS)
Born, Joshua
The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.
Performing private database queries in a real-world environment using a quantum protocol.
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-06-10
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
Performing private database queries in a real-world environment using a quantum protocol
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-01-01
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129
Allen, James P; Bales, Richard A
On March 11, 2011, Governor Scott Walker of Wisconsin signed into law a bill that eliminated most collective bargaining rights for the state's public-sector workers. Many other cash-strapped states followed Wisconsin's lead and introduced or enacted similar restraints on the rights of their workers. Thousands of public workers, whose only means of protecting their rights rested in their ability to collectively bargain, suddenly found their retirement benefits in jeopardy. This truth highlighted the lack of protections for public worker benefits similar to those of the private sector. However, the Employee Retirement Income Security Act, enacted for that purpose, has failed to secure these benefits. This article seeks to provide a broad overview of the crisis facing the pension and benefits system in the United States and offers some possible solutions. More importantly, the goal is to spur discourse on the urgent need to protect the benefits of all workers, public and private.
NASA Astrophysics Data System (ADS)
Coutu, S.; Ragaz, M.; Mäder, D.; Hammer, P.; Andriesse, M.; Güttinger, U.; Feyen, H.
2017-12-01
The insurance industry has been contributing to the resilient development of agriculture in multiple regions of the globe since the beginning of the 19th Century. It also has from the very beginning of the development of EO Sciences, kept a very close eye on the development of technologies and techniques in this domain. Recent advances in this area such as increased satellite imagery resolution, faster computation time and Big Data management combined with the ground-based knowledge from the insurance industry have offered farmers not only tools permitting better crop management, but also reliable and live yield coverage. This study presents several of these applications at different scales (industrial farming and micro-farming) and in different climate regions, with an emphasis on the limit of current products. Some of these limits such as lack of access of to ground data, R&D efforts or understanding of ground needs could be quickly overcome through closer public-private or private-private collaborations. However, despite a clear benefit for the Food Security nexus and potential win-win situations, those collaborations are not always simple to develop. We present here successful but also disappointing collaboration cases based on the Swiss Re experience, as a global insurance leader. As a conclusion, we highlight how academia, NGOs, governmental organization, start-ups and the insurance industry can get together to foster the development of EO in the domain of Food Security, and bring cutting-edge science to game changing industrial applications.
A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools
2015-07-14
computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network
Personal Retirement Accounts and Saving†
Aguila, Emma
2017-01-01
Aging populations are leading countries worldwide to social security reforms. Many countries are moving from pay-as-you-go to personal retirement account (PRA) systems because of their financial sustainability and positive impact on private savings. PRA systems boost private savings at a macro level by converting a government liability into financial wealth managed by private fund managers. However, at a micro level, changes in retirement wealth affect individuals' saving and consumption patterns through their working lives. Retirement wealth increased for lower-income workers after Mexico introduced PRAs, crowding out saving, increasing consumption, and offsetting some of the PRA effect on private savings. (JEL D14, E21, H55, J26, O16) PMID:28286607
Petri net modeling of encrypted information flow in federated cloud
NASA Astrophysics Data System (ADS)
Khushk, Abdul Rauf; Li, Xiaozhong
2017-08-01
Solutions proposed and developed for the cost-effective cloud systems suffer from a combination of secure private clouds and less secure public clouds. Need to locate applications within different clouds poses a security risk to the information flow of the entire system. This study addresses this by assigning security levels of a given lattice to the entities of a federated cloud system. A dynamic flow sensitive security model featuring Bell-LaPadula procedures is explored that tracks and authenticates the secure information flow in federated clouds. Additionally, a Petri net model is considered as a case study to represent the proposed system and further validate the performance of the said system.
ERIC Educational Resources Information Center
Luechinger, Simon; Meier, Stephan; Stutzer, Alois
2010-01-01
High unemployment rates entail substantial costs to the working population in terms of reduced subjective well-being. This paper studies the importance of individual economic security, in particular job security, by exploiting sector-specific institutional differences in the exposure to economic shocks. Public servants have stricter dismissal…
Counterfeit Compliance with the HIPAA Security Rule: A Study of Information System Success
ERIC Educational Resources Information Center
Johnson, James R.
2013-01-01
The intent of the security standards adopted by the Department of Health and Human Services (DHS) implementing some of the requirements of the Administrative Simplification (AS) subtitle of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was to improve Federal and private health care programs and to improve the…
78 FR 23811 - Privacy Act of 1974; Proposed New Routine Uses and System of Records Alterations
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-22
..., and local law enforcement agencies and private security contractors to protect the safety of SSA... respect to activities that affect such safety and security, or activities that disrupt the operation of.... B. To Federal, State, and Local Law Enforcement To Protect the Safety of SSA Employees and Customers...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-10
..., allowing the private sector to combine and restructure cash flows from Ginnie Mae Single Class MBS into... program, Ginnie Mae guarantees, with the full faith and credit of the United States, the timely payment of... combine and restructure cash flows from Ginnie Mae Single Class MBS into securities that meet unique...
[Public health stewardship and governance regarding the Colombian healthcare system, 2012-2013].
Roth-Deubel, André N; Molina-Marín, Gloria
2013-01-01
Analysing decision-making concerning public health issues regarding the Colombian healthcare system from a market economy-based approach. This study involved applying Glaser and Strauss's grounded theory in six Colombian cities during 2012: Bogotá, Barranquilla, Bucaramanga, Leticia, Medellin and Pasto. 120 individual interviews were conducted with professionals involved in decision-making, running public healthcare programmes and making policy within public and private institutions. Fourteen focus groups were held with community organisation leaders. The findings suggested national and municipal health authorities' weak stewardship and ineffective governance regarding public healthcare policy and programmes, related to a lack of staff trained in public health management issues. In turn, this was related to political parties' interference and private insurers' particular interests and the structural fragmentation of functions and actors within the health system, thereby limiting public health development. A new axiology is necessary for achieving effective governance (I.e. cooperation between Colombian Healthcare Social Security System actors) to overcome current incompetence and financial self-interest predominating within the Colombian healthcare system.
Quantum Secure Conditional Direct Communication via EPR Pairs
NASA Astrophysics Data System (ADS)
Gao, Ting; Yan, Fengli; Wang, Zhixi
Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first scheme, Alice transmits secret message to Bob in a deterministic manner with the help of Charlie by means of Alice's local unitary transformations, both Alice and Bob's local measurements, and both of Alice and Charlie's public classical communication. In the second scheme, the secure communication between Alice and Bob can be achieved via public classical communication of Charlie and Alice, and the local measurements of both Alice and Bob. The common feature of these protocols is that the communications between two communication parties Alice and Bob depend on the agreement of the third side Charlie. Moreover, transmitting one bit secret message, the sender Alice only needs to apply a local operation on her one qubit and send one bit classical information. We also show that the two schemes are completely secure if quantum channels are perfect.
1989-03-01
34 Replace outdated teletypewriter/printer technology with the four AN/ UGC - 74’s; " Upgrade communication security (COMSEC) equipment to retain...unbiased information. In fact, the private user recognizes that good marketing techniques are required to receive favorable consideration for a private...developed in accounting, finance, economics, marketing , political science, sociology, and organizational behavior literature. "[The principal-agent
17 CFR 275.203(b)(3)-2 - Methods for counting clients in certain private funds.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Methods for counting clients....203(b)(3)-2 Methods for counting clients in certain private funds. (a) For purposes of section 203(b)(3) of the Act (15 U.S.C. 80b-3(b)(3)), you must count as clients the shareholders, limited partners...
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2010 CFR
2010-04-01
... this chapter. (b) Such reports shall be transmitted promptly after the information required by Form 6-K is made public by the issuer, by the country of its domicile or under the laws of which it was... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports of foreign private...
2011-09-01
civilian, non- government organizations, private citizens and property, religious figures and institutions, tourists , transportation, and utilities...media, maritime – civilian, non- government organizations, private citizens and property, religious figures and institutions, tourists , transportation... government . A society vests much of its security within its government ?s ability to protect; thus, the effectiveness and efficiency of disaster preparedness
NASA Astrophysics Data System (ADS)
Mor, Amit
Significant amounts of natural gas have been discovered in developing countries throughout the years during the course of oil exploration. The vast majority of these resources have not been utilized. Some developing countries may benefit from a carefully planned utilization of their indigenous resources, which can either be exported or used domestically to substitute imported or exportable fuels or feedstock. Governments, potential private sector investors, and financiers have been searching for strategies to promote natural gas schemes, some of which have been in the pipeline for more than two decades. The purpose of this thesis is to identify the crucial factors determining the success or failure of launching natural gas projects in the developing world. The methodology used to evaluate these questions included: (1) establishing a representative sample of natural gas projects in developing countries that were either implemented or failed to materialize during the 1980-1995 period, (2) utilizing a Probit limited dependent variable econometric model in which the explained variable is project success or failure, and (3) choosing representing indicators to reflect the assumed factors affecting project success. The study identified two conditions for project success: (1) the economic viability of the project and (2) securing financing for the investment. The factors that explain the ability or inability of the sponsors to secure financing were: (1) the volume of investment that represented the large capital costs of gas transportation, distribution, and storage, (2) the level of foreign exchange constraint in the host country, and (3) the level of development of the country. The conditions for private sector participation in natural gas projects in developing countries were identified in the study by a Probit model in which the explained variable was private sector participation. The results showed that a critical condition for private sector participation is the financial profitability of a project. Other factors that explained private sector participation and the ability of the private-sector sponsor to secure financing for a project were: (1) the political risk associated with the project, (2) the foreign exchange constraint associated with the project, and (3) whether the project was domestic or export-oriented.
Secret weapon: the "new" Medicare as a route to health security.
Schlesinger, Mark; Hacker, Jacob S
2007-04-01
Over the past twenty years, Medicare has been transformed from a single-payer insurer into a hybrid of complementary public and private insurance arrangements. Despite creating ongoing controversy, these changes have resulted in an ironic and largely overlooked strategic potential: Medicare's evolving hybrid form makes it the most promising vehicle for overcoming the historical obstacles to universal health insurance in the United States. To make this surprising case, we first explore the distinctive political dynamics of programs that, like today's Medicare, are hybrids of public and private arrangements. We then consider how these political dynamics might circumvent past barriers to universal health insurance. Finally, we discuss the strengths and weaknesses of alternative pathways through which Medicare could be expanded to promote health security.
Jahanbakhsh, Maryam; Karimi, Saeed; Hassanzadeh, Akbar; Beigi, Maliheh
2017-01-01
INTRODUCTION: Electronic medical record system (EMRS) is a valuable system for safe access to the patient's data and increases health care quality. Manpower is one of the requirements for EMRS, among which manager is the most important person in any hospital. Taking into account manager's positive attitude and good commitments, EMRS will be implemented successfully. As such, we decided to assess manager's attitude and commitment toward EMRS in Isfahan hospitals in the year of 2014. AIM: This article aimed to determine the hospital managers’ attitude and commitment toward the implementation of EMRS. MATERIALS AND METHODS: The present article is an applied analytic study. Research society consisted of the managers of all the hospitals in Isfahan that include hospitals affiliated to Isfahan University of Medical Sciences, private, and social security hospitals. This study was done in 2014. Data collection tools included a questionnaire for which reliability and validity were determined. Data were analyzed by means of SPSS 20. RESULTS: Average score for the managers’ attitude toward EMRS in the city of Isfahan was 77.5 out of 100 and their average score for commitment was 74.7. Manager's attitude in social security hospitals was more positive than the private and governmental ones (83.3%). In addition, the amount of commitment by the managers in social security hospitals was higher than the same in private and governmental hospitals (86.6%). CONCLUSION: At present, managers’ attitude and commitment in Isfahan hospitals toward EMRS are very high and social security hospitals show more readiness in this respect. PMID:28584837
Vietnam: expanding the social security system.
Pruzin, D
1996-01-01
Viet Nam's shift toward a market-oriented economy has been associated with annual gross domestic product growth of more than 8% over the past 5 years. At the same time, the emergence of private-sector enterprises and subsequent closure of many state-run enterprises have had profound implications for Viet Nam's social protection systems. At present, only 5.6 million of the country's 33 million workers are covered under the state-run social insurance system. In 1995, the government moved to include private enterprises with 10 or more employees in its state benefits system. The International Labor Organization (ILO) has been working with the Vietnamese Government to design and implement a social security system that would extend coverage progressively to excluded sectors and provide support to workers who have become unemployed as a result of the economic transition process. At its Eighth National Congress, the Vietnamese Communist Party approved a 5-year social and economic plan calling for such an expansion of the social insurance system as well as for a guaranteed standard of living for pensioners. To facilitate anticipated changes, activities that were previously divided between the Ministry of Labor, Invalids, and Social Affairs and the Vietnam General Confederation of Labor have been assigned to the newly formed Vietnam Social Insurance (VSI) Organization. Under consideration is a plan to combine some VSI activities with those of the Vietnam Health Insurance Organization. The ILO will assist with training, computerization, and social security fund investing. Noncompliance is a major obstacle to planned expansion of the social security system; about 90% of private firms are still not paying into the system.
Low-power secure body area network for vital sensors toward IEEE802.15.6.
Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu
2009-01-01
Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.
Generating unique IDs from patient identification data using security models.
Mohammed, Emad A; Slack, Jonathan C; Naugler, Christopher T
2016-01-01
The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.
A Secure Authenticated Key Exchange Protocol for Credential Services
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.
2012-09-01
Pentagon, U.S. National Parks and Monuments and Reagan National Airport. Amidst the PCC sits Pentagon City Mall, home to more than 170 stores, a movie...integrated into the homeland security apparatus. As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the...Advisor Dan Moran, PhD Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This thesis
The study and implementation of the wireless network data security model
NASA Astrophysics Data System (ADS)
Lin, Haifeng
2013-03-01
In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.
Securing services in the cloud: an investigation of the threats and the mitigations
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2012-05-01
The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.
[The genetic fingerprints file in France: between security and freedom].
Manaouil, C; Gignon, M; Werbrouck, A; Jarde, O
2008-01-01
In France, the French National File Automated with Genetic fingerprints (FNAEG) is a bank automated by genetic data which is used in penal domain. It facilitates search of the authors of malpractices, or the missing people. Since 1998, it has enabled to resolve numerous criminal cases. An extension of the field of application has been observed. It is a confidential register which is subjected to numerous controls. Nevertheless, private character of the data and its functioning (criminal character of the refusal of taking, periods of answer, and problem of data's conservation) explain the important contesting of associations worried about the respect of personal freedoms.
Gilmore, Anna; Collin, Jeff; Townsend, Joy
2007-01-01
Objectives. The International Monetary Fund encourages privatization of state-owned tobacco industries. Privatization tends to lower cigarette prices, which encourages consumption. This could be countered with effective tax policies. We explored how investment by British American Tobacco (BAT) influenced tax policy in Uzbekistan during privatization there. Methods. We obtained internal documents from BAT and analyzed them using a hermeneutic process to create a chronology of events. Results. BAT thoroughly redesigned the tobacco taxation system in Uzbekistan. It secured (1) a reduction of approximately 50% in the excise tax on cigarettes, (2) an excise system to benefit its brands and disadvantage those of its competitors (particularly Philip Morris), and (3) a tax stamp system from which it hoped to be exempted, because this would likely facilitate its established practice of cigarette smuggling and further its competitive advantage.. Conclusions. Privatization can endanger effective tobacco excise policies. The International Monetary Fund should review its approach to privatization and differentiate the privatization of an industry whose product kills from privatization of other industries. PMID:17138915
Reinforcement Learning for Constrained Energy Trading Games With Incomplete Information.
Wang, Huiwei; Huang, Tingwen; Liao, Xiaofeng; Abu-Rub, Haitham; Chen, Guo
2017-10-01
This paper considers the problem of designing adaptive learning algorithms to seek the Nash equilibrium (NE) of the constrained energy trading game among individually strategic players with incomplete information. In this game, each player uses the learning automaton scheme to generate the action probability distribution based on his/her private information for maximizing his own averaged utility. It is shown that if one of admissible mixed-strategies converges to the NE with probability one, then the averaged utility and trading quantity almost surely converge to their expected ones, respectively. For the given discontinuous pricing function, the utility function has already been proved to be upper semicontinuous and payoff secure which guarantee the existence of the mixed-strategy NE. By the strict diagonal concavity of the regularized Lagrange function, the uniqueness of NE is also guaranteed. Finally, an adaptive learning algorithm is provided to generate the strategy probability distribution for seeking the mixed-strategy NE.
ERIC Educational Resources Information Center
Hantzopoulos, Maria; Shirazi, Roozbeh
2014-01-01
From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…
17 CFR 240.15d-19 - Reports by shell companies on Form 20-F.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.15d-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...
17 CFR 240.13a-19 - Reports by shell companies on Form 20-F.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.13a-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...
17 CFR 240.15d-19 - Reports by shell companies on Form 20-F.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.15d-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...
17 CFR 240.13a-19 - Reports by shell companies on Form 20-F.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports by shell companies on... Under the Securities Exchange Act of 1934 Other Reports § 240.13a-19 Reports by shell companies on Form 20-F. Every foreign private issuer that was a shell company, other than a business combination...
Program Oversight of Contractors on the Battlefield
2011-03-23
contractor to another. For example, under Blackwater Security Firm‟s contract for private security services in Iraq, the contract paid workers guarding...subcontracting relationship with Blackwater . 38 The Coalition Provisional Authority (CPA) provided less than adequate control for approximately $8.8...the Army‟s LOGCAP, the Navy ‟s Construction Capabilities Contract Program, and the Air Force‟s Contract Augmentation Program. These programs remain
ERIC Educational Resources Information Center
Liesen, Joseph J.
2017-01-01
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
2003-05-19
www.bbc.co.uk/cgi-bin/history/renderplain.pl?file=history/war/wwtwo/spying/sis_0/> [27 March 2003]. 37 Ibid. 38 “Operation Overlord,” Saving Private Ryan Online...Security, (Washington, DC: 2002), 17; National Strategy for Combating Terrorism. Washington, DC: 2003. “Operation Overlord,” Saving Private Ryan Online
Comment on "flexible protocol for quantum private query based on B92 protocol"
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min
2017-03-01
In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.
2012-06-01
52 2. Blackwater and Nisour Square.........................................................53 V. RECOGNITION VS. EFFECTIVE DEMOCRATIC...in a theater of war. He has worked extensively with various Privately Contracted Military Firms including but not limited to, Blackwater , DynCorp...Furthermore, the U.S. needed rapid security capabilities seemingly beyond the reach of the U.S. armed forces. Companies such as the former Blackwater
Building the Bridge from War to Peace: Defining Interagency Roles in Rebuilding a Nation
2009-11-01
Politics of Strategic Assessment. Princeton: Princeton UP, 2008. (JF 195 .B76 2008) Carafano, James Jay. Private Sector , Public Wars: Contractors in... Private Security Companies in Iraq." Third World Quarterly 26.4-5 (June 2005): 777-96. Erdmann, Martin, Ambassador. "A Comprehensive Approach to Modern... Sectoral Comparisons. Washington: World Bank, Conflict Prevention & Reconstruction, Environmentally and Socially Sustainable Development Network, 2005
Stakeholder perceptions of a total market approach to family planning in Nicaragua.
Drake, Jennifer Kidwell; Espinoza, Henry; Suraratdecha, Chutima; Lacayo, Yann; Keith, Bonnie M; Vail, Janet G
2011-05-01
To assess private-sector stakeholders' and donors' perceptions of a total market approach (TMA) to family planning in Nicaragua in the context of decreased funding; to build evidence for potential strategies and mechanisms for TMA implementation (including public-private partnerships (PPPs)); and to identify information gaps and future priorities for related research and advocacy. A descriptive exploratory study was conducted in various locations in Nicaragua from March to April 2010. A total of 24 key private-sector stakeholders and donors were interviewed and their responses analyzed using two questionnaires and a stakeholder analysis tool (PolicyMakerTM software). All survey participants supported a TMA, and public-private collaboration, in family planning in Nicaragua. Based on the survey responses, opportunities for further developing PPPs for family planning include building on and expanding existing governmental frameworks, such as Nicaragua's current coordination mechanism for contraceptive security. Obstacles include the lack of ongoing government engagement with the commercial (for-profit) sector and confusion about regulations for its involvement in family planning. Strategies for strengthening existing PPPs include establishing a coordination mechanism specifically for the commercial sector and collecting and disseminating evidence supporting public-private collaboration in family planning. There was no formal or absolute opposition to a TMA or PPPs in family planning in Nicaragua among a group of diverse nongovernmental stakeholders and donors. This type of study can help identify strategies to mobilize existing and potential advocates in achieving articulated policy goals, including diversification of funding sources for family planning to achieve contraceptive security.
40 CFR 280.105 - Local government financial test.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., employee benefits and compensation, office management, planning and zoning, capital projects, interest... agency funds, private trust funds, accounts receivable, value of real property, and other non-security...
40 CFR 280.105 - Local government financial test.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., employee benefits and compensation, office management, planning and zoning, capital projects, interest... agency funds, private trust funds, accounts receivable, value of real property, and other non-security...
40 CFR 280.105 - Local government financial test.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., employee benefits and compensation, office management, planning and zoning, capital projects, interest... agency funds, private trust funds, accounts receivable, value of real property, and other non-security...
7 CFR 1944.516 - Grant purposes.
Code of Federal Regulations, 2010 CFR
2010-01-01
... administrative costs such as workers' compensation, liability insurance, audit reports, travel to and attendance...'s share of Social Security and health benefits. Payments to private retirement funds are prohibited...
7 CFR 1944.516 - Grant purposes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... administrative costs such as workers' compensation, liability insurance, audit reports, travel to and attendance...'s share of Social Security and health benefits. Payments to private retirement funds are prohibited...
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
Durham, J; Michael, Marcos; Hill, P S; Paviignani, E
2015-09-28
In most societies the health marketplace is pluralistic in character, with a mix of formal and informal providers. In high-income countries, state regulation of the market helps ensure quality and access and mitigate market failures. In the present study, using Haiti as a case study, we explore what happens to the functioning of the pluralistic health marketplace in severely disrupted environments where the informal sector is able to flourish. The overall research design was qualitative. Research methods included an extensive documentary and policy analysis, based on peer-reviewed articles, books and "grey" literature--government policy and program reports, unpublished research and evaluations, reviews and reviews from key multilateral and bilateral donors, and non-government organisations, combined with field site visits and in-depth key informant interviews (N = 45). The findings show that state fragility has resulted in a privatised, commoditised and largely unregulated and informal health market. While different market segments can be identified, in reality the boundaries between international/domestic, public/private, for profit/not-for-profit, legal/illegal are hazy and shifting. The lack of state capacity to provide an enabling environment, establish, and enforce its regulatory framework has resulted in a highly segmented, heterogeneous and informal health market. The result is deplorable health indices which are far below regional averages and many other low-income countries. Working in fragile states with limited capacity to undertake the core function of securing the health of its population requires new and innovative ways of working. This needs longer time-frames, combining incremental top-down and bottom-up strategies which recognize and work with state and civil society, public and private actors, formal and informal institutions, and progressively facilitate changes in the different market functions of supply, demand, regulation and supporting functions.
... income and ability to pay. Public and private financing options may also be available. Sources of support ... Learn more by visiting https://www.ncoa.org/economic-security/home-equity/ . Search for additional resources in ...
78 FR 57456 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-18
... collection. Title: Information Regarding Request for Refund of Social Security Tax Erroneously Withheld on..., and, if applicable, consent to an electronic funds withdrawal. Affected Public: Private Sector...
Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system
NASA Astrophysics Data System (ADS)
Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning
2013-06-01
A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.
Cloud-based Predictive Modeling System and its Application to Asthma Readmission Prediction
Chen, Robert; Su, Hang; Khalilia, Mohammed; Lin, Sizhe; Peng, Yue; Davis, Tod; Hirsh, Daniel A; Searles, Elizabeth; Tejedor-Sojo, Javier; Thompson, Michael; Sun, Jimeng
2015-01-01
The predictive modeling process is time consuming and requires clinical researchers to handle complex electronic health record (EHR) data in restricted computational environments. To address this problem, we implemented a cloud-based predictive modeling system via a hybrid setup combining a secure private server with the Amazon Web Services (AWS) Elastic MapReduce platform. EHR data is preprocessed on a private server and the resulting de-identified event sequences are hosted on AWS. Based on user-specified modeling configurations, an on-demand web service launches a cluster of Elastic Compute 2 (EC2) instances on AWS to perform feature selection and classification algorithms in a distributed fashion. Afterwards, the secure private server aggregates results and displays them via interactive visualization. We tested the system on a pediatric asthma readmission task on a de-identified EHR dataset of 2,967 patients. We conduct a larger scale experiment on the CMS Linkable 2008–2010 Medicare Data Entrepreneurs’ Synthetic Public Use File dataset of 2 million patients, which achieves over 25-fold speedup compared to sequential execution. PMID:26958172
Swiss Strategic Communication in the Defense Sector and Its Implications for Swiss Security Policy
2017-12-01
rejected because of its projected higher costs compared to buying the fighter jets.392 Through a public -private partnership, the needed Gripens would...necessary military strategies, overall efficiency and coherence can be augmented to the benefit of national security, the public finances, and the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SWISS STRATEGIC
About machine-readable travel documents
NASA Astrophysics Data System (ADS)
Vaudenay, S.; Vuagnoux, M.
2007-07-01
Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.
Building a successful trauma practice in a community setting.
Althausen, Peter L
2011-12-01
The development of a busy community-based trauma practice is a multifaceted endeavor that requires good clinical judgment, business acumen, interpersonal skills, and negotiation tactics. Private practice is a world in which perfect outcomes are expected and efficiency is paramount. Successful operative outcomes are dependent on solid clinical training, good preoperative planning, and communication with mentors when necessary. Private practitioners must display confidence, polite behavior, and promptness. Maintaining availability for consultation from emergency room physicians, private practice physicians, and local orthopaedic surgeons is a powerful marketing tool. Orthopaedic trauma surgery has been shown to be a profitable field for hospitals and private practitioners. However, physician success depends on a sound understanding of hospital finance, marketing skills, and knowledge of billing and coding. As the financial pressures of medical care increase, hospital negotiation will be paramount, and private practitioners must combine clinical and business skills to provide good patient care while maintaining independence and financial security.
Bellgard, Matthew I; Macgregor, Andrew; Janon, Fred; Harvey, Adam; O'Leary, Peter; Hunter, Adam; Dawkins, Hugh
2012-10-01
There is a need to develop Internet-based rare disease registries to support health care stakeholders to deliver improved quality patient outcomes. Such systems should be architected to enable multiple-level access by a range of user groups within a region or across regional/country borders in a secure and private way. However, this functionality is currently not available in many existing systems. A new approach to the design of an Internet-based architecture for disease registries has been developed for patients with clinical and genetic data in geographical disparate locations. The system addresses issues of multiple-level access by key stakeholders, security and privacy. The system has been successfully adopted for specific rare diseases in Australia and is open source. The results of this work demonstrate that it is feasible to design an open source Internet-based disease registry system in a scalable and customizable fashion and designed to facilitate interoperability with other systems. © 2012 Wiley Periodicals, Inc.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or Other Legal Demands for Testimony or... Administrator of FEMA. (c) Private litigation refers to any legal proceeding which does not involve as a named...
International Outreach and Coordination Strategy for the National Strategy for Maritime Security
2005-11-01
economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime
Commercial observation satellites: broadening the sources of geospatial data
NASA Astrophysics Data System (ADS)
Baker, John C.; O'Connell, Kevin M.; Venzor, Jose A.
2002-09-01
Commercial observation satellites promise to broaden substantially the sources of imagery data available to potential users of geospatial data and related information products. We examine the new trend toward private firms acquiring and operating high-resolution imagery satellites. These commercial observation satellites build on the substantial experience in Earth observation operations provided by government-owned imaging satellites for civilian and military purposes. However, commercial satellites will require governments and companies to reconcile public and private interests in allowing broad public access to high-resolution satellite imagery data without creating national security risks or placing the private firms at a disadvantage compared with other providers of geospatial data.
SSeCloud: Using secret sharing scheme to secure keys
NASA Astrophysics Data System (ADS)
Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang
2017-08-01
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
McCue, M J; Thompson, J M; Dodd-McCue, D
Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.
76 FR 3089 - Roundtable on Federal Government Engagement in Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
... of a Smart Grid, secure and interoperable electronic health records, cybersecurity, cloud computing... government engage in sectors where there is a compelling national interest? How are existing public- private...
When the business of nursing was the nursing business: the private duty registry system, 1900-1940.
Whelan, Jean C
2012-05-31
In the initial decades of the 20th century, most nurses worked in the private sector as private duty nurses dependent on their own resources for securing and obtaining employment with individual patients. To organize and systematize the ways in which nurses sought jobs, a structure of private duty registries, agencies which connected nurses with patients, was established via professional nurse associations. This article describes the origins of the private duty nurse labor market as the main employment field for early nurses and ways in which the private duty registry system connected nurses and patients. The impact of professional nurses associations and two registries, (New York and Chicago) illustrates how the business of nursing was carried out, including registry formation, operation, and administration. Private duty nurses are compelling examples of a previous generation of nurse entrepreneurs. The discussion identifies problems and challenges of private nursing practice via registries, including the decline and legacy of this innovative nurse role. The story of early 20th century nurse owned and operated registries provides an early and critical historical illustration of the realization of nurse power, entrepreneurship, and control over professional practice that we still learn from today.
2013-01-01
accountability and regulation, and civil- military relations and contractors’ effects on the military (Avant, 2005; Chesterman, 2010–2011; Cotton et al...standards aimed at regulating the private security industry, in particular, clearly mandate that these firms establish policies that pro- mote a safe...Gansler_Commission_Report_Final_071031.pdf Cotton , Sarah K., Ulrich Petersohn, Molly Dunigan, Q Burkhart, Megan Zander-Cotugno, Edward O’Connell, and Michael Webber, Hired Guns: Views
Operational Implications of Private Military Companies in the Global War on Terror
2005-02-01
being prosecuted in Iraq and Afghanistan at the moment. That said - the construct is the most utilitarian way to classify PMCs available. 14 There is...of operational design are a utilitarian way of breaking down the issue into its component parts. FM 3-0 lists these elements as End State, Centre of...potential, and ensure the humanitarian use of private peace keeping services for the benefit of international peace and human security.” Members of
Health services reforms in revolutionary Nicaragua.
Garfield, R M; Taboada, E
1984-01-01
Before the Nicaraguan revolution of 1979, access to health services was largely limited to the affluent sectors of the urban population and the minority of workers with social security coverage. Repeated attempts at reform by organized medicine were ineffective. Since the revolution, a tremendous expansion in health services has occurred. The national health system receives approximately one-third of its funds from the social security system. Steadily increasing equity in access is a result of the promotion of primary care, health campaigns involving up to 10 per cent of the general population as volunteers, the use of paramedical aides, and foreign assistance. Private practice nevertheless remains strong. In the coming years, several complex issues must be examined, including: a balance in the number of nurses and doctors trained, the role of private practice, and the relationship of the Ministry of Health to the social security system. Further progress in health reforms may be delayed by the defensive war which Nicaragua is fighting on its northern and southern borders. Despite emergent health problems in the war zones, most of the innovative aspects of the health system remain intact as of this writing. PMID:6476169
Generating unique IDs from patient identification data using security models
Mohammed, Emad A.; Slack, Jonathan C.; Naugler, Christopher T.
2016-01-01
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. Method: We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. Results: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. Conclusion: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data. PMID:28163977
Digital Camera with Apparatus for Authentication of Images Produced from an Image File
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1996-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.
Public-Private Employee Retirement Parity Act
Sen. Burr, Richard [R-NC
2013-11-12
Senate - 11/12/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
76 FR 20450 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
... participate in U.S. Treasury Securities Auctions via TAPPS Link. Affected Public: Private Sector: Businesses... of the Public Debt, 200 Third Street, Parkersburg, West Virginia 26106; (304) 480-8112. OMB Reviewer...
44 CFR 5.84 - Production of documents in private litigation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or Other Legal Demands for Testimony or the Production or Disclosure of Records or Other Information § 5.84...
44 CFR 5.87 - Testimony of FEMA employees in private litigation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or Other Legal Demands for Testimony or the Production or Disclosure of Records or Other Information...
Symmetrically private information retrieval based on blind quantum computing
NASA Astrophysics Data System (ADS)
Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling
2015-05-01
Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.
Social Security Privatization and the Annuities Market
1998-02-01
34Economic Status as a Determinant of Mortality Among Black and White Older Men: Does Poverty Kill?" Population Studies, vol. 47 (1993), pp. 427-436. 43...have been analyzing the financial pressures on Social Security and devising new ways Americans could prepare for retirement. Those proposals...loosely called "pri- vatization"—would prefund retirement income in personal accounts that workers could invest in the financial market and then spend
A State Partnership Program (SPP) for Afghanistan
2009-03-01
former eastern bloc countries (Estonia, Latvia, Lithuania ) that emerged from the Cold War independent, but potentially precarious following the fall of the...asserts the necessity to “engage and involve the private sector in reconstruction” and also “to secure and protect the natural resources, energy production ...military working dogs , and combat lifesaver training amongst many38 15 An increasingly important country in terms of CENTCOM’s security cooperation
ERIC Educational Resources Information Center
Wechsler, Henry; Moeykens, Barbara A.; DeJong, William
This bulletin reviews the results of a survey of college administrators and security officials by the Harvard School of Public Health concerning their schools' policies regarding alcohol problems on campus. A total of 529 respondents from 347 public and private four-year institutions were asked to complete a mailed questionnaire which examined…
ERIC Educational Resources Information Center
Machi, Ethel
2009-01-01
From October 21 to 23, 2008, The Heritage Foundation, supported by the McCormick Tribune Foundation, convened leading education and national security experts as well as private-sector representatives to discuss methods for strengthening America's competitiveness by improving its performance in science, technology, engineering, and mathematics…
Namoğlu, Nihan; Ulgen, Yekta
2013-01-01
Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.
A Weakest Precondition Approach to Robustness
NASA Astrophysics Data System (ADS)
Balliu, Musard; Mastroeni, Isabella
With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu
2016-09-01
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Supported by the National Natural Science Foundation of China under Grant No. 61402407
Avila-Burgos, Leticia; Cahuana-Hurtado, Lucero; Montañez-Hernandez, Julio; Servan-Mori, Edson; Aracena-Genao, Belkis; Del Río-Zolezzi, Aurora
2016-01-01
To analyze whether the changes observed in the level and distribution of resources for maternal health and family planning (MHFP) programs from 2003 to 2012 were consistent with the financial goals of the related policies. A longitudinal descriptive analysis of the Mexican Reproductive Health Subaccounts 2003-2012 was performed by financing scheme and health function. Financing schemes included social security, government schemes, household out-of-pocket (OOP) payments, and private insurance plans. Functions were preventive care, including family planning, antenatal and puerperium health services, normal and cesarean deliveries, and treatment of complications. Changes in the financial imbalance indicators covered by MHFP policy were tracked: (a) public and OOP expenditures as percentages of total MHFP spending; (b) public expenditure per woman of reproductive age (WoRA, 15-49 years) by financing scheme; (c) public expenditure on treating complications as a percentage of preventive care; and (d) public expenditure on WoRA at state level. Statistical analyses of trends and distributions were performed. Public expenditure on government schemes grew by approximately 300%, and the financial imbalance between populations covered by social security and government schemes decreased. The financial burden on households declined, particularly among households without social security. Expenditure on preventive care grew by 16%, narrowing the financing gap between treatment of complications and preventive care. Finally, public expenditure per WoRA for government schemes nearly doubled at the state level, although considerable disparities persist. Changes in the level and distribution of MHFP funding from 2003 to 2012 were consistent with the relevant policy goals. However, improving efficiency requires further analysis to ascertain the impact of investments on health outcomes. This, in turn, will require better financial data systems as a precondition for improving the monitoring and accountability functions in Mexico.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-22
...- governmental and civil society organizations, think tanks, educational institutions, private sector companies... process to develop voluntary, non-binding international principles for responsible investment in...
77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
.... DHS Sector Specialists or Protective Security Advisors email the form to the individual who then... clearance request form is signed by both the Federal official who nominated the applicant and the Assistant...
49 CFR Appendix B to Part 1580 - Summary of the Applicability of Part 1580
Code of Federal Regulations, 2010 CFR
2010-10-01
... Part 1580 [This is a summary—see body of text for complete requirements] Security measure and rule... systems Certain other rail operations (private, business/office, circus, tourist, historic, excursion...
77 FR 2271 - Technical Advisory Committees; Notice of Recruitment of Private-Sector Members
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... range of goods, technologies, and software presently controlled for national security, non-proliferation.... Members of the Committees will not be compensated for their services. The seven TACs are responsible for...
75 FR 62509 - Technical Advisory Committees; Notice of Recruitment of Private-Sector Members
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... range of goods, technologies, and software presently controlled for national security, non-proliferation.... Members of the Committees will not be compensated for their services. The seven TACs are responsible for...
System Access | High-Performance Computing | NREL
) systems. Photo of man looking at a large computer monitor with a colorful, visual display of data. System secure shell gateway (SSH) or virtual private network (VPN). User Accounts Request a user account
Genomics and privacy: implications of the new reality of closed data for the field.
Greenbaum, Dov; Sboner, Andrea; Mu, Xinmeng Jasmine; Gerstein, Mark
2011-12-01
Open source and open data have been driving forces in bioinformatics in the past. However, privacy concerns may soon change the landscape, limiting future access to important data sets, including personal genomics data. Here we survey this situation in some detail, describing, in particular, how the large scale of the data from personal genomic sequencing makes it especially hard to share data, exacerbating the privacy problem. We also go over various aspects of genomic privacy: first, there is basic identifiability of subjects having their genome sequenced. However, even for individuals who have consented to be identified, there is the prospect of very detailed future characterization of their genotype, which, unanticipated at the time of their consent, may be more personal and invasive than the release of their medical records. We go over various computational strategies for dealing with the issue of genomic privacy. One can "slice" and reformat datasets to allow them to be partially shared while securing the most private variants. This is particularly applicable to functional genomics information, which can be largely processed without variant information. For handling the most private data there are a number of legal and technological approaches-for example, modifying the informed consent procedure to acknowledge that privacy cannot be guaranteed, and/or employing a secure cloud computing environment. Cloud computing in particular may allow access to the data in a more controlled fashion than the current practice of downloading and computing on large datasets. Furthermore, it may be particularly advantageous for small labs, given that the burden of many privacy issues falls disproportionately on them in comparison to large corporations and genome centers. Finally, we discuss how education of future genetics researchers will be important, with curriculums emphasizing privacy and data security. However, teaching personal genomics with identifiable subjects in the university setting will, in turn, create additional privacy issues and social conundrums. © 2011 Greenbaum et al.
2010-01-19
they are generally considered to be support personnel under Title X. 34 A 2007 study published by the Combat Studies Institute determined the tooth...for which it contracts with private companies in military operations. Congress has generally accepted the concept of using unarmed contractors to...installations and U.S. embassies and consulates in a number of countries where stability generally is not an issue. 3 According to one report, “Not