Sample records for safe secure efficient

  1. FAA Directives System

    DOT National Transportation Integrated Search

    1992-08-26

    Consistent with the Federal Aviation Administration's mission to foster a safe, : secure, and efficient aviation system is the need for an effective and efficient : process for communitcating policy and procedures. The FAA Directives System : provide...

  2. Efficient proof of ownership for cloud storage systems

    NASA Astrophysics Data System (ADS)

    Zhong, Weiwei; Liu, Zhusong

    2017-08-01

    Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.

  3. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... resources more efficiently, build on one another's expertise, drive innovation, engage in collective action... utilizing diverse perspectives, skills, tools, and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring that to keep our Nation safe ``we must tap the ingenuity outside...

  4. Developing Ministerial Collaborative Planning Capacity

    DTIC Science & Technology

    2012-03-14

    1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and

  5. 78 FR 77608 - Requirements for Contacts with Federal Credit Unions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... an FCU official, NCUA has no way of ensuring the environment is safe for its employees or conducive to working efficiently and securely. NCUA staff who have conducted on-site contacts in homes have... other FCU contacts occur in a professional and safe setting. \\5\\ Id. 1766(j)(1). \\6\\ Id. 1789(a)(4). 3...

  6. Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kovacic, Donald N

    2015-01-01

    This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture

  7. Analysis of the gut bacterial communities in beef cattle and their association with feed intake, growth, and efficiency

    USDA-ARS?s Scientific Manuscript database

    The impetus behind the global food security challenge is direct, with the necessity to feed over 9 billion people by 2050. Developing a food-secure world, where people have access to a safe and sustainable food supply is the principal goal of this challenge. To achieve this end, beef production ent...

  8. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    DTIC Science & Technology

    2012-01-01

    Martin B. Zimmerman, “Market Incentives for Safe Commercial Airline Operation,” American Economic Review, Vol. 78, No. 5, 1988, pp. 913–935. Bosch...Modeling,” in Stuart Johnson, Martin C. Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif...677–725. Persico, Nicola, and Petra E. Todd, “Passenger Profiling, Imperfect Screening, and Airport Security,” American Economic Review, Vol. 95

  9. Assessment of the U. S. Marine Transportation System : a report to congress

    DOT National Transportation Integrated Search

    1999-09-01

    Discusses the collaborative effort to assess the adequacy of the Nation's marine : transportation system (including ports, waterways, harbor approach channels, and : their intermodal connections) to operate in a safe, efficient, secure, and : environ...

  10. 78 FR 45277 - Notice of Intent to Prepare a Draft Environmental Impact Statement (EIS) for Development of a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... that are safe, humane, cost-efficient, and appropriately secure, and that provide work and other self-improvement opportunities to assist offenders in becoming law-abiding citizens. The Bureau accomplishes its...

  11. [Application of password manager software in health care].

    PubMed

    Ködmön, József

    2016-12-01

    When using multiple IT systems, handling of passwords in a secure manner means a potential source of problem. The most frequent issues are choosing the appropriate length and complexity, and then remembering the strong passwords. Password manager software provides a good solution for this problem, while greatly increasing the security of sensitive medical data. This article introduces a password manager software and provides basic information of the application. It also discusses how to select a really secure password manager software and suggests a practical application to efficient, safe and comfortable use for health care. Orv. Hetil., 2016, 157(52), 2066-2073.

  12. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  13. Peace Operations in Mali: Theory into Practice Then Measuring Effectiveness

    DTIC Science & Technology

    2017-06-09

    community’s response along two broad lines of effort (LOE): Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a... Safe and Secure Environment , two objectives were measured. Objective #1 sought the Cessation of Large Scale Violence. Success was attained, as...Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a Safe and Secure Environment , two objectives were

  14. Class Size, Pre-Kindergarten, and Educational Adequacy: Costs and Funding Options for Florida. Policy Brief.

    ERIC Educational Resources Information Center

    Harris, Douglas N.

    2004-01-01

    Since 1998, Florida voters have passed three amendments that pressure state officials to increase education spending. The 1998 amendment introduced constitutional language establishing the importance of education to the state and its citizens, requiring "adequate provision?for a uniform, efficient, safe, secure, and high quality system of free…

  15. Funding Florida's Schools: Adequacy, Costs, and the State Constitution. Policy Brief.

    ERIC Educational Resources Information Center

    Harris, Douglas N.

    2004-01-01

    In 1998, Florida voters passed a unique amendment to the state constitution requiring the state to make "adequate provision...for a uniform, efficient, safe, secure, and high quality system of free public schools." This brief examines how Florida courts are likely to interpret this constitutional amendment and whether Florida's funding system will…

  16. Homeland Security Strategic Plan for the Non-Major Local Law Enforcement Agency

    DTIC Science & Technology

    2011-09-01

    The Los Angeles Police ... the community, which allows the police department to be more efficient and effective in keeping citizens safe. Technology continues to change and...saving hundreds of manhours per year in crime data collection. Although the Independence Missouri Police Department made an effort to use Web

  17. Surveillance of ground vehicles for airport security

    NASA Astrophysics Data System (ADS)

    Blasch, Erik; Wang, Zhonghai; Shen, Dan; Ling, Haibin; Chen, Genshe

    2014-06-01

    Future surveillance systems will work in complex and cluttered environments which require systems engineering solutions for such applications such as airport ground surface management. In this paper, we highlight the use of a L1 video tracker for monitoring activities at an airport. We present methods of information fusion, entity detection, and activity analysis using airport videos for runway detection and airport terminal events. For coordinated airport security, automated ground surveillance enhances efficient and safe maneuvers for aircraft, unmanned air vehicles (UAVs) and unmanned ground vehicles (UGVs) operating within airport environments.

  18. JOWOG 22/2 - Actinide Chemical Technology (July 9-13, 2012)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jackson, Jay M.; Lopez, Jacquelyn C.; Wayne, David M.

    2012-07-05

    The Plutonium Science and Manufacturing Directorate provides world-class, safe, secure, and reliable special nuclear material research, process development, technology demonstration, and manufacturing capabilities that support the nation's defense, energy, and environmental needs. We safely and efficiently process plutonium, uranium, and other actinide materials to meet national program requirements, while expanding the scientific and engineering basis of nuclear weapons-based manufacturing, and while producing the next generation of nuclear engineers and scientists. Actinide Process Chemistry (NCO-2) safely and efficiently processes plutonium and other actinide compounds to meet the nation's nuclear defense program needs. All of our processing activities are done in amore » world class and highly regulated nuclear facility. NCO-2's plutonium processing activities consist of direct oxide reduction, metal chlorination, americium extraction, and electrorefining. In addition, NCO-2 uses hydrochloric and nitric acid dissolutions for both plutonium processing and reduction of hazardous components in the waste streams. Finally, NCO-2 is a key team member in the processing of plutonium oxide from disassembled pits and the subsequent stabilization of plutonium oxide for safe and stable long-term storage.« less

  19. 2015 Enterprise Strategic Vision

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2015-08-01

    This document aligns with the Department of Energy Strategic Plan for 2014-2018 and provides a framework for integrating our missions and direction for pursuing DOE’s strategic goals. The vision is a guide to advancing world-class science and engineering, supporting our people, modernizing our infrastructure, and developing a management culture that operates a safe and secure enterprise in an efficient manner.

  20. Security Implications of Physical Design Attributes in the Emergency Department.

    PubMed

    Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E

    2016-07-01

    Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.

  1. Energy efficiency in urban management: Russian and world experience

    NASA Astrophysics Data System (ADS)

    Pryadko, Igor

    2017-10-01

    The article discusses the role of energetics in creating a comfortable and safe environment of modern megacities, and the problem is considered in the socio-economic aspect. The object is the energy security of the city, and the subject is the influence of urban society on the formation of energy security. In particular, the problems are raised: ecological problems of urban energy supply, the condition of surface layer of the atmosphere near electric power lines. The author assesses the actions, implemented by the urban authorities in Mytischi, in the southwestern areas of New Moscow. The author assesses these sample areas on the basis of Ch. Landry’s concept of self-training, designated for municipal authorities and urban communities, and offers several successfully implemented self-study cases and in the light of modern methods of ensuring energy security. The forecasts of creation of energy-safe space, made by modern sociologist-urbanist Leo Hollis, are taken into account. The author also considers some of the economic aspects of biosphere safety. In particular, he insists that biosphere safety, convenience, and comfort have developed into competitive advantages in the housing market.

  2. Analysis on the University’s Network Security Level System in the Big Data Era

    NASA Astrophysics Data System (ADS)

    Li, Tianli

    2017-12-01

    The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.

  3. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less

  4. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments

    PubMed Central

    Avalappampatty Sivasamy, Aneetha; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668

  5. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments.

    PubMed

    Sivasamy, Aneetha Avalappampatty; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T(2) method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T(2) statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

  6. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging doesmore » not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4« less

  7. Provably Secure Password-based Authentication in TLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less

  8. Strategies for Countering Terrorist Safe Havens

    DTIC Science & Technology

    2014-02-20

    within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to...leadership targeting within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case ...surrogate forces and pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case

  9. How Safe Are Our Libraries?

    ERIC Educational Resources Information Center

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  10. Perceptions of health care professionals on the safety and security at Odi District Hospital, Gauteng, South Africa

    PubMed Central

    Okeke, Sunday O.

    2017-01-01

    Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444

  11. Detection and Prevention of Insider Threats in Database Driven Web Services

    NASA Astrophysics Data System (ADS)

    Chumash, Tzvi; Yao, Danfeng

    In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider both insider and outsider attacks in the third-party web hosting scenarios. We present SafeWS, a modular solution that is inserted between server side scripts and databases in order to prevent and detect website hijacking and unauthorized access to stored data. To achieve the required security, SafeWS utilizes a combination of lightweight cryptographic integrity and encryption tools, software engineering techniques, and security data management principles. We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small. SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers.

  12. 78 FR 34335 - Foreign-Trade Zone (FTZ) 141-Monroe County, New York; Notification of Proposed Production...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-07

    ... steel, fire and water resistant storage chests, gun safes, security safes, portable security safes, cash..., touchpads, plastic gun racks, keypad assemblies, panel lock assemblies, door backs, plastic trays, drawers..., wood gun shelf racks, cable assemblies, communication cables, gasket kits, door springs, metal handles...

  13. Safe Grid

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.

  14. The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm

    DTIC Science & Technology

    2017-03-01

    and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201

  15. Strategies for Countering Terrorist Safe Havens

    DTIC Science & Technology

    2013-12-01

    tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine these strategies...safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine...pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case studies will demonstrate

  16. Safe-haven locking device

    DOEpatents

    Williams, J.V.

    1984-04-26

    Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.

  17. Goals, Strategies

    Science.gov Websites

    stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure

  18. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  19. Trust Model to Enhance Security and Interoperability of Cloud Environment

    NASA Astrophysics Data System (ADS)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  20. Safe teleradiology: information assurance as project planning methodology

    NASA Astrophysics Data System (ADS)

    Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2003-05-01

    This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.

  1. Ch. 7: Food Safety, Nutrition, and Distribution

    USDA-ARS?s Scientific Manuscript database

    A safe and nutritious food supply is a vital component of food security. Food security, in a public health context, can be summarized as permanent access to a sufficient, safe, and nutritious food supply needed to maintain an active and healthy lifestyle. The impacts of climate change on food produc...

  2. 78 FR 27392 - Statement of Organization, Functions, and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... Office (AMSO) provides a safe, secure, healthy, and functional workplace environment for CDC staff by... provides the tools needed for workers to be safe, work in a healthy environment, and ensures environmental... Office of Security and Emergency Preparedness (CAJJ); Office of Safety, Health and Environment (CAJP...

  3. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  4. ASIS healthcare security benchmarking study.

    PubMed

    2001-01-01

    Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.

  5. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    PubMed

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Sandia National Laboratories: About Sandia: Leadership

    Science.gov Websites

    Working With Sandia Working With Sandia Prospective Suppliers What Sandia Looks For In Our Suppliers What provides leadership and management direction for the safe, secure execution of all Sandia missions. View implement the Labs Director's strategic vision for safe, secure operations at Sandia. View full biography

  7. Final Report, Next-Generation Mega-Voltage Cargo-Imaging System for Cargo Conainer Inspection, March 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. James Clayton, Ph.D., Varian Medical Systems-Security & Inspection Products; Dr. Emma Regentova, Ph.D, University of Nevada Las Vegas; Dr. Evangelos Yfantis, Ph.D., University of Nevada, Las Vegas

    The UNLV Research Foundation, as the primary award recipient, teamed with Varian Medical Systems-Security & Inspection Products and the University of Nevada Las Vegas (UNLV) for the purpose of conducting research and engineering related to a "next-generation" mega-voltage imaging (MVCI) system for inspection of cargo in large containers. The procurement and build-out of hardware for the MVCI project has been completed. The K-9 linear accelerator and an optimized X-ray detection system capable of efficiently detecting X-rays emitted from the accelerator after they have passed through the device is under test. The Office of Science financial assistance award has made possiblemore » the development of a system utilizing a technology which will have a profound positive impact on the security of U.S. seaports. The proposed project will ultimately result in critical research and development advances for the "next-generation" Linatron X-ray accelerator technology, thereby providing a safe, reliable and efficient fixed and mobile cargo inspection system, which will very significantly increase the fraction of cargo containers undergoing reliable inspection as the enter U.S. ports. Both NNSA/NA-22 and the Department of Homeland Security's Domestic Nuclear Detection Office are collaborating with UNLV and its team to make this technology available as soon as possible.« less

  8. Safe and Secure Schools Assessment. Public School Information. Legislative Report, 2008

    ERIC Educational Resources Information Center

    Idaho State Department of Education, 2008

    2008-01-01

    As a result of high profile shootings and critical incidents in schools on a national level, combined with the lack of a cohesive, standardized approach to safety and security in Idaho Schools, Superintendent Tom Luna requested an appropriation to address this issue and the Legislature allocated 5150.000 in FY 2008 for the Safe and Secure…

  9. Early Arrival or Trespassing? Leadership, School Security, and the Right to the School

    ERIC Educational Resources Information Center

    Irby, Decoteau J.; Thomas, Christopher

    2013-01-01

    School leaders are under constant pressure to ensure that schools are safe and to demonstrate that student safety and discipline are priorities. In many districts, schools rely on local law enforcement, school police, or security personnel to assist with promoting and maintaining safe schools. To encourage school leaders to think critically about…

  10. Applications for radio-frequency identification technology in the perioperative setting.

    PubMed

    Zhao, Tiyu; Zhang, Xiaoxiang; Zeng, Lili; Xia, Shuyan; Hinton, Antentor Othrell; Li, Xiuyun

    2014-06-01

    We implemented a two-year project to develop a security-gated management system for the perioperative setting using radio-frequency identification (RFID) technology to enhance the management efficiency of the OR. We installed RFID readers beside the entrances to the OR and changing areas to receive and process signals from the RFID tags that we sewed into surgical scrub attire and shoes. The system also required integrating automatic access control panels, computerized lockers, light-emitting diode (LED) information screens, wireless networks, and an information system. By doing this, we are able to control the flow of personnel and materials more effectively, reduce OR costs, optimize the registration and attire-changing process for personnel, and improve management efficiency. We also anticipate this system will improve patient safety by reducing the risk of surgical site infection. Application of security-gated management systems is an important and effective way to help ensure a clean, convenient, and safe management process to manage costs in the perioperative area and promote patient safety. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  11. On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)

    NASA Astrophysics Data System (ADS)

    Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao

    2015-05-01

    An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.

  12. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  13. Aviation security : terrorist acts demonstrate urgent need to improve security at the nation's airports

    DOT National Transportation Integrated Search

    2001-09-20

    A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...

  14. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  15. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    PubMed

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  16. [Product safety analysis of somatic cell cloned bovine].

    PubMed

    Hua, Song; Lan, Jie; Song, Yongli; Lu, Chenglong; Zhang, Yong

    2010-05-01

    Somatic cell cloning (nuclear transfer) is a technique through which the nucleus (DNA) of a somatic cell is transferred into an enucleated oocyte for the generation of a new individual, genetically identical to the somatic cell donor. It could be applied for the enhancement of reproduction rate and the improvement of food products involving quality, yield and nutrition. In recent years, the United States, Japan and Europe as well as other countries announced that meat and milk products made from cloned cattle are safe for human consumption. Yet, cloned animals are faced with a wide range of health problems, with a high death rate and a high incidence of disease. The precise causal mechanisms for the low efficiency of cloning remain unclear. Is it safe that any products from cloned animals were allowed into the food supply? This review focuses on the security of meat, milk and products from cloned cattle based on the available data.

  17. Smart security system for Indian rail wagons using IOT

    NASA Astrophysics Data System (ADS)

    Bhanuteja, S.; Shilpi, S.; Pragna, K.; Arun, M.

    2017-11-01

    The objective of this project is to create a Security System for the goods that are carried in open top freight trains. The most efficient way to secure anything from thieves is to have a continuous observation. So for continuous observation of the open top freight train, Camera module2 has been used. Passive Infrared Sensor (PIR) 1 has been used to detect the motion or to sense movement of people, animals, or any object. So whenever a motion is detected by the PIR sensor, the Camera takes a picture of that particular instance. That picture will be send to the Raspberry PI which does Skin Detection Algorithm and specifies whether that motion was created by a human or not. If a human makes it, then that picture will send to the drop box. Any Official can have a look at the same. The existing system has a CCTV installed at various critical locations like bridges, railway stations etc. but they does not provide a continuous observation. This paper describes about the Security System that provides continuous observation for open top freight trains so that goods can be carried safely to its destination.

  18. A simple technique of laparoscopic port closure allowing wound extension.

    PubMed

    Christey, G R; Poole, G

    2002-04-01

    Reliable and safe access to the abdominal cavity and efficient removal of the resected gallbladder are essential to laparoscopic cholecystectomy. The unpredictable size of the cholecystectomy specimen can sometimes lead to frustration at the time of removal. A simple technique has been developed that allows for tissue extraction and easy fascial closure regardless of the size of the specimen. This is achieved by using a four bite "U-shaped" purse string at the time of Hasson insertion, with cephalad advancement of the proximal two bites. This allows for variable wound extension and secure closure, without the need for additional sutures.

  19. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    PubMed

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  20. 76 FR 8628 - Safe, Efficient Use and Preservation of the Navigable Airspace; OMB Approval of Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ...-25002; Amendment No. 77-13] RIN 2120-AH31 Safe, Efficient Use and Preservation of the Navigable Airspace... on July 21, 2010, entitled Safe, Efficient Use and Preservation of the Navigable Airspace. DATES: The..., 2010, the final rule entitled Safe, Efficient Use and Preservation of the Navigable Airspace, was...

  1. Design of a secure remote management module for a software-operated medical device.

    PubMed

    Burnik, Urban; Dobravec, Štefan; Meža, Marko

    2017-12-09

    Software-based medical devices need to be maintained throughout their entire life cycle. The efficiency of after-sales maintenance can be improved by managing medical systems remotely. This paper presents how to design the remote access function extensions in order to prevent risks imposed by uncontrolled remote access. A thorough analysis of standards and legislation requirements regarding safe operation and risk management of medical devices is presented. Based on the formal requirements, a multi-layer machine design solution is proposed that eliminates remote connectivity risks by strict separation of regular device functionalities from remote management service, deploys encrypted communication links and uses digital signatures to prevent mishandling of software images. The proposed system may also be used as an efficient version update of the existing medical device designs.

  2. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  3. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe...

  4. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  5. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  6. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  7. 76 FR 38463 - SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight Responsibilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... Parts 30 and 3400 SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight... No. FR-5271-F-03] RIN 2502-A170 SAFE Mortgage Licensing Act: Minimum Licensing Standards and... pursuant to the Secure and Fair Enforcement Mortgage Licensing Act of 2008 (SAFE Act or Act), to ensure...

  8. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  9. Science and technology in the stockpile stewardship program, S & TR reprints

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Storm, E

    This document reports on these topics: Computer Simulations in Support of National Security; Enhanced Surveillance of Aging Weapons; A New Precision Cutting Tool: The Femtosecond Laser; Superlasers as a Tool of Stockpile Stewardship; Nova Laser Experiments and Stockpile Stewardship; Transforming Explosive Art into Science; Better Flash Radiography Using the FXR; Preserving Nuclear Weapons Information; Site 300Õs New Contained Firing Facility; The Linear Electric Motor: Instability at 1,000 gÕs; A Powerful New Tool to Detect Clandestine Nuclear Tests; High Explosives in Stockpile Surveillance Indicate Constancy; Addressing a Cold War Legacy with a New Way to Produce TATB; JumpinÕ Jupiter! Metallic Hydrogen;more » Keeping the Nuclear Stockpile Safe, Secure, and Reliable; The Multibeam FabryÐPerot Velocimeter: Efficient Measurements of High Velocities; Theory and Modeling in Material Science; The Diamond Anvil Cell; Gamma-Ray Imaging Spectrometry; X-Ray Lasers and High-Density Plasma« less

  10. Potential applications of cryogenic technologies to plant genetic improvement and pathogen eradication.

    PubMed

    Wang, Biao; Wang, Ren-Rui; Cui, Zhen-Hua; Bi, Wen-Lu; Li, Jing-Wei; Li, Bai-Quan; Ozudogru, Elif Aylin; Volk, Gayle M; Wang, Qiao-Chun

    2014-01-01

    Rapid increases in human populations provide a great challenge to ensure that adequate quantities of food are available. Sustainable development of agricultural production by breeding more productive cultivars and by increasing the productive potential of existing cultivars can help meet this demand. The present paper provides information on the potential uses of cryogenic techniques in ensuring food security, including: (1) long-term conservation of a diverse germplasm and successful establishment of cryo-banks; (2) maintenance of the regenerative ability of embryogenic tissues that are frequently the target for genetic transformation; (3) enhancement of genetic transformation and plant regeneration of transformed cells, and safe, long-term conservation for transgenic materials; (4) production and maintenance of viable protoplasts for transformation and somatic hybridization; and (5) efficient production of pathogen-free plants. These roles demonstrate that cryogenic technologies offer opportunities to ensure food security. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Securing the User's Work Environment

    NASA Technical Reports Server (NTRS)

    Cardo, Nicholas P.

    2004-01-01

    High performance computing at the Numerical Aerospace Simulation Facility at NASA Ames Research Center includes C90's, J90's and Origin 2000's. Not only is it necessary to protect these systems from outside attacks, but also to provide a safe working environment on the systems. With the right tools, security anomalies in the user s work environment can be deleted and corrected. Validating proper ownership of files against user s permissions, will reduce the risk of inadvertent data compromise. The detection of extraneous directories and files hidden amongst user home directories is important for identifying potential compromises. The first runs of these utilities detected over 350,000 files with problems. With periodic scans, automated correction of problems takes only minutes. Tools for detecting these types of problems as well as their development techniques will be discussed with emphasis on consistency, portability and efficiency for both UNICOS and IRIX.

  12. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    EPA Pesticide Factsheets

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  13. Using the Method of Water Poverty Index (WPI) to Evaluate the Region Water Security

    NASA Astrophysics Data System (ADS)

    Fu, Q.; Kachanoski, G.

    2008-12-01

    Water security is a widely concerned issue in the world nowadays. A new method, water poverty index (WPI), has been used to evaluate the regional water security. Twelve state farms in Heilongjiang Province, Northeastern China were selected to evaluate water security status based on the data of 2006 by using WPI and mean deviation grading method. The method of WPI includes five key indexes, such as resources(R), access (A), capacity(C), utilization (U) and environment (E). Each key index includes several sub-indexes. According to the results of WPI, the grade of each farm has been calculated by using the method of mean deviation grading. Thus, the radar images can be protracted of each farm. From the radar images, the conclusions can be drawn that the WPI values of Farms 853 and Hongqiling were in very safe status, while that of Farm Raohe was in safe status, those of Farms Youyi, 597, 852, 291 and Jiangchuan were in moderate safe status, that of Farm Beixing was in low safe status and those of Farms Shuangyashan, Shuguang and Baoshan were in unsafe status. The results from this study can provide basic information for decision making on rational use of water resources and regulations for regional water safety guarantee system.

  14. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is...

  15. Use of Gastrointestinal Anastomosis Stapler for Harvest of Gracilis Muscle and Securing It in the Face for Facial Reanimation: A Novel Technique

    PubMed Central

    Shridharani, Sachin M.; Stapleton, Sahael M.; Redett, Richard J.; Magarakis, Michael; Rosson, Gedge D.

    2010-01-01

    Background: The primary objective of this study is to report a novel technique that uses the gastrointestinal anastomosis (GIA) stapler for harvesting and securing the gracilis muscle in facial reanimation surgery. Methods: We conducted a retrospective chart review with 18 consecutive patients who underwent gracilis muscle flap transfer with or without the use of a GIA stapler. Results: Of 11 operations with the GIA stapler, one patient developed a hematoma (donor site) and another required drainage of an abscess (recipient site). Of 8 operations without the use of the stapler, one patient had total flap failure and three required drainage of an abscess (2 recipient sites and 1 donor site). These differences trended toward improvement but were not statistically different. Conclusions: The use of the GIA stapler is a fast, safe technique. Larger studies are, however, warranted to further examine this novel approach in order to test precisely what factors of increased efficiency occur, the amount of suture pull-through, and overall tension capable of being applied to the secured staple line. PMID:20396379

  16. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    PubMed

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  17. 78 FR 4324 - Occupational Exposure to Hazardous Chemicals in Laboratories (Non-Mandatory Appendix); Technical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... institutions that sponsor chemical laboratories accountable for providing safe working environments. Beyond... current laboratory practices, security, and emergency response, as well as promoting safe handling of.... Safety and training programs have been implemented to promote the safe handling of chemicals from...

  18. Safe and Secure Services Based on NGN

    NASA Astrophysics Data System (ADS)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  19. Integrity and security in an Ada runtime environment

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  20. Methods and protocol of a mixed method quasi-experiment to evaluate the effects of a structural economic and food security intervention on HIV vulnerability in rural Malawi: The SAGE4Health Study.

    PubMed

    Weinhardt, Lance S; Galvao, Loren W; Mwenyekonde, Thokozani; Grande, Katarina M; Stevens, Patricia; Yan, Alice F; Mkandawire-Valhmu, Lucy; Masanjala, Winford; Kibicho, Jennifer; Ngui, Emmanuel; Emer, Lindsay; Watkins, Susan C

    2014-01-01

    Poverty and lack of a predictable, stable source of food are two fundamental determinants of ill health, including HIV/AIDS. Conversely, episodes of poor health and death from HIV can disrupt the ability to maintain economic stability in affected households, especially those that rely on subsistence farming. However, little empirical research has examined if, and how, improvements in people's economic status and food security translate into changes in HIV vulnerability. In this paper, we describe in detail the methods and protocol of an academic-NGO collaboration on a quasi-experimental, longitudinal study of the mechanisms and magnitude of the impact of a multilevel economic and food security program (Support to Able-Bodied Vulnerable Groups to Achieve Food Security; SAFE), as implemented by CARE. Primary outcomes include HIV vulnerability (i.e., HIV risk behaviors, HIV infection), economic status (i.e., income, household assets) and food security (including anthropometric measures). We recruited participants from two types of areas of rural central Malawi: traditional authorities (TA) selected by CARE to receive the SAFE program (intervention group) and TAs receiving other unrelated CARE programming (controls). In the intervention TAs, we recruited 598 program participants (398 women, 200 men) and interviewed them at baseline and 18- and 36-month follow-ups; we interviewed 301 control households. In addition, we conducted random surveys (n = 1002) in the intervention and control areas with a 36-month assessment interval, prior to and after implementation of SAFE. Thus, we are examining intervention outcomes both in direct SAFE program participants and their larger communities. We are using multilevel modeling to examine mediators and moderators of the effects of SAFE on HIV outcomes at the individual and community levels and determine the ways in which changes in HIV outcomes feed back into economic outcomes and food security at later interviews. Finally, we are conducting a qualitative end-of-program evaluation consisting of in-depth interviews with 90 SAFE participants. In addition to examining pathways linking structural factors to HIV vulnerability, this research will yield important information for understanding the impact of a multilevel environmental/structural intervention on HIV, with the potential for other sustainable long-term public health benefits.

  1. US Capitol Security - Our Nation's Capitol - A Safe Place for All?

    DOT National Transportation Integrated Search

    2000-08-01

    This article describes the Volpe Centrer's role in developing a new security system for the US Capitol. The US Capitol Police turned to the Center because of our proven capabilities as security experts. We brought to the project: our knowledge of sec...

  2. Lawrence Livermore National Laboratory Environmental Report 2012

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, Henry E.; Armstrong, Dave; Blake, Rick G.

    Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2012 the Laboratory had a staff of approximately 7000.« less

  3. Lawrence Livermore National Laboratory Environmental Report 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, H. E.; Bertoldo, N. A.; Blake, R. G.

    Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2013 the Laboratory had a staff of approximately 6,300.« less

  4. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  5. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  6. Methodology of shooting training using modern IT techniques

    NASA Astrophysics Data System (ADS)

    Gudzbeler, Grzegorz; Struniawski, Jarosław

    2017-08-01

    Mastering, improvement, shaping and preservation of skills of safe, efficient and effective use of the firearm requires the use of relevant methodology of conducting the shooting training. However reality of police trainings does not usually allow for intensive training shooting with the use of ammunition. An alternative solution is the use of modern training technologies. Example of this is the "Virtual system of improvement tactics of intervention services responsible for security and shooting training." Introduction of stimulator to police trainings will enable complete stuff preparation to achieve its tasks, creating potential of knowledge and experience in many areas, far exceeding the capabilities of conventional training.

  7. Facilities and Infrastructure FY 2017 Budget At-A-Glance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2016-03-01

    The Facilities and Infrastructure Program includes EERE’s capital investments, operations and maintenance, and site-wide support of the National Renewable Energy Laboratory (NREL). It is the nation’s only national laboratory with a primary mission dedicated to the research, development and demonstration (RD&D) of energy efficiency, renewable energy and related technologies. EERE is NREL’s steward, primary client and sponsor of NREL’s designation as a Federally Funded Research and Development Center. The Facilities and Infrastructure (F&I) budget maintains NREL’s research and support infrastructure, ensures availability for EERE’s use, and provides a safe and secure workplace for employees.

  8. How To Keep Your Schools Safe and Secure.

    ERIC Educational Resources Information Center

    Gilbert, Christopher B.

    1996-01-01

    Discusses unforeseen costs (including potential litigation expenses), benefits, and consequences of adopting security measures (such as metal detectors, drug dogs, security cameras, campus police, dress codes, crime watch programs, and communication devices) to counter on-campus violence and gang activity. High-tech gadgetry alone is insufficient.…

  9. Changing Homeland Security: The Year in Review - 2008

    DTIC Science & Technology

    2009-01-01

    new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar

  10. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    PubMed

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  11. Investigation of Titanium Dioxide and Indium Vanadate-Titanium Dioxide semiconductors for the photocatalytic degradation of aqueous organics

    NASA Astrophysics Data System (ADS)

    Pettit, Sandra L.

    Designing and constructing safe, secure and cost-effective buildings has always been the goal of architects, engineers, developers and community officials. However, in light of recent tragic events, urban security design has become a major concern for both public and private building owners as the threat of terrorism attacks becomes more evident. Modern research and technology have provided a means to counter some of these threats, but there is little doubt that the need for physical security design will continue to increase as long as there are conflicting social, religious, and political agendas in the world. Parallel to this trend, the desire for aesthetically pleasing structures and architecture which pushes the envelope of typical building design make designing a secure, blast and fire resistant building a challenge, as many protective measures clash with the desires of architects. As a result, development of construction materials and technologies with respect to security is on the rise and there is a need for comprehensive solutions. Research into the behavior of stainless steel may prove it to be an elegant and efficient solution to a secure structural design which does not compromise a building's architecture. As a material that is often chosen for its aesthetic appeal, it also exhibits excellent ductility and high stress-strain rates, allowing it to absorb large amounts of energy from blasts before fracturing, compared to carbon steel. Stainless steel also exhibits superior fire-resisting qualities and can perform similarly to carbon steels without unsightly added fire protection. Using stainless steel for elements which have been identified as vulnerable to attack, such as a major column or transfer girder, or elements which can protect the rest of structure from a blast, such as a blast wall, can be an efficient component of a comprehensive urban security design. The challenges associated with the use of stainless steel, which has kept its use in structural design to a minimum, such as higher costs, availability, or special welding procedures, are minimal and will be easily overcome as the use of stainless steel in structure increases and designers and fabricators become more familiar with the material.

  12. Information security : is your information safe?

    DOT National Transportation Integrated Search

    1999-01-01

    This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...

  13. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  14. Student Perceptions of High-Security School Environments

    ERIC Educational Resources Information Center

    Bracy, Nicole L.

    2011-01-01

    Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…

  15. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  16. Safe Schools Survey: Post-Secondary Survey Results.

    ERIC Educational Resources Information Center

    Mowery, Andrea

    This report provides the results of a survey of safety and security at colleges and universities in Minnesota, along with policy recommendations to improve safety and security at Minnesota post-secondary institutions. It is based on campus security reports voluntarily submitted by 60 of the 110 Minnesota post-secondary institutions, personal…

  17. How to Be Safe and Secure against School Vandalism.

    ERIC Educational Resources Information Center

    Stover, Del

    1990-01-01

    During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…

  18. Malfunctions in radioactivity sensors' networks

    NASA Astrophysics Data System (ADS)

    Khalipova, Veronika; Damart, Guillaume; Beauzamy, Bernard; Bruna, Giovanni

    2018-01-01

    The capacity to promptly and efficiently detect any source of contamination of the environment (a radioactive cloud) at a local and a country scale is mandatory to a safe and secure exploitation of civil nuclear energy. It must rely upon a robust network of measurement devices, to be optimized vs. several parameters, including the overall reliability, the investment, the operation and maintenance costs. We show that a network can be arranged in different ways, but many of them are inadequate. Through simulations, we test the efficiency of several configurations of sensors, in the same domain. The denser arrangement turns out to be the more efficient, but the efficiency is increased when sensors are non-uniformly distributed over the country, with accumulation at the borders. In the case of France, as radioactive threats are most likely to come from the East, the best solution is densifying the sensors close to the eastern border. Our approach differs from previous work because it is "failure oriented": we determine the laws of probability for all types of failures and deduce in this respect the best organization of the network.

  19. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  20. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  1. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  2. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-28

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  3. Practical School Security: Basic Guidelines for Safe and Secure Schools.

    ERIC Educational Resources Information Center

    Trump, Kenneth S.

    This book is written primarily for elementary and secondary school administrators and teachers, but college faculty involved in providing teacher or administrator education would also benefit from the practical approach to issues of school security. Chapters 1 through 3 establish a framework for dealing with the myths and realities of school…

  4. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    ERIC Educational Resources Information Center

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  5. Secure, safe, and sensitive solutions.

    PubMed

    Hughan, Tina

    2012-04-01

    Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend.

  6. Safety and privacy outcomes from a moderated online social therapy for young people with first-episode psychosis.

    PubMed

    Gleeson, John F; Lederman, Reeva; Wadley, Greg; Bendall, Sarah; McGorry, Patrick D; Alvarez-Jimenez, Mario

    2014-04-01

    Internet-based treatments for early psychosis offer considerable promise, but safety and security need to be established. This study pilot tested Horyzons, a novel online treatment application that integrates purpose-built moderated social networking with psychoeducation for recovery from early psychosis. Safety, privacy, and security were evaluated during a one-month single-group trial with 20 young consumers recovering from early psychosis who were recruited in Melbourne, Australia. Known clinical risk factors informed the safety protocol. Safety, privacy, and security were evaluated with respect to relapse and self-harm, users' perceptions of safety and privacy, and activity using Horyzons. No clinical or security problems with use of Horyzons were noted. Participants described feeling safe and trusting Horyzons. Private moderated online social networking combined with psychoeducation was a safe and secure therapeutic environment for consumers recovering from a first episode of psychosis. Testing the intervention in a randomized controlled trial is warranted.

  7. Inspection Report on "Internal Controls over Accountable Classified Removable Electronic Media at Oak Ridge National Laboratory"

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-05-01

    The Department of Energy's Oak Ridge National Laboratory (ORNL) conducts cutting edge scientific research. ORNL utilizes removable electronic media, such as computer hard drives, compact disks, data tapes, etc., to store vast amounts of classified information. Incidents involving breakdowns in controls over classified removable electronic media have been a continuous challenge for the Department. The loss of even one piece of such media can have serious national security implications. In 2004, the Department had a complex-wide 'stand-down' of all activities using classified removable electronic media, and such media containing Secret/Restricted Data or higher classified data was designated 'Accountable Classified Removablemore » Electronic Media' (ACREM). As part of the stand-down, sites were required to conduct a 100 percent physical inventory of all ACREM; enter it all into accountability; and conduct security procedure reviews and training. Further, the Department implemented a series of controls, including conducting periodic inventories, utilizing tamper proof devices on ACREM safes, and appointing trained custodians to be responsible for the material. After performance testing and validation that the required accountability systems were in place, ACREM operations at ORNL were approved for restart on August 10, 2004. We conducted a review at ORNL and associated facilities to determine whether ACREM is managed, protected, and controlled consistent with applicable requirements. We found that: (1) Eight pieces of Secret/Restricted Data media had not been identified as ACREM and placed into a system of accountability. Consequently, the items were not subject to all required protections and controls, such as periodic accountability inventories, oversight by a trained custodian, or storage in a designated ACREM safe. (However, the items were secured in safes approved for classified material.) (2) Other required ACREM protections and controls were not implemented as follows: a tamper indicating device was not being used on an ACREM safe; records documenting when a certain safe was opened did not support that a purported inventory had been conducted; and a safe inventory had not been completed in a timely manner. (3) A Personal Digital Assistant and a thumb drive, both capable of recording or transmitting data, were stored in a security area without an analysis to identify vulnerabilities and compensatory measures having been conducted, as required. We also found that an ORNL Cooperative Research and Development Agreement partner had not disabled classified computer ports at the partner's site that were capable of writing classified information to external or removable media, as required. We made several recommendations designed to enhance the security of ACREM, security areas, and computers.« less

  8. Efficient Removal of Cationic and Anionic Radioactive Pollutants from Water Using Hydrotalcite-Based Getters.

    PubMed

    Bo, Arixin; Sarina, Sarina; Liu, Hongwei; Zheng, Zhanfeng; Xiao, Qi; Gu, Yuantong; Ayoko, Godwin A; Zhu, Huaiyong

    2016-06-29

    Hydrotalcite (HT)-based materials are usually applied to capture anionic pollutants in aqueous solutions. Generally considered anion exchangers, their ability to capture radioactive cations is rarely exploited. In the present work, we explored the ability of pristine and calcined HT getters to effectively capture radioactive cations (Sr(2+) and Ba(2+)) which can be securely stabilized at the getter surface. It is found that calcined HT outperforms its pristine counterpart in cation removal ability. Meanwhile, a novel anion removal mechanism targeting radioactive I(-) is demonstrated. This approach involves HT surface modification with silver species, namely, Ag2CO3 nanoparticles, which can attach firmly on HT surface by forming coherent interface. This HT-based anion getter can be further used to capture I(-) in aqueous solution. The observed I(-) uptake mechanism is distinctly different from the widely reported ion exchange mechanism of HT and much more efficient. As a result of the high local concentrations of precipitants on the getters, radioactive ions in water can be readily immobilized onto the getter surface by forming precipitates. The secured ionic pollutants can be subsequently removed from water by filtration or sedimentation for safe disposal. Overall, these stable, inexpensive getters are the materials of choice for removal of trace ionic pollutants from bulk radioactive liquids, especially during episodic environmental crisis.

  9. Ensuring the security and availability of a hospital wireless LAN system.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-01-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  10. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  11. Safe and Secure Virtualization: Answers for IMA next Generation and Beyond

    NASA Astrophysics Data System (ADS)

    Almeida, Jose; Vatrinet, Francis

    2010-08-01

    This paper presents some of the challenges the aerospace industry is facing for the future and explains why and how a safe and secured virtualization technology can help solving these challenges Efforts around the next generation of IMA have already started, like the European FP7 funded project SCARLETT or the IDEE5 project and many avionics players and working groupware focused on how the new technologies like SMP capabilities introduced in latest CPU architectures, can help increasing system performances in future avionics system. We present PikeOS, a separation micro-kernel, which applies the state-of-the-art techniques and widely recognized standards such as ARINC 653 and MILS in order to guarantee safety and security properties, and still improve overall performance.

  12. Voices from the Field: Working Together for Safe and Secure Schools. Summary of Findings from Florida Education Commissioner Charlie Crist's School Safety and Security Summits.

    ERIC Educational Resources Information Center

    Florida State Dept. of Education, Tallahassee.

    During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…

  13. EPA Science Matters Newsletter: Advancing Ways to Clean Up Drinking Water Systems (Published November 2013)

    EPA Pesticide Factsheets

    To advance the science and engineering of decontaminating pipe systems and safely disposing of high-volumes of contaminated water, Agency homeland security researchers are developing a Water Security Test Bed (WSTB).

  14. Developing useful transit-related crime and incident data

    DOT National Transportation Integrated Search

    2000-04-01

    Transit agencies have an obligation to provide a reasonably safe and secure system for their patrons and employees. Transit management must make decisions regarding the best use of police, security personnel, and other resources to reduce crime and i...

  15. Implantation of active fixation leads in coronary veins for left ventricular stimulation: report of five cases.

    PubMed

    Hansky, Bert; Vogt, Juergen; Gueldner, Holger; Schulte-Eistrup, Sebastian; Lamp, Barbara; Heintze, Johannes; Horstkotte, Dieter; Koerfer, Reiner

    2007-01-01

    Securing transvenous left ventricular (LV) pacing leads without an active fixation mechanism in proximal coronary vein (CV) segments is usually challenging and frequently impossible. We investigated how active fixation leads can be safely implanted in this location, how to avoid perforating the free wall of the CV, and how to recognize and respond to perforations. In five patients with no alternative to LV pacing from proximal CV segments, 4 Fr SelectSecure (Medtronic, Minneapolis, MN, USA) leads, which have a fixed helix, were implanted through a modified 6 Fr guide catheter with a pre-shaped tip (Launcher, Medtronic). Active fixation leads were successfully implanted in proximal CVs in five patients. There were no complications. Acute and chronic pacing thresholds were comparable to those of conventional CV leads. The pre-shaped guide catheter tip remains in close proximity to the myocardial aspect of the CV, directing the lead helix toward a safe implantation site. If only proximal CV pacing sites are available, 4 Fr SelectSecure leads can be safely implanted through a modified Launcher guide catheter, avoiding more invasive implantation techniques. Other than venous stenting or implantation of leads with retractable tines, SelectSecure leads are expected to remain extractable.

  16. 46 CFR 15.705 - Watches.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Limitations and... daily basis does not in itself constitute the establishment of a watch. The minimum safe manning levels specified in a vessel's COI or other safe manning document take into consideration routine maintenance...

  17. Safe and Secure Federal Websites Act of 2014

    THOMAS, 113th Congress

    Rep. Bentivolio, Kerry L. [R-MI-11

    2013-12-03

    Senate - 07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  18. The effects of prompting and reinforcement on safe behavior of bicycle and motorcycle riders.

    PubMed

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was effective at increasing safe behavior exhibited by bicycle and motorcycle riders. No differences were observed between vehicle type or gender with regard to engagement in safe behavior.

  19. Infectious disease protection for healthcare security officers.

    PubMed

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  20. Improved security monitoring method for network bordary

    NASA Astrophysics Data System (ADS)

    Gao, Liting; Wang, Lixia; Wang, Zhenyan; Qi, Aihua

    2013-03-01

    This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false alarm or missing alarm of the security incident effectively.

  1. Keeping Campuses Safe.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    1999-01-01

    Describes how colleges and universities are using technology, as well as traditional methods, to keep campuses safe and reduce crime. Topics include using free pizza in a successful contest to teach students about campus safety, installing security cameras, using access-control cards, providing adequate lighting, and creating a bicycle patrol…

  2. Keys to a Safe, Secure School.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…

  3. High-Tech Security Help.

    ERIC Educational Resources Information Center

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  4. Determination of influence factors and accident rates for the Armored Tractor/Safe Secure Trailer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.S.; Clauss, D.B.; Blower, D.F.

    1994-04-01

    Operating environments, such as road type, road location, and time of day, play an important role in the observed accident rates of heavy trucks used in general commerce. These same factors influence the accident rate of the Armored Tractor/Safe Secure Trailer (AT/SST) used by the Department of Energy to transport hazardous cargos within the continental United States. This report discusses the development of accident rate influence factors. These factors, based on heavy trucks used in general commerce, are used to modify the observed overall AT/SST accident rate to account for the different operating environments.

  5. Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  6. Crisis Prevention and Response: Is Your School Prepared?

    ERIC Educational Resources Information Center

    Paine, Cathy; Sprague, Jeffrey

    1999-01-01

    This bulletin outlines the major components of a crisis-preparedness and response plan for schools. It lists the critical components of a safe-school plan, such as community coordination, curriculum, proactive student discipline policies and procedures, safe physical environment, school security, staff and student training, evaluation and…

  7. How To Create Safe Schools: Action Steps for the Community. A Workshop and Planning Guide To Help Communities Bring Security and Peace to Their Schools.

    ERIC Educational Resources Information Center

    National Educational Service, Bloomington, IN.

    This workshop and planning guide is designed to help stakeholders create safe schools for students. The guide is intended to be used with three 20-minute videotape programs that feature an inside look at two schools that actively involved their communities in improving school safety. The three videos--"Building the Team,""The Safe School…

  8. Research and realization of info-net security controlling system

    NASA Astrophysics Data System (ADS)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  9. To reauthorize the matching grant program for school security in the Omnibus Crime Control and Safe Streets Act of 1968.

    THOMAS, 113th Congress

    Rep. Barrow, John [D-GA-12

    2013-06-28

    House - 07/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Implementing AORN recommended practices for a safe environment of care, part II.

    PubMed

    Kennedy, Lynne

    2014-09-01

    Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  11. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    PubMed

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  12. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    PubMed Central

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  13. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  14. Central and peripheral cardiovascular responses to electrically induced and voluntary leg exercise

    NASA Technical Reports Server (NTRS)

    Saltin, B.; Strange, S.; Bangsbo, J.; Kim, C. K.; Duvoisin, M.; Hargens, A.; Gollnick, P. D.

    1990-01-01

    With long missions in space countermeasures have to be used to secure safe operations in space and a safe return to Earth. Exercises of various forms have been used, but the question has arisen whether electrically induced contractions of muscle especially sensitive to weightlessness and crucial for man's performance would aid in maintaining their optimal function. The physiological responses both to short term and prolonged dynamic exercise performed either voluntarily or induced by electrical stimulation were considered. The local and systemic circulatory responses were similar for the voluntary and electrically induced contractions. The metabolic response was slightly more pronounced with electrical stimulation. This could be a reflection of not only slow twitch (type 1) but also fast twitch (type 2) fibers being recruited when the contractions were induced electrically. Intramuscular pressure recordings indicated that the dominant fraction of the muscle group was engaged regardless of mode of activation. Some 70 percent of the short term peak voluntary exercise capacity could be attained with electrical stimulation. Thus, electrically induced contractions of specific muscle groups should indeed be considered as an efficient countermeasure.

  15. An overview of ALARA considerations during Yankee Atomic`s Component Removal Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Granados, B.; Babineau, G.; Colby, B.

    1995-03-01

    In Februrary 1992, Yankee Atomic Electric Company (YAEC) permanently shutdown Yankee Nuclear Power Station in Rowe, Massachusetts, after thirty-two years of efficient operation. Yankee`s plan decommissioning is to defer dismantlement until a low level radioactive waste (LLRW) disposal facility is available. The plant will be maintained in a safe storage condition until a firm contract for the disposal of LLRW generated during decommissioning can be secured. Limited access to a LLRW disposal facility may occur during the safe storage period. Yankee intends to use these opportunities to remove components and structures. A Component Removal Project (CRP) was initiated in 1993more » to take advantage of one of these opportunities. A Componenet Removal Project (CRP) was initiated in 1993 to take advantage of one of these opportunities. The CRP includes removal of four steam generators, the pressurizer, and segmentation of reactor vessel internals and preparation of LLRW for shipment and disposal at Chem-Nuclear`s Barnwell, South Carolina facility. The CRP is projected to be completed by June 1994 at an estimated total worker exposure of less than 160 person-rem.« less

  16. Pathways to Safety

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2006-01-01

    Education administrators have many tools available to them as they strive to establish a safe climate for learning, but no one strategy or piece of equipment is a magic solution that keeps potential trouble beyond the campus boundaries. Creating and maintaining a safe and secure school environment requires a balance of many strategies: (1)…

  17. Ladder Safety Live #12985

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chochoms, Michael

    2017-02-23

    This course presents information for working safely with portable ladders: specifically, stepladders, extensions ladders, and their derivations. Additionally, this course provides limited information on the safe use of stepstools and fixed ladders. The skills, techniques, and good practices needed for selecting, inspecting, setting up and securing, and using ladders are presented in this course.

  18. SAFETY GUIDES FOR YOU--IN THE PRIMARY GRADES.

    ERIC Educational Resources Information Center

    WALKER, LUVERNE CRABTREE

    THIS SAFETY INSTRUCTIONAL GUIDE FOR PRIMARY-GRADE TEACHERS PRESENTS NINE DIFFERENT SAFETY UNITS, INCLUDING TRAFFIC SAFETY, PLAYTIME SAFETY, SAFE EATING AND DRINKING HABITS, SAFE CLOTHING, HOME SAFETY, ANIMAL SAFETY, CIVIL DEFENSE SECURITY, AND TESTING SAFETY PRACTICES. EACH UNIT STRESSES THE REASONS FOR ACCENTING SAFETY, WHAT TO KNOW AND DO, AND…

  19. Safe Entry, Easy Exit

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2008-01-01

    After violent episodes too numerous to list and too terrible to forget, schools and universities have been focused for several years on enhancing security in their facilities. Doors are among the most critical points of concern for school personnel responsible for keeping buildings safe. Education institutions want doors that let the right people…

  20. 75 FR 71519 - National Family Week, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ..., which aims to protect working families' economic security and raise their standard of living. And the... brave service members and their families who keep our loved ones safe here at home and abroad. This... dreams. As we confront our challenges as a Nation, let us support our families in creating safe...

  1. 76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-27

    .... Minimum safe speed means the speed at which a vessel proceeds when it is fully off plane, completely... minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off a plane...

  2. 77 FR 73464 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ..., grantees, volunteers, interns, and others performing or working on a contract, service, grant, cooperative... tape records are stored in locked file rooms, locked file cabinets, or locked safes. RETRIEVABILITY... safeguarded in a secured environment. Buildings where records are stored have security cameras and 24-hour...

  3. 3 CFR - Blue Ribbon Commission on America's Nuclear Future

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...

  4. Bi-fuel System - Gasoline/LPG in A Used 4-Stroke Motorcycle - Fuel Injection Type

    NASA Astrophysics Data System (ADS)

    Suthisripok, Tongchit; Phusakol, Nachaphat; Sawetkittirut, Nuttapol

    2017-10-01

    Bi-fuel-Gasoline/LPG system has been effectively and efficiently used in gasoline vehicles with less pollutants emission. The motorcycle tested was a used Honda AirBlade i110 - fuel injection type. A 3-litre LPG storage tank, an electronic fuel control unit, a 1-mm LPG injector and a regulator were securely installed. The converted motorcycle can be started with either gasoline or LPG. The safety relief valve was set below 48 kPa and over 110 kPa. The motorcycle was tuned at the relative rich air-fuel ratio (λ) of 0.85-0.90 to attain the best power output. From dynamometer tests over the speed range of 65-100 km/h, the average power output when fuelling LPG was 5.16 hp; dropped 3.9% from the use of gasoline91. The average LPG consumption rate from the city road test at the average speed of 60 km/h was 40.1 km/l, about 17.7% more. This corresponded to lower LPG’s energy density of about 16.2%. In emission, the CO and HC concentrations were 44.4% and 26.5% lower. Once a standard gas equipment set with ECU and LPG injector were securely installed and the engine was properly tuned up to suit LPG’s characteristics, the converted bi-fuel motorcycle offers efficiently, safely and economically performance with environmental friendly emission.

  5. Safe at Any Speed: Securing Your Wi-Fi Network Is Easier and More Important than You Might Think

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2007-01-01

    In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…

  6. NOAA Marine and Arctic Monitoring Using UASs

    NASA Astrophysics Data System (ADS)

    Jacobs, T.; Coffey, J. J.; Hood, R. E.; Hall, P.; Adler, J.

    2014-12-01

    Unmanned systems have the potential to efficiently, effectively, economically and safely bridging critical observation requirements in an environmentally friendly manner. As the United States' Marine and Arctic areas of interest expand and include hard-to-reach regions of the Earth (such as the Arctic and remote oceanic areas) optimizing unmanned capabilities will be needed to advance the United States' science, technology and security efforts. Through increased multi-mission and multi-agency operations using improved inter-operable and autonomous unmanned systems, the research and operations communities will better collect environmental intelligence and better protect our Country against hazardous weather, environmental, marine and polar hazards. This presentation will examine NOAA's Marine and Arctic Monitoring UAS strategies which includes developing a coordinated effort to maximize the efficiency and capabilities of unmanned systems across the federal government and research partners. Numerous intra- and inter-agency operational demonstrations and assessments have been made to verify and validated these strategies. The presentation will also discuss the requisite sUAS capabilities and our experience in using them.

  7. A novel Laser Ion Mobility Spectrometer

    NASA Astrophysics Data System (ADS)

    Göbel, J.; Kessler, M.; Langmeier, A.

    2009-05-01

    IMS is a well know technology within the range of security based applications. Its main advantages lie in the simplicity of measurement, along with a fast and sensitive detection method. Contemporary technology often fails due to interference substances, in conjunction with saturation effects and a low dynamic detection range. High throughput facilities, such as airports, require the analysis of many samples at low detection limits within a very short timeframe. High detection reliability is a requirement for safe and secure operation. In our present work we developed a laser based ion-mobility-sensor which shows several advantages over known IMS sensor technology. The goal of our research was to increase the sensitivity compared to the range of 63Ni based instruments. This was achieved with an optimised geometric drift tube design and a pulsed UV laser system at an efficient intensity. In this intensity range multi-photon ionisation is possible, which leads to higher selectivity in the ion-formation process itself. After high speed capturing of detection samples, a custom designed pattern recognition software toolbox provides reliable auto-detection capability with a learning algorithm and a graphical user interface.

  8. FAA bulk technology overview for explosives detection

    NASA Astrophysics Data System (ADS)

    Novakoff, Alan K.

    1993-04-01

    The Federal Aviation Administration (FAA) is the leading federal agency responsible for encouraging and fostering the development of a safe, secure, and efficient national airspace system (NAS). Our goal is to establish an operating environment that ensures a threat-free system to preclude acts of terrorism and fatalities. As part of the process to meet this goal, our research and development activities continually search for technologies to ensure aviation security. Recent acts of terrorism against the aviation community have demonstrated an increasing level of sophistication in the design and deployment of explosive devices. In order to prevent the introduction of explosives onto an aircraft they must be detected prior to passenger and baggage loading. The Bulk Detection program is one method of developing a number of technologies that 'see' into and 'alarm' on suspect baggage. These detection devices must be capable of providing this serve with a confidence commensurate with the state-of-the- art available today. This program utilizes the expertise of government agencies, universities and industries working toward constructing their plans and executing their designs to produce the best available equipment.

  9. 3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the United States of America A Proclamation Critical infrastructure protection is an essential element... have a debilitating effect on security, national economic security, public health or safety. From water... country's essential resources are safe and capable of recovering from disruptive incidents. The Department...

  10. Safe and Secure

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2010-01-01

    The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…

  11. Bench vise adapter grips tubing securely and safely

    NASA Technical Reports Server (NTRS)

    Howland, B. T.; Jones, A. S., Jr.

    1966-01-01

    Plastic self-compressing adapter with grooves, attached to the jaws of a bench vise, secures thin-wall tubing vertically or horizontally during cutting and flaring operations without marring or damaging it. Magnets incorporated in both sections of the adapter prevent detachment from the jaws when the vise is opened.

  12. The Handbook for Campus Crime Reporting

    ERIC Educational Resources Information Center

    Ward, Diane; Lee, Janice

    2005-01-01

    Campus security and safety are important issues in postsecondary education today. Providing students nationwide with a safe environment in which to learn and keeping students, parents and employees well informed about campus security are goals that have been voiced by many groups. These goals were advanced by the Crime Awareness and Campus…

  13. Safe and Secure America Act of 2009

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2009-03-12

    House - 04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.3961, which became Public Law 111-141 on 2/27/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Custodians/Security Program Evaluation.

    ERIC Educational Resources Information Center

    Ennis, Bob

    The Custodians/Security Department is a support service of the Des Moines (Iowa) Independent Community School District. Responsibilities of the department do not stop with the care of the facility, but extend to providing a clean, safe environment for all who use school facilities. Program evaluation in the 1993-94 school year reveals a total…

  15. Making Schools Safe: The Role of the Modern Business Officer.

    ERIC Educational Resources Information Center

    Stephens, Ronald D.

    1990-01-01

    School business officials are held responsible for school safety. After conducting a school security audit, the following strategies are recommended: establishing a local school security task force; forming a comprehensive crisis management plan; establishing a school communication network; and providing school staff with inservice training on…

  16. 7 CFR 3560.103 - Maintaining housing projects.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... common areas, must be free of trash, litter, and debris. Public walkways, walls of buildings and common... lighting and functional interior lighting in common areas which permits safe access and security. (ix... coverings that are intact, securely attached, and in good condition. Brick veneers must be free of missing...

  17. 24 CFR 3400.305 - Data security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Data security. 3400.305 Section... DEVELOPMENT SAFE MORTGAGE LICENSING ACT Minimum Requirements for Administration of the NMLSR § 3400.305 Data... registrants whose data may have been compromised, and the employer of the loan originator or registrant, if...

  18. 76 FR 4123 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    .... The closed portions of the meeting will address threats to our homeland security, results of a cyber... designed to keep our country safe. A briefing on the Cyber Storm III Exercise will include lessons learned and vulnerabilities of cyber assets, as well as potential methods to improve a Federal response to a...

  19. Learning with Security

    ERIC Educational Resources Information Center

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  20. Digital Photograph Security: What Plastic Surgeons Need to Know.

    PubMed

    Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H

    2015-11-01

    Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.

  1. SYBR safeTM efficiently replaces ethidium bromide in Aspergillus fumigatus gene disruption.

    PubMed

    Canela, H M S; Takami, L A; Ferreira, M E S

    2017-02-08

    Invasive aspergillosis is a disease responsible for high mortality rates, caused mainly by Aspergillus fumigatus. The available drugs are limited and this disease continues to occur at an unacceptable frequency. Gene disruption is essential in the search for new drug targets. An efficient protocol for A. fumigatus gene disruption was described but it requires ethidium bromide, a genotoxic agent, for DNA staining. Therefore, the present study tested SYBR safe TM , a non-genotoxic DNA stain, in A. fumigatus gene disruption protocol. The chosen gene was cipC, which has already been disrupted successfully in our laboratory. A deletion cassette was constructed in Saccharomyces cerevisiae and used in A. fumigatus transformation. There was no statistical difference between the tested DNA stains. The success rate of S. cerevisiae transformation was 63.3% for ethidium bromide and 70% for SYBR safe TM . For A. fumigatus gene disruption, the success rate for ethidium bromide was 100 and 97% for SYBR safe TM . In conclusion, SYBR safe TM efficiently replaced ethidium bromide, making this dye a safe and efficient alternative for DNA staining in A. fumigatus gene disruption.

  2. The power of environment.

    PubMed

    Westbury, Becky

    2015-06-01

    In Ten tips for normal birth, the Royal College of Midwives (RCM) (2014) advocates the building of nests; creating an environment that helps women to feel safe and secure during birth, as this can improve women's experiences and likelihood of normal birth. Furthermore, a private, undisturbed and dark environment, where women feel calm and safe can promote the release of oxytocin, the hormone responsible for uterine contractions and thought to promote the release of the pain relieving hormones endorphins (Uvnas Moberg 2003). When this is not achieved, women can experience fear-tension-pain syndrome, impeding labour progress and causing increased levels of pain (Dick-Read 2013). In addition, birth space has the potential to encourage the promotion of normality through providing space to mobilise, and alternative furniture to enable upright birth positions. Midwives should help women to create a birth space in which they feel safe, calm and secure, to promote normality and increase the incidence of normal birth (RCM 2014).

  3. Foundational Security Principles for Medical Application Platforms* (Extended Abstract)

    PubMed Central

    Vasserman, Eugene Y.; Hatcliff, John

    2014-01-01

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

  4. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  5. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.; Cavolowsky, John

    2015-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  6. The Street Stops Here.

    ERIC Educational Resources Information Center

    Murphy, Nora Sharkey

    2000-01-01

    States that schools should be a safe haven for children and urges society to return schools to the safe, secure places they once were. Discusses the need to keep media far away from children in the event of a campus emergency and perform full background checks on all potential school employees. Reports that Catholic schools are providing…

  7. Disabled Children: The Right to Feel Safe

    ERIC Educational Resources Information Center

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  8. Supporting Safe, Secure and Caring Schools in Alberta.

    ERIC Educational Resources Information Center

    McMullen, Dean

    Alberta Learning expects all schools to have a safe and caring teaching and learning environment to ensure students have the opportunity to meet the standards of education set by the Minister of Learning. The primary objectives of this manual are to facilitate action that is legally, professionally, and educationally sound; identify and support…

  9. A Safe School's Top 10 Needs

    ERIC Educational Resources Information Center

    Brunner, Judy; Lewis, Dennis

    2005-01-01

    An environment of safety in the school seldom comes down to any one particular component or plan; it is a combination of strategies and ideas that makes a school safe and secure for everyone. In this article, the authors provide practical information to educators who are already working to capacity in terms of time allocation and monetary…

  10. 49 CFR Appendix B to Part 209 - Federal Railroad Administration Guidelines for Initial Hazardous Materials Assessments

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... hazardous materials are only safe for transportation when they are securely sealed in a proper package...) that a container or package for transportation of a hazardous material is safe, certified, or in.... —Listing an unauthorized, incorrect, non-working, or unmonitored (24 hrs. a day) emergency response...

  11. 75 FR 14330 - Transitional Safe Harbor Protection for Treatment by the Federal Deposit Insurance Corporation as...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... Assets Transferred by an Insured Depository Institution in Connection With a Securitization or... limited time the safe harbor provision for securitizations that would be affected by recent changes to... securitizations for which financial assets were transferred or, for revolving trusts, for which securities were...

  12. Mitigating Cyber Security Risk in Satellite Ground Systems

    DTIC Science & Technology

    2015-04-01

    because cyber security in government remains shrouded in secrecy. However, using the Defense Operational Test and Evaluation Office’s (DOT& E ) FY14...report on cybersecurity one grasps the seriousness of the problem. DOT& E reported only 85% of networks in DoD were compliant with the cyber...security regulations discussed later in this paper. Not until compliance is near 100% could DOT& E conceive with confidence that DoD networks were safe

  13. Study on safety operation for large hydroelectric generator unit

    NASA Astrophysics Data System (ADS)

    Yan, Z. G.; Cui, T.; Zhou, L. J.; Zhi, F. L.; Wang, Z. W.

    2012-11-01

    Hydroelectric generator unit is a complex mechanical system which is composed of hydraulic turbine and electric generator. Rotary system is supported by the bearing bracket and the reinforced concrete structures, and vibration problem can't be avoided in the process of operating. Many large-scale hydroelectric units have been damaged because of the vibration problem in recent years. As the increase of the hydraulic turbine unit capacity and water head, the safe operation of hydraulic turbine has become a focus research in many countries. The operating characteristics of the hydraulic turbine have obvious differences at different working conditions. Based on the combination of field measurement and theoretical calculation, this paper shows a deep research on the safe operation of a large-scale Francis turbine unit. Firstly, the measurements of vibration, swing, pressure fluctuation and noise were carried out at 4 different heads. And also the relationships between vibrations and pressure fluctuations at different heads and working conditions were analysed deeply. Then the scientific prediction of safe operation for the unit at high head were done based on the CFD numerical calculation. Finally, this paper shows the division of the operating zone for the hydroelectric unit. According to the experimental results (vibrations, swings, pressure fluctuations and noise) as well as the theoretical results, the operating zone of the unit has been divided into three sections: prohibited operating zone, transition operating zone and safe operating zone. After this research was applied in the hydropower station, the security and economic efficiency of unit increased greatly, and enormous economic benefits and social benefits have been obtained.

  14. Safer environment makes sense for all.

    PubMed

    Frith, Sue

    2011-06-01

    Sue Frith, deputy head of the NHS Security Management Service (NHS SMS), explains the organisation's important role in advising, and supporting, security staff at NHS hospitals in dealing with incidents ranging from verbal abuse to serious violence and aggression. Arguing that security in the NHS is "everyone's business", she explains both a range of processes and initiatives,already in place to safeguard people and assets, and discusses recent developments, such as a new incident reporting website, designed to help keep patients, staff, visitors, and property, at healthcare facilities safe and secure.

  15. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    ERIC Educational Resources Information Center

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  16. Designing Safe Facilities

    ERIC Educational Resources Information Center

    McLester, Susan

    2011-01-01

    In the spring of 1999, 12 students and a teacher were killed by two gun-toting teenage boys at Columbine High School in Littleton, Colorado, making school safety and security an overnight priority in communities across the nation. Many schools are starting to borrow security methods and technology from the business world such as video intercoms,…

  17. Safe and Secure

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2004-01-01

    Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…

  18. Safe School Design: A Handbook for Educational Leaders Applying the Principles of Crime Prevention through Environmental Design.

    ERIC Educational Resources Information Center

    Schneider, Tod; Walker, Hill; Sprague, Jeffrey

    This document seeks to synthesize, integrate, and make available to school personnel solid information regarding Crime Prevention through Environmental Design (CPTED). Chapter 1, "The Changed Landscape of School Safety and Security," examines characteristics of safe and unsafe schools, causes of vulnerability, and the role of design and technology…

  19. Home-SAFE: A New Approach in Day Care for the Young Child.

    ERIC Educational Resources Information Center

    Kornfeld, Maurine

    The Los Angeles Section, National Council of Jewish Women, has developed an innovative pilot program in day care geared to the changing life style of child rearing by single parents. Home-SAFE provides children a warm, secure environment in supervised, subsidized, licensed day care homes, and includes enrichment activities by trained volunteers;…

  20. Initial Process and Expected Outcomes for Preliminary Identification of Routes to Yucca Mountain, Nevada

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thrower, A.; Best, R.; Finewood, L.

    2008-07-01

    The Department of Energy's (DOE's) Office of Civilian Radioactive Waste Management (OCRWM) is responsible for developing and implementing a safe, secure and efficient transportation system to ship spent nuclear fuel (SNF) and high-level radioactive waste (HLW) from commercial and DOE sites to the proposed Yucca Mountain repository. The Office of Logistics Management (OLM) within OCRWM has begun to work with stakeholders to identify preliminary national suites of highway and rail routes that could be used for future shipments OLM is striving to develop a planning-basis set of routes that will support long-lead time logistical analyses (i.e., five or more yearsmore » before shipment). The results will represent a starting point for discussions between DOE and corridor jurisdictions, and for shipping arrangements between DOE and carriers. This fulfills a recommendation of the National Academy of Sciences report on SNF and HLW transportation that 'DOE should identify and make public its suite of preferred highway and rail routes for transporting spent fuel and high level waste to a federal repository as soon as practicable to support State, Tribal and local planning, especially for emergency responder preparedness'. OLM encourages and supports participation of program stakeholders in a process to identify suites of national routes. The principal objective is to identify preliminary suites of national routes that reflect responsible consideration of the interests of a broad cross-section of stakeholders. This will facilitate transportation planning activities to help meet program goals, including providing an advanced planning framework for State and Tribal authorities; supporting a pilot program for providing funding under Section 180(c) of the Nuclear Waste Policy Act; allowing sufficient time for security and operational reviews in advance of shipments to Yucca Mountain; and supporting utility planning and readiness for transportation operations. Concepts for routing and routing criteria have been considered by several state regional groups supported by cooperative agreements with OLM. OCRWM is also working with other Federal agencies, transportation service providers and others involved in the transportation industry to ensure the criteria are consistent with operating practices and regulations. These coordination efforts will ensure the experience, knowledge, and expertise of those involved are considered in the process to identify the preliminary national suites of routes. This paper describes the current process and timeline for preliminary identification and analyses of routes. In conclusion: The path toward developing a safe, secure, and efficient transportation system for shipments of SNF and HLW to Yucca Mountain will require the participation of many interested parties. Real cooperative planning is sometimes challenging, and requires a commitment from all involved parties to act in good faith and to employ their best efforts in developing mutually beneficial solutions. Identifying routes to the proposed repository at Yucca Mountain, and engaging in planning and preparedness activities with affected jurisdictions and other stakeholders, will take time. OCRWM is committed to a cooperative approach that will ultimately enhance safety, security, efficiency and public confidence. (authors)« less

  1. Adult and pediatric anesthesia/sedation for gastrointestinal procedures outside of the operating room.

    PubMed

    Michel Foehn, Esther R

    2015-08-01

    This review presents current trends of safe and efficient anesthesia and sedation for adults and children for gastrointestinal procedures outside of the operating room with a special focus on total intravenous anesthesia (TIVA), target-controlled infusion (TCI), intravenous or topical lidocaine, and the use of the video laryngoscope. The concepts of a well tolerated and adequate anesthesia or sedation for gastrointestinal procedures outside of the operating room have to meet the needs of the adult and pediatric patients and the special requests of the gastroenterologists. Anesthesia and sedation of adults for gastrointestinal procedures with TIVA or TCI and spontaneous breathing is well established. Many institutions perform anesthesia for pediatric patients undergoing gastrointestinal procedures with an inhalational agent, especially in young children and for short procedures. Unlike adults, in young children the airways frequently must be secured with a tracheal tube or laryngeal mask. Respiration may be spontaneous, assisted, or controlled. TIVA and TCI are increasingly chosen for older children and longer procedures. A local anesthetic administered intravenously or topically to the upper airways and the use of the video laryngoscope can facilitate the insertion of the endoscope. Both anesthesiologists and nonanesthesiologists have to achieve a consensus and develop quality-improvement strategies to provide safe and efficient anesthesia and sedation for gastrointestinal procedures outside of the operating room for pediatric and adult patients. Techniques using TIVA, TCI, intravenous or topical application of lidocaine, and the video laryngoscope may improve and facilitate gastrointestinal procedures for the patients, the anesthesiologists, and the gastroenterologists.

  2. Safe and efficient method for cryopreservation of human induced pluripotent stem cell-derived neural stem and progenitor cells by a programmed freezer with a magnetic field.

    PubMed

    Nishiyama, Yuichiro; Iwanami, Akio; Kohyama, Jun; Itakura, Go; Kawabata, Soya; Sugai, Keiko; Nishimura, Soraya; Kashiwagi, Rei; Yasutake, Kaori; Isoda, Miho; Matsumoto, Morio; Nakamura, Masaya; Okano, Hideyuki

    2016-06-01

    Stem cells represent a potential cellular resource in the development of regenerative medicine approaches to the treatment of pathologies in which specific cells are degenerated or damaged by genetic abnormality, disease, or injury. Securing sufficient supplies of cells suited to the demands of cell transplantation, however, remains challenging, and the establishment of safe and efficient cell banking procedures is an important goal. Cryopreservation allows the storage of stem cells for prolonged time periods while maintaining them in adequate condition for use in clinical settings. Conventional cryopreservation systems include slow-freezing and vitrification both have advantages and disadvantages in terms of cell viability and/or scalability. In the present study, we developed an advanced slow-freezing technique using a programmed freezer with a magnetic field called Cells Alive System (CAS) and examined its effectiveness on human induced pluripotent stem cell-derived neural stem/progenitor cells (hiPSC-NS/PCs). This system significantly increased cell viability after thawing and had less impact on cellular proliferation and differentiation. We further found that frozen-thawed hiPSC-NS/PCs were comparable with non-frozen ones at the transcriptome level. Given these findings, we suggest that the CAS is useful for hiPSC-NS/PCs banking for clinical uses involving neural disorders and may open new avenues for future regenerative medicine. Copyright © 2015 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  3. Flexible technologies and smart clothing for citizen medicine, home healthcare, and disease prevention.

    PubMed

    Axisa, Fabrice; Schmitt, Pierre Michael; Gehin, Claudine; Delhomme, Georges; McAdams, Eric; Dittmar, André

    2005-09-01

    Improvement of the quality and efficiency of healthcare in medicine, both at home and in hospital, is becoming more and more important for patients and society at large. As many technologies (micro technologies, telecommunication, low-power design, new textiles, and flexible sensors) are now available, new user-friendly devices can be developed to enhance the comfort and security of the patient. As clothes and textiles are in direct contact with about 90% of the skin surface, smart sensors and smart clothes with noninvasive sensors are an attractive solution for home-based and ambulatory health monitoring. Moreover, wearable devices or smart homes with exosensors are also potential solutions. All these systems can provide a safe and comfortable environment for home healthcare, illness prevention, and citizen medicine.

  4. Eye safe high power laser diode in the 1410-1550nm range

    NASA Astrophysics Data System (ADS)

    Boucart, Julien; de Largy, Brian; Kearley, Mark; Lichtenstein, Norbert

    2010-02-01

    The demand for high power lasers emitting in the 14xx-15xxnm range is growing for applications in fields such as medical or homeland security. We demonstrate high power laser diodes with emission at 1430, 1470 and 1560 nm. Single multimode emitters at 1470nm emit about 3.5W in CW operation. Power conversion efficiency can reach values as high as 38.5%. With this base material, single and multi-emitter fiber coupled modules are built. Additionally, bars on passive and microchannel coolers are fabricated that deliver 25W and 38W respectively in CW mode, while obtaining more than 80 W in pulsed mode. All reliability tests show an outstanding stability of the material with no signs of wearout after 3750 hrs under strong acceleration conditions.

  5. Handling small arbovirus vectors safely during biosafety level 3 containment: Culicoides variipennis sonorensis (Diptera:Ceratopogonidae) and exotic bluetongue viruses.

    PubMed

    Hunt, G J; Tabachnick, W J

    1996-05-01

    Equipment and procedures are described for biosafety level 3 (BL-3) containment work with small, zoophilic arthropods. BL-3 classified pathogens always must be manipulated in biological safety cabinets. Procedures, including physical barriers and handling methods, that prevent the escape of potentially virus-infected insects are discussed, and the use of a monitoring system for insect security is explained. The inability to recover escaped minute, flying insects poses a major difference from similar work with larger insects, such as mosquitoes. Methods were developed for the safe and secure handling of Culicoides variipennis sonorensis Wirth & Jones infected with exotic bluetongue viruses during BL-3 containment.

  6. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    NASA Technical Reports Server (NTRS)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  7. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    PubMed

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  8. 76 FR 802 - Florida Power and Light Company, Turkey Point, Units 3 and 4; Exemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-06

    ..., health physics, chemistry, and security, to maintain the safe and secure operation of the facility. The... exemption is authorized by law. No Undue Risk to Public Health and Safety The underlying purposes of 10 CFR... previously evaluated. Therefore, there is no undue risk to public health and safety. Consistent With Common...

  9. Security Is Not an Option--Learning in a Safe Environment. FEDA Paper.

    ERIC Educational Resources Information Center

    Coe, Beatrice

    1997-01-01

    A study examined what further education colleges in Britain were doing about security and what they planned for the future. A literature search found that a PEST (Political/legal, Economic, Sociocultural, and Technological) analysis was one way to examine the differential impact of external influences. A PEST analysis offered a strategy for…

  10. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ... FR 3316). Public Meeting We do not now plan to hold a public meeting. But you may submit a request... reason: Vessel traffic can pass safely around the security zone. If you think that your business... do not individually or cumulatively have a significant effect on the human environment. A preliminary...

  11. Maximum Security. The Culture of Violence in Inner-City Schools.

    ERIC Educational Resources Information Center

    Devine, John

    In an ethnographic reflection on 10 years experience working in the high schools of inner-city New York, issues of school safety, discipline, and violence are explored. The central proposition is that the mentality that relies on paramilitary security measures and technological devices, such as metal detectors, to achieve safe schools is only an…

  12. 49 CFR 214.507 - Required safety equipment for new on-track roadway maintenance machines.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) A seat for each operator, except as provided in paragraph (b) of this section; (2) A safe and secure position with handholds, handrails, or a secure seat for each roadway worker transported on the machine... windshield wipers are incompatible with the windshield material; (5) A machine braking system capable of...

  13. 49 CFR 214.507 - Required safety equipment for new on-track roadway maintenance machines.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) A seat for each operator, except as provided in paragraph (b) of this section; (2) A safe and secure position with handholds, handrails, or a secure seat for each roadway worker transported on the machine... windshield wipers are incompatible with the windshield material; (5) A machine braking system capable of...

  14. 49 CFR 214.507 - Required safety equipment for new on-track roadway maintenance machines.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) A seat for each operator, except as provided in paragraph (b) of this section; (2) A safe and secure position with handholds, handrails, or a secure seat for each roadway worker transported on the machine... windshield wipers are incompatible with the windshield material; (5) A machine braking system capable of...

  15. 78 FR 35087 - Parts and Accessories Necessary for Safe Operation; Exemption Renewal for the Flatbed Carrier...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-11

    ... intermodal container loaded with eyes crosswise, grouped in rows, in which the coils are loaded to contact... cargo securement regulations for the transportation of groups of metal coils with eyes crosswise, as... cargo securement regulations (then at 49 CFR 393.100(c)) for the transportation of groups of metal coils...

  16. 360 PORT MDA - A Strategy to Improve Port Security

    DTIC Science & Technology

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  17. 17 CFR 230.168 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... and forward-looking information. 230.168 Section 230.168 Commodity and Securities Exchanges SECURITIES... factual business information and forward-looking information. Preliminary Notes to § 230.168. 1. This... provides a non-exclusive safe harbor for factual business information and forward-looking information...

  18. Conceptualizations of heterosexual anal sex and HIV risk in five East African communities.

    PubMed

    Duby, Zoe; Colvin, Christopher

    2014-01-01

    Heterosexual anal sex is underresearched and little understood, particularly in the African context. Existing prevalence data indicate that heterosexual anal sex is a widespread practice, yet little is known about the way in which it is conceptualized and understood. Describing findings from qualitative research conducted in Kenya, Tanzania, and Uganda, we shed light on conceptualizations of heterosexual anal sex and its relation to human immunodeficiency virus (HIV). These findings suggest that penile-anal sex is practiced by men and women in Africa for a range of reasons, including virginity maintenance, contraception, fulfillment of male pleasure, relationship security, menstruation, in the presence of vaginal complications, financial gain, fidelity, and prestige. Despite anal sex being the most efficient way to transmit HIV sexually, there is widespread lack of knowledge about its risks. These findings describe the ways in which anal sex is conceptualized in five East African communities, highlighting how penile-anal intercourse is often not considered "sex" and how the omission of anal sex in safe-sex messaging is interpreted as meaning that anal sex is safe. In light of its frequency and risks, greater attention must be paid to heterosexual anal sex in Africa to ensure a comprehensive approach to HIV prevention.

  19. 26 CFR 1.355-7 - Recognition of gain on certain distributions of stock or securities in connection with an...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... evidence that a distribution and an acquisition are not part of a plan. (2) Certain post-distribution...-percent test of paragraph (a)(2) of this section. (d) Safe harbors—(1) Safe Harbor I. A distribution and... corporation that the acquired corporation (Distributing or Controlled) controls within the meaning of section...

  20. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    ERIC Educational Resources Information Center

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  1. Data Safe Havens and Trust: Toward a Common Understanding of Trusted Research Platforms for Governing Secure and Ethical Health Research

    PubMed Central

    Nicholls, Jacqueline; Dobbs, Christine; Sethi, Nayha; Cunningham, James; Ainsworth, John; Heaven, Martin; Peacock, Trevor; Peacock, Anthony; Jones, Kerina; Laurie, Graeme; Kalra, Dipak

    2016-01-01

    In parallel with the advances in big data-driven clinical research, the data safe haven concept has evolved over the last decade. It has led to the development of a framework to support the secure handling of health care information used for clinical research that balances compliance with legal and regulatory controls and ethical requirements while engaging with the public as a partner in its governance. We describe the evolution of 4 separately developed clinical research platforms into services throughout the United Kingdom-wide Farr Institute and their common deployment features in practice. The Farr Institute is a case study from which we propose a common definition of data safe havens as trusted platforms for clinical academic research. We use this common definition to discuss the challenges and dilemmas faced by the clinical academic research community, to help promote a consistent understanding of them and how they might best be handled in practice. We conclude by questioning whether the common definition represents a safe and trustworthy model for conducting clinical research that can stand the test of time and ongoing technical advances while paying heed to evolving public and professional concerns. PMID:27329087

  2. [Food poisoning--importance of international perspective].

    PubMed

    Nishibuchi, Mitsuaki

    2012-08-01

    It is important to obtain the information on food security in the countries other than Japan since more than 60 % of the food consumed come from these countries. Food security is now considered as a global issue. A global trend persuading us to provide safe food to humans is based on the concept of human security development associated with a sense of human mission to sustain one's life. Another global tendency pushing us to secure safety and hygiene of food is driven by the economic pressure coming from the rules in international trade established by Codex Committee under FAO/WHO. In contrast to these trends under globalization requesting safe and hygienic food, food habits based on tradition or religion are maintained locally in various parts of the world. These local habits include eating raw or improperly cooked foods, which may become a risk of being exposed to food poisoning pathogens. This issue may be adequately solved by a risk assessment approach based on the concept of appropriate level of protection (ALOP). Like or not, people in some local areas live in the unhygienic environment where they are unintentionally and frequently exposed to enteric pathogens or immunologically cross-reacting microorganisms through which they may acquire specific immunity to the pathogens and escape from infection by the pathogens. There are therefore many areas in the world where people understand the necessity to provide safe food at the international level (globalization) but actually consume food in varying hygienic conditions from area to area due in part to traditional food habits or living environments (localization); we call this situation as glocalization (global+local).

  3. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  4. Strategic Research Action Plans 2016-2019

    EPA Pesticide Factsheets

    EPA's six research priorities: Air, Climate, Energy; Chemical Safety for Sustainability, Homeland Security, Human Health Risk Assessment, Sustainable and Healthy Communities, Safe and Sustainable Water Resources.

  5. Quantum-secured blockchain

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Pozhar, N. O.; Anufriev, M. N.; Trushechkin, A. S.; Yunusov, R. R.; Kurochkin, Y. V.; Lvovsky, A. I.; Fedorov, A. K.

    2018-07-01

    Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards. Here we propose a possible solution to the quantum era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication. These results address important questions about realizability and scalability of quantum-safe blockchains for commercial and governmental applications.

  6. Solidify, An LLVM pass to compile LLVM IR into Solidity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kothapalli, Abhiram

    The software currently compiles LLVM IR into Solidity (Ethereum’s dominant programming language) using LLVM’s pass library. Specifically, his compiler allows us to convert an arbitrary DSL into Solidity. We focus specifically on converting Domain Specific Languages into Solidity due to their ease of use, and provable properties. By creating a toolchain to compile lightweight domain-specific languages into Ethereum's dominant language, Solidity, we allow non-specialists to effectively develop safe and useful smart contracts. For example lawyers from a certain firm can have a proprietary DSL that codifies basic laws safely converted to Solidity to be securely executed on the blockchain. Inmore » another example, a simple provenance tracking language can be compiled and securely executed on the blockchain.« less

  7. The world in a box? Food security, edible insects, and "One World, One Health" collaboration.

    PubMed

    Yates-Doerr, Emily

    2015-03-01

    Scientists in the Netherlands are cultivating edible insects to address concerns of international food security. Committed to the One World, One Health (OWOH) movement, their research aims to create a safe and effective global solution to the conjoined problems of climate change and an increasing worldwide demand for protein. Their preliminary work is promising, as it suggests that when compared to other sources of meat, insects can be an efficient, safe, and low-impact source of nutrients. Additionally, in many sites with endemic malnutrition, people find insects tasty. The problem these scientists are grappling with, however, is that insects that are easily mass-produced are not the insects people typically want to eat. This paper shows how the contingency of edibility complicates existing scientific models of travel that posit that singular objects spread peripherally outwards from a center into a globally connected, singular world. The scientists are finding that the production of successful food products necessitates that insects be constantly tinkered with: there is no "insect" that can be globally edible since "the global" itself is not a singular entity. This in turn complicates the vision of replicability and "scaling up" inherent in an OWOH vision of science. The researchers' process of moving their goods from the laboratory boxes they work with into the mealtime practices they seek to impact is compelling them to cultivate and articulate new ideals for research, methods of translation, and pathways by which goods can travel. They are finding that if they want to affect the health of "the world," they must engage with many different worlds. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Twenty-Five Year Site Plan FY2013 - FY2037

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, William H.

    2012-07-12

    Los Alamos National Laboratory (the Laboratory) is the nation's premier national security science laboratory. Its mission is to develop and apply science and technology to ensure the safety, security, and reliability of the United States (U.S.) nuclear stockpile; reduce the threat of weapons of mass destruction, proliferation, and terrorism; and solve national problems in defense, energy, and the environment. The fiscal year (FY) 2013-2037 Twenty-Five Year Site Plan (TYSP) is a vital component for planning to meet the National Nuclear Security Administration (NNSA) commitment to ensure the U.S. has a safe, secure, and reliable nuclear deterrent. The Laboratory also usesmore » the TYSP as an integrated planning tool to guide development of an efficient and responsive infrastructure that effectively supports the Laboratory's missions and workforce. Emphasizing the Laboratory's core capabilities, this TYSP reflects the Laboratory's role as a prominent contributor to NNSA missions through its programs and campaigns. The Laboratory is aligned with Nuclear Security Enterprise (NSE) modernization activities outlined in the NNSA Strategic Plan (May 2011) which include: (1) ensuring laboratory plutonium space effectively supports pit manufacturing and enterprise-wide special nuclear materials consolidation; (2) constructing the Chemistry and Metallurgy Research Replacement Nuclear Facility (CMRR-NF); (3) establishing shared user facilities to more cost effectively manage high-value, experimental, computational and production capabilities; and (4) modernizing enduring facilities while reducing the excess facility footprint. Th is TYSP is viewed by the Laboratory as a vital planning tool to develop an effi cient and responsive infrastructure. Long range facility and infrastructure development planning are critical to assure sustainment and modernization. Out-year re-investment is essential for sustaining existing facilities, and will be re-evaluated on an annual basis. At the same time, major modernization projects will require new line-item funding. This document is, in essence, a roadmap that defines a path forward for the Laboratory to modernize, streamline, consolidate, and sustain its infrastructure to meet its national security mission.« less

  9. Developing a Defense Sector Assessment Rating Tool

    DTIC Science & Technology

    2010-01-01

    JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Cathryn Quantic Thurston, and Gregory F. Treverton (MG-863-OSD). • Making Liberia Safe: Transformation of the National Security Sector, by David C...Cathryn Quantic Thurston, and Gregory F. Treverton, A Framework to Assess Programs for Building Partnerships, Santa Monica, Calif.: RAND Corporation

  10. School Safety and Security Best Practices Approved by the Commissioner of Education. Information Brief. Report.

    ERIC Educational Resources Information Center

    Florida State Legislature, Tallahassee. Office of Program Policy Analysis and Government Accountability.

    The 2001 Florida Legislature passed Ch. 2001-125, Laws of Florida, Section 40, which is often referred to as the Safe Passage Act. It requires all school districts to conduct a self-assessment of their school safety and security using best practices developed by the Office of Program Policy Analysis and Government Accountability (OPPAGA). It also…

  11. 75 FR 33667 - Parts and Accessories Necessary for Safe Operation; Application for an Exemption From the Flatbed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-14

    ... vehicle, in a sided vehicle, or in an intermodal container loaded with eyes crosswise, grouped in rows, in... pre-January 1, 2004 cargo securement regulations for the transportation of groups of metal coils with... the pre-January 1, 2004 cargo securement regulations (then at 49 CFR 393.100(c)) for the...

  12. Protecting computer-based medical devices: defending against viruses and other threats.

    PubMed

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  13. Secure Multiparty Quantum Computation for Summation and Multiplication.

    PubMed

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-21

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  14. Secure Multiparty Quantum Computation for Summation and Multiplication

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  15. Get Research Publications and News by Email

    EPA Pesticide Factsheets

    EPA's six research priorities: Air, Climate, Energy; Chemical Safety for Sustainability, Homeland Security, Human Health Risk Assessment, Sustainable and Healthy Communities, Safe and Sustainable Water Resources.

  16. Creating a Safe Place: SRE Teaching as an Act of Security and Identity Formation in Government Schools in Australia

    ERIC Educational Resources Information Center

    Gross, Zehavit; Rutland, Suzanne D.

    2016-01-01

    This study seeks to analyse the components that contribute to Special Religious Education (SRE) classes in government schools in Australia being considered as a "safe place" and the ways in which they facilitate an understanding of the students' own religious and cultural identity. Our research focuses on one of the small faiths,…

  17. A study of the security technology and a new security model for WiFi network

    NASA Astrophysics Data System (ADS)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  18. Are large farms more efficient? Tenure security, farm size and farm efficiency: evidence from northeast China

    NASA Astrophysics Data System (ADS)

    Zhou, Yuepeng; Ma, Xianlei; Shi, Xiaoping

    2017-04-01

    How to increase production efficiency, guarantee grain security, and increase farmers' income using the limited farmland is a great challenge that China is facing. Although theory predicts that secure property rights and moderate scale management of farmland can increase land productivity, reduce farm-related costs, and raise farmer's income, empirical studies on the size and magnitude of these effects are scarce. A number of studies have examined the impacts of land tenure or farm size on productivity or efficiency, respectively. There are also a few studies linking farm size, land tenure and efficiency together. However, to our best knowledge, there are no studies considering tenure security and farm efficiency together for different farm scales in China. In addition, there is little study analyzing the profit frontier. In this study, we particularly focus on the impacts of land tenure security and farm size on farm profit efficiency, using farm level data collected from 23 villages, 811 households in Liaoning in 2015. 7 different farm scales have been identified to further represent small farms, median farms, moderate-scale farms, and large farms. Technical efficiency is analyzed with stochastic frontier production function. The profit efficiency is regressed on a set of explanatory variables which includes farm size dummies, land tenure security indexes, and household characteristics. We found that: 1) The technical efficiency scores for production efficiency (average score = 0.998) indicate that it is already very close to the production frontier, and thus there is little room to improve production efficiency. However, there is larger space to raise profit efficiency (average score = 0.768) by investing more on farm size expansion, seed, hired labor, pesticide, and irrigation. 2) Farms between 50-80 mu are most efficient from the viewpoint of profit efficiency. The so-called moderate-scale farms (100-150 mu) according to the governmental guideline show no advantage in efficiency. 3) Formal land certificates and farmer's participation in land rental market are found to be important determinants of the profit efficiency across different scale of farms. 4) Fertilizer use has been excessive in Liaoning and could lead to the decline of crop profit.

  19. Advances in Targeted Pesticides with Environmentally Responsive Controlled Release by Nanotechnology

    PubMed Central

    Huang, Bingna; Chen, Feifei; Shen, Yue; Wang, Yan; Sun, Changjiao; Zhao, Xiang; Cui, Bo; Gao, Fei; Zeng, Zhanghua; Cui, Haixin

    2018-01-01

    Pesticides are the basis for defending against major biological disasters and important for ensuring national food security. Biocompatible, biodegradable, intelligent, and responsive materials are currently an emerging area of interest in the field of efficient, safe, and green pesticide formulation. Using nanotechnology to design and prepare targeted pesticides with environmentally responsive controlled release via compound and chemical modifications has also shown great potential in creating novel formulations. In this review, special attention has been paid to intelligent pesticides with precise controlled release modes that can respond to micro-ecological environment changes such as light-sensitivity, thermo-sensitivity, humidity sensitivity, soil pH, and enzyme activity. Moreover, establishing intelligent and controlled pesticide release technologies using nanomaterials are reported. These technologies could increase pesticide-loading, improve the dispersibility and stability of active ingredients, and promote target ability. PMID:29439498

  20. Study of the impact of a telematics system on safe and fuel-efficient driving in trucks.

    DOT National Transportation Integrated Search

    2014-04-01

    A telematics system has been successfully demonstrated to be useful for improving motor carrier efficiency. In this : particular field study, the research team demonstrated that telematics can be used to monitor and improve safe : driving behavior as...

  1. Airport security inspection process model and optimization based on GSPN

    NASA Astrophysics Data System (ADS)

    Mao, Shuainan

    2018-04-01

    Aiming at the efficiency of airport security inspection process, Generalized Stochastic Petri Net is used to establish the security inspection process model. The model is used to analyze the bottleneck problem of airport security inspection process. The solution to the bottleneck is given, which can significantly improve the efficiency and reduce the waiting time by adding the place for people to remove their clothes and the X-ray detector.

  2. Secure Embedded System Design Methodologies for Military Cryptographic Systems

    DTIC Science & Technology

    2016-03-31

    Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis

  3. Developing the Political Citizen: How Teachers Are Navigating the Statutory Demands of the Counter-Terrorism and Security Act 205 and the Prevent Duty

    ERIC Educational Resources Information Center

    Bryan, Hazel

    2017-01-01

    The "Revised Prevent Duty Guidance for England and Wales" presents statutory guidance under section 29 of the Counter-Terrorism and Security Act 2015. This guidance states that "Schools should be safe spaces in which children and young people can understand and discuss sensitive topics, including terrorism and the extremist ideas…

  4. Secure Container For Discarded Hypodermic Needles

    NASA Technical Reports Server (NTRS)

    Lee, Angelene M.

    1992-01-01

    Container designed for safe retention of discarded blood-collecting hypodermic needles and similar sharp objects used in life-science experiments aboard spacecraft. Needles inserted through self-closing lid and retained magnetically. They are inserted, sharp end first, through spring-loaded flap. Long needles and needles on syringes cannot turn around in container. Can be emptied, cleaned, and reused. Used on Earth to provide unusually secure containment of sharp objects.

  5. Extending the Thin Blue Line: Constabulary Police Development in Phase Zero Operations

    DTIC Science & Technology

    2015-05-16

    procure intelligence and support from local nationals. This participatory community approach to policing promotes a lasting sense of security and safety...conflict by posturing the Germans to establish law and order and internal and border security.92 The participatory police partnership also resulted in...host nation police forces supported the expansion of democracy and promoted safe overseas economic transactions. Consequently, government officials

  6. Great Expectations: How to Ensure that Specified Door, Frame, Hardware and Access-Control Software Components Will Perform as Planned

    ERIC Educational Resources Information Center

    Vigue, Beverly

    2006-01-01

    The goal of an effective security program is to prevent vandalism, reduce the risk of personal violence, prevent direct or collateral damage to assets and facilities, preserve a safe and secure environment while limiting liability, and lower repair and maintenance costs. With the proper equipment it is possible to achieve all these things. A door…

  7. The US Army and Future Security Force Assistance Operations

    DTIC Science & Technology

    2013-04-01

    havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the future...safe havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the...organizations at all levels. 5 SFA extends well beyond military-to-military training and conceptually addresses security as a system of

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinn, D J

    This month's issue has the following articles: (1) Homeland Security Begins Abroad--Commentary by John C. Doesburg; (2) Out of Harm's Way--New physical protection and accountability systems, together with a focus on security, safeguard nuclear materials in the Russian Federation; (3) A Calculated Journey to the Center of the Earth--Determining the permeability of partially melted metals in a mineral matrix unlocks secrets about the formation of Earth's core; (4) Wireless That Works--Communication technologies using ultrawideband radar are improving national security; and (5) Power to the People--Edward Teller envisioned safe and plentiful nuclear power for peaceful applications.

  9. Safe: a status update on information security and the hospital community.

    PubMed

    Fundner, Rita

    2003-01-01

    IT Security and Privacy are becoming increasingly visible "hot topics" across the full spectrum of industry and service sectors. Legislation and global "best practices" are working hard to defend organizations and individuals against escalating, rapidly evolving cyber-threats. Predictably, the threat landscape is having an impact on all levels to varying degrees: governmental, organizational and individual. This article introduces the basic context for information security and offers insight into how a number of hospitals are addressing the situation, what barriers they currently face and what opportunities they see unfolding.

  10. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    NASA Astrophysics Data System (ADS)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  11. Safe Military Bases Act

    THOMAS, 113th Congress

    Rep. Stockman, Steve [R-TX-36

    2013-09-26

    House - 01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Changes in Suicide Methods in Quebec between 1987 and 2000: The Possible Impact of Bill C-17 Requiring Safe Storage of Firearms

    ERIC Educational Resources Information Center

    Caron, Jean; Julien, Marie; Huang, Jean Hua

    2008-01-01

    This study presents the changes in the overall and firearm suicide rates for Quebec (Canada) before and after Bill C-17, which was implemented to secure safe storage of firearms. It covers 20,009 suicide cases reported to the coroner's office. Interrupted time series analysis is used to compare suicide rates in the two periods. Firearm suicide…

  13. Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven

    DTIC Science & Technology

    2011-06-03

    havens—such as activities funded through State’s Peacekeeping Operations and State-funded DHS training to combat money laundering and bulk cash...Management, Committee on Homeland Security House of Representatives COMBATING TERRORISM U.S. Government Strategies and Efforts to Deny Terrorists... Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  14. A novel procedure for introducing large sheet-type surgical material with a self-expanding origami structure using a slim trocar (chevron pleats procedure).

    PubMed

    Nakase, Yuen; Nakamura, Kei; Sougawa, Akira; Nagata, Tomoyuki; Mochizuki, Satoshi; Kitai, Shouzo; Inaba, Seishirou

    2017-09-01

    Large sheet-type surgical materials (e.g., absorbable hemostat, adhesion barrier membranes, and flat surgical mesh) are difficult to introduce into a corporeal cavity using a 5-mm trocar; however, laparoscopic surgeries that use mainly 5-mm trocars are increasing. Furthermore, it is necessary not only to introduce but also to secure the applied surgical material and expand it from the original surgical site. To address these challenges, we developed a novel procedure for introducing such surgical materials into a corporeal cavity using a 5-mm trocar and a self-expanding origami structure, called the "chevron pleats procedure (CPP)". We used CPP in 114 cases of laparoscopic surgery for gastrointestinal diseases. The chevron folding pattern is an excellent origami structure and compactly folds a large sheet of material for use with a slim trocar. Surgical materials were folded using a chevron pleats pattern and inserted into a novel, slim, long syringe-type device, which was made from a specially ordered precision polypropylene tube, for introduction into a corporeal cavity. When the surgical material was used, the end of the device was placed above the surgical site and the inner rod was pushed. The surgical material was securely injected and expanded over the surgical site. Surgical materials were introduced smoothly and securely using a 5-mm trocar to a site of intraoperative bleeding, the incisional surface of the liver, and defects of the abdominal wall or peritoneum. Efficient hemostasis was attained, the introduction and expansion of surgical mesh was made simpler, and the covering of defects of the peritoneum with adhesion barrier membranes, which is typically difficult during laparoscopic surgery, was easily performed. CPP is a basic utility procedure for introducing several sheet-type surgical materials into a corporeal cavity with a 5-mm trocar and might help ensure efficient and safe laparoscopic surgery.

  15. 76 FR 2802 - Safe, Efficient Use and Preservation of the Navigable Airspace; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-18

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration 14 CFR Part 77 [Docket No. FAA-2006-25002; Amendment No. 77-13-A] RIN 2120-AH31 Safe, Efficient Use and Preservation of the Navigable Airspace; Correction AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Final rule; correction...

  16. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  17. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  18. One Health in food safety and security education: Subject matter outline for a curricular framework.

    PubMed

    Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I

    2017-06-01

    Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.

  19. Safe and Secure Border Infrastructure Act

    THOMAS, 113th Congress

    Rep. Peters, Scott H. [D-CA-52

    2013-09-25

    House - 09/26/2013 Referred to the Subcommittee on Railroads, Pipelines, and Hazardous Materials. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  1. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  2. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  3. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  4. Safe Schools Act of 2013

    THOMAS, 113th Congress

    Rep. Stockman, Steve [R-TX-36

    2013-01-03

    House - 01/25/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Pain medications - narcotics

    MedlinePlus

    ... other medical problems does not itself lead to dependence. Store narcotics safely and securely in your home. ... help with constipation, drink more fluids, get more exercise, eat foods with extra fiber, and use stool ...

  6. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956

  7. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation

    PubMed Central

    Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-01-01

    Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966

  8. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

    PubMed

    Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-03-05

    Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.

  9. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.

    PubMed

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-12-03

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  10. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  11. Differences in multiple-target visual search performance between non-professional and professional searchers due to decision-making criteria.

    PubMed

    Biggs, Adam T; Mitroff, Stephen R

    2015-11-01

    Professional visual searches, such as those conducted by airport security personnel, often demand highly accurate performance. As many factors can hinder accuracy, it is critical to understand the potential influences. Here, we examined how explicit decision-making criteria might affect multiple-target search performance. Non-professional searchers (college undergraduates) and professional searchers (airport security officers) classified trials as 'safe' or 'dangerous', in one of two conditions. Those in the 'one = dangerous' condition classified trials as dangerous if they found one or two targets, and those in the 'one = safe' condition only classified trials as dangerous if they found two targets. The data suggest an important role of context that may be mediated by experience; non-professional searchers were more likely to miss a second target in the one = dangerous condition (i.e., when finding a second found target did not change the classification), whereas professional searchers were more likely to miss a second in the one = safe condition. © 2014 The British Psychological Society.

  12. [Dynamic simulation analysis of effects of project of ditching for drain on Oncomelania hupensis snail control and flood prevention security in Dongting Lake region].

    PubMed

    Zheng, Zhu; Wang-Yuan, Wei; Qian-Hui, Liu; Ben-Jiao, Hu; Ze-Min, Sun

    2017-01-19

    To evaluate the effects of the project of ditching for drain on Oncomelania hupensis snail control and flood prevention security and explore the optimal engineering design plan in Dongting Lake region. A retrospective study was performed on the previous studies about the project of ditching for drain. The reference values of project indices were determined. The outside levee of Nanhu New Distinct of Yueyang City in Dongting Lake region was selected as the study area, and the cross section of marshland perpendicular to the center line of the levee was extracted to research. According to the situations of various water levels, a dynamic simulation was performed on the effect and security of the project of ditching for drain through the software FLAC 3D . The retrospective study showed that the project would be effective when the relatively subsoil water level decreased by 0.35 m, and the soil water content decreased correspondingly. The dynamic simulation by FLAC 3D showed that the minimum safe distances between transverse ditch 1, vertical ditch and levee toe should be 25 m and 13 m respectively. The digging depth of transverse ditch and vertical ditch should be 1.2 m and 1.0 m respectively. If the width of marshland in drought period was less than 500 m, one transverse ditch was efficient. Otherwise, more transverse ditches should be set with the intervals of 300 m. The project of ditching for drain is an effective ecological snail elimination method. Optimizing the digging depth of ditches and distances between transverse ditches, vertical ditch and levee toe will ensure the effects and security of the project.

  13. Keep Kids Safe Act of 2013

    THOMAS, 113th Congress

    Rep. Nadler, Jerrold [D-NY-10

    2013-02-12

    House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Rfinity

    ScienceCinema

    Aaron R. Turner

    2017-12-09

    An innovation that offers a low-cost, plug-n-play option that enables virtually any wireless telecommunications device to safely store sensitive personal information and perform secure transactions. INL researchers include Steven McCown, Aaron Turner, Kur

  15. Choosing Safe Toys

    MedlinePlus

    ... the throat above the windpipe and restrict breathing. Battery-operated toys should have battery cases that secure with screws so that kids cannot pry them open. Batteries and battery fluid pose serious risks, including choking, ...

  16. SAFE Port Reauthorization Act

    THOMAS, 111th Congress

    Sen. Collins, Susan M. [R-ME

    2010-07-27

    Senate - 07/27/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. SAFE Port Reauthorization Act

    THOMAS, 112th Congress

    Sen. Collins, Susan M. [R-ME

    2011-04-14

    Senate - 04/14/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Rfinity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aaron R. Turner

    An innovation that offers a low-cost, plug-n-play option that enables virtually any wireless telecommunications device to safely store sensitive personal information and perform secure transactions. INL researchers include Steven McCown, Aaron Turner, Kur

  19. A Fundamental Key to Next-Generation Directed-Energy Systems

    DTIC Science & Technology

    2012-01-01

    and be inherently safe to operate. By design, they must minimize or eliminate the risk of hostile attack or collateral damage especially during...bile Construction Battalion (NMCB) 7’s convoy security element are secured following an escort mission from a forward operating base. The Cougar -type...profile, small, lightweight DE systems means: • Less vulnerability to attack • Greater mobility and maneuverability • Simplified logistics with

  20. Port Security in the Persian Gulf

    DTIC Science & Technology

    2008-06-01

    drafters of ISPS for secure, standardized documents to be issued to the world’s merchant seamen, another arm of the UN, the International Labour ...Revised), 2003," International Labour Organization, http://www.ilo.org/ilolex/cgi-lex/convde.pl?C185 (accessed March 11, 2008). 5 The convention has...identity documents for a particularly impoverished portion of their workforce . 2. MTSA (2002) and SAFE-Port (2006) The two primary pieces of

  1. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint.

    PubMed

    Chen, Han-Shen

    2017-01-30

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015-2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  2. Verbal abuse and physical assault in the emergency department: Rates of violence, perceptions of safety, and attitudes towards security.

    PubMed

    Partridge, Bradley; Affleck, Julia

    2017-08-01

    Emergency Department (ED) workers are prone to occupational violence, however the extent and impact of this may not be evenly felt across all roles in the ED. Explore: 1) the rate of verbal abuse and physical assaults experienced by ED staff, 2) perceptions of safety, 3) attitudes towards security officers, and 4) formal reporting of incidents. 330 ED workers were surveyed at four public hospitals in one metropolitan health service district in Queensland, Australia, including 179 nurses, 83 medical staff, 44 administration staff, 14 allied health, and 9 operational. Nurses were more likely to have been physically assaulted in the last six months and were less likely to feel safe. Most ED staff across all roles experienced verbal abuse. Nurses were better than medical staff at reporting instances of occupational violence although overall reporting across all roles was low. Staff who thought that security officers respond to incidents quickly and are a visible presence in the ED were more likely to feel safe in the ED. Workers in the ED, particularly nurses, experience high rates of verbal abuse and physical aggression and there may be a case for having designated security guards in the ED. Copyright © 2017 College of Emergency Nursing Australasia. Published by Elsevier Ltd. All rights reserved.

  3. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    PubMed Central

    Chen, Han-Shen

    2017-01-01

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level. PMID:28146086

  4. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badwan, Faris M.; Demuth, Scott F

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less

  5. Assurance: the power behind PCASSO security.

    PubMed Central

    Baker, D. B.; Masys, D. R.; Jones, R. L.; Barnhart, R. M.

    1999-01-01

    The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted. While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care. PMID:10566443

  6. Ultra Safe And Secure Blasting System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tappingmore » into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.« less

  7. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  8. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  9. Hyper-Spectral Communications, Networking and ATM as Foundation for Safe and Efficient Future Flight: Transcending Aviation Operational Limitations with Diverse and Secure Multi-Band, Multi-Mode, and mmWave Wireless Links: Project Overview, Aviation Communications and New Signaling

    NASA Technical Reports Server (NTRS)

    Matolak, David W.

    2017-01-01

    NASA's Aeronautics Research Mission Directorate (ARMD) has recently solicited proposals and awarded funds for research and development to achieve and exceed the goals envisioned in the ARMD Strategic Implementation Plan (SIP). The Hyper-Spectral Communications and Networking for Air Traffic Management (ATM) (HSCNA) project is the only University Leadership Initiative (ULI) program to address communications and networking (and to a degree, navigation and surveillance). This paper will provide an overview of the HSCNA project, and specifically describe two of the project's technical challenges: comprehensive aviation communications and networking assessment, and proposed multi-band and multimode communications and networking. The primary goals will be described, as will be research and development aimed to achieve and exceed these goals. Some example initial results are also provided.

  10. Convergence acceleration of computer methods for grounding analysis in stratified soils

    NASA Astrophysics Data System (ADS)

    Colominas, I.; París, J.; Navarrina, F.; Casteleiro, M.

    2010-06-01

    The design of safe grounding systems in electrical installations is essential to assure the protection of the equipment, the power supply continuity and the security of the persons. In order to achieve these goals, it is necessary to compute the equivalent electrical resistance of the system and the potential distribution on the earth surface when a fault condition occurs. In the last years the authors have developed a numerical formulation based on the BEM for the analysis of grounding systems embedded in uniform and layered soils. As it is known, in practical cases the underlying series have a poor rate of convergence and the use of multilayer soils requires an out of range computational cost. In this paper we present an efficient technique based on the Aitken δ2-process in order to improve the rate of convergence of the involved series expansions.

  11. Gun Violence Prevention and Safe Communities Act of 2013

    THOMAS, 113th Congress

    Rep. Davis, Danny K. [D-IL-7

    2013-08-02

    House - 10/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Summer Safety Tips - Staying Safe Outdoors

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... Families should attend community fireworks displays run by professionals rather than using fireworks at home. The AAP ...

  13. Safe Building Code Incentive Act of 2013

    THOMAS, 113th Congress

    Sen. Menendez, Robert [D-NJ

    2013-05-08

    Senate - 05/08/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Safe Building Code Incentive Act of 2012

    THOMAS, 112th Congress

    Sen. Menendez, Robert [D-NJ

    2012-12-19

    Senate - 12/19/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Safe Building Code Incentive Act of 2013

    THOMAS, 113th Congress

    Sen. Menendez, Robert [D-NJ

    2013-05-09

    Senate - 05/09/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Fire Safe Communities Act of 2009

    THOMAS, 111th Congress

    Sen. Feinstein, Dianne [D-CA

    2009-04-01

    Senate - 04/01/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Security and Financial Empowerment (SAFE) Act

    THOMAS, 111th Congress

    Sen. Murray, Patty [D-WA

    2009-10-01

    Senate - 10/01/2009 Read twice and referred to the Committee on Health, Education, Labor, and Pensions. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  19. Safe and Secure Partitioning with Pikeos: Towards Integrated Modular Avionics in Space

    NASA Astrophysics Data System (ADS)

    Almeida, J.; Prochazka, M.

    2009-05-01

    This paper presents our approach to logical partitioning of spacecraft onboard software. We present PikeOS, a separation micro-kernel which applies the state-of-the- art techniques and widely recognised standards such as ARINC 653 and MILS in order to guarantee safety and security properties of partitions executing software with different criticality and confidentiality. We provide an overview of our approach, also used in the Securely Partitioning Spacecraft Computing Resources project, an ESA TRP contract, which shifts spacecraft onboard software development towards the Integrated Modular Avionics concept with relevance for dual-use military and civil missions.

  20. For Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile Devices (Preprint)

    DTIC Science & Technology

    2012-11-01

    that mobile application developers should reconsider implementing garbled circuits due to their extreme resource usage, and instead rely upon our equivalently secure and significantly more efficient alternative.

  1. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  2. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  3. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  4. Safe teleradiology: information assurance as project planning methodology.

    PubMed

    Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2005-01-01

    The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.

  5. Security Policy and Infrastructure in the Context of a Multi-Centeric Information System Dedicated to Autism Spectrum Disorder.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe

    2017-01-01

    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.

  6. A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy

    PubMed Central

    Goryczka, Slawomir; Xiong, Li

    2016-01-01

    This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir’s secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy. PMID:28919841

  7. A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy.

    PubMed

    Goryczka, Slawomir; Xiong, Li

    2017-01-01

    This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir's secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy.

  8. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  9. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    DTIC Science & Technology

    2006-05-04

    policy violation with respect to: Security Safety Financial Posture Infrastructure The IATF identifies five levels: V1: Negligible effect V2: Minimal...MLS) Infrastructure Step 2: Determine Threat Levels Best practices also in the IATF Threats are ranked by assessing: Capability Resources Motivation...Risk Willingness The IATF identifies seven levels: T1: Inadvertent or accidental events Tripping over a power cord T2: Minimal resources – willing to

  10. Proceedings of the Conference on Environmental Toxicology (14th) Held at Dayton, OH on 15-17 November 1983

    DTIC Science & Technology

    1984-08-01

    be a safe level. Men exposed to dibromo- chloropropane for less than 3 months have normal sperm density in ejaculates. Those men exposed between 1 ...FERTILIZATION FURTHER EVALUATION I ~ II SPERMATOGENIC EVALUATION SEMEN BIOCHEMISTRY* MEASURE UNSCHEDULED I DNA SYNTHESIS 1 ) SPERM COUNT 2) SPERM... 1 JiAN 73 IOWBSSOLETE. SECURITY CLASSIFICATION OF THIS PAGE SECURITY CLASSIFICATION OF THIS PAGE 18. Subject Terms Occupational Health

  11. Subscale Validation of the Subsurface Active Filtration of Exhaust (SAFE) Approach to the NTP Ground Testing

    NASA Technical Reports Server (NTRS)

    Marshall, William M.; Borowski, Stanley K.; Bulman, Mel; Joyner, Russell; Martin, Charles R.

    2015-01-01

    Nuclear thermal propulsion (NTP) has been recognized as an enabling technology for missions to Mars and beyond. However, one of the key challenges of developing a nuclear thermal rocket is conducting verification and development tests on the ground. A number of ground test options are presented, with the Sub-surface Active Filtration of Exhaust (SAFE) method identified as a preferred path forward for the NTP program. The SAFE concept utilizes the natural soil characteristics present at the Nevada National Security Site to provide a natural filter for nuclear rocket exhaust during ground testing. A validation method of the SAFE concept is presented, utilizing a non-nuclear sub-scale hydrogen/oxygen rocket seeded with detectible radioisotopes. Additionally, some alternative ground test concepts, based upon the SAFE concept, are presented. Finally, an overview of the ongoing discussions of developing a ground test campaign are presented.

  12. Evaluation of the safety benefits of legacy safe routes to school programs

    DOT National Transportation Integrated Search

    2008-08-01

    This study first examined the feasibility of conducting a crash-based assessment of the safety effects of legacy Safe Routes to School : (SRTS) programs. These were SRTS programs operating before the passage of the Safe, Accountable, Flexible, Effici...

  13. Implementation plan for safe routes to school program.

    DOT National Transportation Integrated Search

    2009-08-01

    Section 1404 of the Safe, Accountable, Flexible, and Efficient Transportation Equity Act: A Legacy for Users (SAFETEA-LU, Public Law 109-59) establishes a national Safe Routes to School (SRTS) Program. The purpose of the program is to encourage K-8 s...

  14. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  15. Safe and secure. How to create an effective OSHA compliance program in your practice.

    PubMed

    Anderson, Douglas G

    2007-08-01

    Medical group practice administrators have a responsibility to provide a safe working environment for their employees and patients. You must create an effective Occupational Safety and Health Administration (OSHA) compliance program in your organization. The complexity and diversity of OSHA standards are significant, and developing an effective program requires more than a cut-and-paste approach. This article describes the scope of the task, the steps to take and tools you can use.

  16. The Evolution of Israeli Civil-Military Relations: Domestic Enablers and the Quest for Peace

    DTIC Science & Technology

    2009-12-01

    Israeli society, its sense of security, and its view of military institutions. It is safe to assume, however, the changing social attitudes will...It is safe to assume, however, the changing social attitudes will continue to shape the state’s often obscure civil-military dynamic, which will...2 (2005): 231. “For Israelis, armed conflict became the ultimate method of resolving the issue of their state’s disputed existence.” 5 Charles D

  17. Novel approach for extinguishing large-scale coal fires using gas-liquid foams in open pit mines.

    PubMed

    Lu, Xinxiao; Wang, Deming; Qin, Botao; Tian, Fuchao; Shi, Guangyi; Dong, Shuaijun

    2015-12-01

    Coal fires are a serious threat to the workers' security and safe production in open pit mines. The coal fire source is hidden and innumerable, and the large-area cavity is prevalent in the coal seam after the coal burned, causing the conventional extinguishment technology difficult to work. Foams are considered as an efficient means of fire extinguishment in these large-scale workplaces. A noble foam preparation method is introduced, and an original design of cavitation jet device is proposed to add foaming agent stably. The jet cavitation occurs when the water flow rate and pressure ratio reach specified values. Through self-building foaming system, the high performance foams are produced and then infused into the blast drilling holes at a large flow. Without complicated operation, this system is found to be very suitable for extinguishing large-scale coal fires. Field application shows that foam generation adopting the proposed key technology makes a good fire extinguishment effect. The temperature reduction using foams is 6-7 times higher than water, and CO concentration is reduced from 9.43 to 0.092‰ in the drilling hole. The coal fires are controlled successfully in open pit mines, ensuring the normal production as well as the security of personnel and equipment.

  18. Secure detection in quantum key distribution by real-time calibration of receiver

    NASA Astrophysics Data System (ADS)

    Marøy, Øystein; Makarov, Vadim; Skaar, Johannes

    2017-12-01

    The single-photon detectionefficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits the photon receiver’s imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key generation rate. The estimation is done by testing gated detectors using a randomly activated photon source inside the receiver unit. This estimate gives a secure rate for any detector with non-unity single-photon detection efficiency, both inherit or due to blinding. By adding extra optical components to the receiver, we make sure that the key is extracted from photon states for which our estimate is valid. The result is a quantum key distribution scheme that is secure against any attack that exploits detector imperfections.

  19. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  20. The anchoring function: parental authority and the parent-child bond.

    PubMed

    Omer, Haim; Steinmetz, Sarit G; Carthy, Tal; von Schlippe, Arist

    2013-06-01

    Descriptions of parental authority and of the formation of a secure parent-child bond have remained unconnected in conceptualizations about parenting and child development. The parental anchoring function is here presented as an integrative metaphor for the two fields. Parents who fulfill an anchoring function offer a secure relational frame for the child, while also manifesting a stabilizing and legitimate kind of authority. The anchoring function enriches the two fields by: (1) adding a dimension of authority to the acknowledged functions of the safe haven and the secure base that are seen as core to a secure parent-child bond, and (2) adding considerations about the parent-child bond to Baumrind's classical description of authoritative parenting. © FPI, Inc.

  1. Mining Security Pipe(TSM)with Underground GPS Global(RSPG)Escape Security Device in Underground Mining

    NASA Astrophysics Data System (ADS)

    Giménez, Rafael Barrionuevo

    2016-06-01

    TSM is escape pipe in case of collapse of terrain. The TSM is a passive security tool placed underground to connect the work area with secure area (mining gallery mainly). TSM is light and hand able pipe made with aramid (Kevlar), carbon fibre, or other kind of new material. The TSM will be placed as a pipe line network with many in/out entrances/exits to rich and connect problem work areas with another parts in a safe mode. Different levels of instrumentation could be added inside such as micro-led escape way suggested, temperature, humidity, level of oxygen, etc.). The open hardware and software like Arduino will be the heart of control and automation system.

  2. Proof of cipher text ownership based on convergence encryption

    NASA Astrophysics Data System (ADS)

    Zhong, Weiwei; Liu, Zhusong

    2017-08-01

    Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.

  3. NOAA Atmospheric, Marine and Arctic Monitoring Using UASs (including Rapid Response)

    NASA Astrophysics Data System (ADS)

    Coffey, J. J.; Jacobs, T.

    2015-12-01

    Unmanned systems have the potential to efficiently, effectively, economically, and safely bridge critical observation requirements in an environmentally friendly manner. As the United States' Atmospheric, Marine and Arctic areas of interest expand and include hard-to-reach regions of the Earth (such as the Arctic and remote oceanic areas) optimizing unmanned capabilities will be needed to advance the United States' science, technology and security efforts. Through increased multi-mission and multi-agency operations using improved inter-operable and autonomous unmanned systems, the research and operations communities will better collect environmental intelligence and better protect our Country against hazardous weather, environmental, marine and polar hazards. This presentation will examine NOAA's Atmospheric, Marine and Arctic Monitoring Unmanned Aircraft System (UAS) strategies which includes developing a coordinated effort to maximize the efficiency and capabilities of unmanned systems across the federal government and research partners. Numerous intra- and inter-agency operational demonstrations and assessments have been made to verify and validated these strategies. This includes the introduction of the Targeted Autonomous Insitu Sensing and Rapid Response (TAISRR) with UAS concept of operations. The presentation will also discuss the requisite UAS capabilities and our experience in using them.

  4. A Safe and Efficient Technique for the Production of HCl/DCl Gas

    ERIC Educational Resources Information Center

    Mayer, Steven G.; Bard, Raymond R.; Cantrell, Kevin

    2008-01-01

    We present a safe and efficient technique to generate HCl/DCl gas for use in the classic physical chemistry experiment that introduces students to ro-vibrational spectroscopy. The reaction involves thionyl chloride and a mixture of water and deuterium oxide to produce HCl/DCl gas with SO[subscript 2] gas as a byproduct. The entire reaction is…

  5. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  6. Pragmatism of the North Atlantic Treaty Organization’s and European Union’s Strategic Partnership

    DTIC Science & Technology

    2015-04-13

    area deployment, on 8 April 2009, the SS MAERSK ALABAMA incident occurred. Made famous by the Hollywood film , Captain Phillips, Somali pirates...community for their safe passage , and regional capacity building within means and capabilities.9 Current approval for NATO’s...Defense and Security Strategy, when he states, “The French continue to advocate the adoption of a Livre blanc européen on defense and security, which was

  7. 77 FR 19963 - Special Local Regulation and Security Zone: War of 1812 Bicentennial Commemoration, Port of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-03

    ...The Coast Guard proposes to adopt a temporary special local regulation and temporary security zones, during, and after the War of 1812 Bicentennial Commemoration events in the Port of Boston, Massachusetts, to be held between June 28, 2012 and July 6, 2012. These regulations are necessary to promote the safe navigation of vessels and the safety of life and property during the heavy volume of vessel traffic expected during this event.

  8. Integrating Security in Real-Time Embedded Systems

    DTIC Science & Technology

    2017-04-26

    b) detect any intrusions/a ttacks once tl1ey occur and (c) keep the overall system safe in the event of an attack. 4. Analysis and evaluation of...beyond), we expanded our work in both security integration and attack mechanisms, and worked on demonstrations and evaluations in hardware. Year I...scheduling for each busy interval w ith the calculated arrival time w indow. Step 1 focuses on the problem of finding the quanti ty of each task

  9. Effects of Ammonium Dinitramide in Human Liver Slices: An EPR/Spin Trapping Study.

    DTIC Science & Technology

    1995-09-01

    environmentally safe than AP. EPR/spin trapping studies with the spin trap N-tert-butyl-a-phenyl nitrone (PBN lOmM) for 5 min in the presence of ADN yielded...N-tert-butyl-a-phenyl nitrone PBN 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED... nitrone s second SCN- thiocyanate SD standard deviation Vll INTRODUCTION This is a study of the reactions of free radicals formed when ammonium

  10. Semantically Aware Foundation Environment (SAFE) for Clean-Slate Design of Resilient, Adaptive Secure Hosts (CRASH)

    DTIC Science & Technology

    2016-02-01

    system consists of a high-fidelity hardware simulation using field programmable gate arrays (FPGAs), with a set of runtime services (ConcreteWare...perimeter protection, patch, and pray” is not aligned with the threat. Programmers will not bail us out of this situation (by writing defect free code...hosted on a Field Programmable Gate Array (FPGA), with a set of runtime services (concreteware) running on the hardware. Secure applications can be

  11. CLARUS as a Cloud Security Framework: e-Health Use Case.

    PubMed

    Vidal, David; Iriso, Santiago; Mulero, Rafael

    2017-01-01

    Maintaining Passive Medical Health Records (PMHR) is an increasing cost and resource consumption problem. Moving to the cloud is the clearest solution to solve the problem as it offers a high amount of space and computation power. But the cloud is not safe enough when dealing with this kind of information because it can be easily accessed by attackers. The European Commission funded research project CLARUS contributes to protect healthcare-sensitive information in a secure way.

  12. Chemist of the year award

    USDA-ARS?s Scientific Manuscript database

    Nutritious, sustainable, and secure agricultural supplies are important to meet global needs. Although there are broad efforts to ensure food is safe, many people still experience preventable foodborne illness. Mycotoxins are produced by fungi that occasionally contaminate agricultural commodities a...

  13. Radiation and Shipping Port Security | RadTown USA | US ...

    EPA Pesticide Factsheets

    2017-08-07

    Cargo comes into the U.S. from all over the world. Ports can ensure safety by: Screening cargo for radiation before it gets here. Safely handling any radioactive material that needs to pass through a port.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dasari, Venkateswara Rao

    The need for sustainable and secure nuclear energy is summarized. Driven by economics and public-private partnerships, the technology is evolving. Cost control and regulatory simplification are needed for a nuclear renaissance. Small modular reactors--simple, scalable, and inherently safe--may be the future.

  15. 49 CFR 393.203 - Cab and body components.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... NECESSARY FOR SAFE OPERATION Frames, Cab and Body Components, Wheels, Steering, and Suspension Systems § 393... a roof exit. (b) Bolts or brackets securing the cab or the body of the vehicle to the frame shall...

  16. 33 CFR 96.450 - What happens if the Coast Guard disapproves an organization's request to be authorized?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf...

  17. 33 CFR 96.300 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS How Will Safety Management Systems... international certification for the company's and vessel's safety management system. ...

  18. 32 CFR 245.22 - Policy for application of EATPL.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...

  19. 32 CFR 245.22 - Policy for application of EATPL.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...

  20. 32 CFR 245.22 - Policy for application of EATPL.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...

  1. 32 CFR 245.22 - Policy for application of EATPL.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...

  2. Comparing 2 Adhesive Methods on Skin Integrity in the High-Risk Neonate.

    PubMed

    Boswell, Nicole; Waker, Cheryl L

    2016-12-01

    Nurses have a primary role in promoting neonatal skin integrity and skin care management of the critically ill neonate. Adhesive products are essential to secure needed medical devices but can be a significant factor contributing to skin breakdown. Current literature does not offer a definitive answer regarding which products most safely and effectively work to secure needed devices in the high-risk neonatal population. To determine which adhesive method is best practice to safely and effectively secure lines/tubes in the high-risk neonate population. The only main effect that was significant was age group with mean skin scores. Subjects in the younger group (24-28 weeks) had higher skin scores than in the older group (28-34 weeks), validating that younger gestations are at higher risk of breakdown with the use of adhesives. The findings did not clearly identify which product was superior to secure tubes and lines, or was the least injurious to skin of the high-risk neonate. Neither a transparent dressing only or transparent dressing over hydrocolloid method clearly demonstrated an advantage in the high-risk, preterm neonate. Anecdotal comments suggested staff preferred the transparent dressing over hydrocolloid method as providing better adhesive while protecting skin integrity. The findings validated that younger gestations are at higher risk of breakdown with the use of adhesives and therefore require close vigilance to maintain skin integrity.

  3. Time and Space Partition Platform for Safe and Secure Flight Software

    NASA Astrophysics Data System (ADS)

    Esquinas, Angel; Zamorano, Juan; de la Puente, Juan A.; Masmano, Miguel; Crespo, Alfons

    2012-08-01

    There are a number of research and development activities that are exploring Time and Space Partition (TSP) to implement safe and secure flight software. This approach allows to execute different real-time applications with different levels of criticality in the same computer board. In order to do that, flight applications must be isolated from each other in the temporal and spatial domains. This paper presents the first results of a partitioning platform based on the Open Ravenscar Kernel (ORK+) and the XtratuM hypervisor. ORK+ is a small, reliable realtime kernel supporting the Ada Ravenscar Computational model that is central to the ASSERT development process. XtratuM supports multiple virtual machines, i.e. partitions, on a single computer and is being used in the Integrated Modular Avionics for Space study. ORK+ executes in an XtratuM partition enabling Ada applications to share the computer board with other applications.

  4. The fast encryption package

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1988-01-01

    The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.

  5. Hybrid Power Management-Based Vehicle Architecture

    NASA Technical Reports Server (NTRS)

    Eichenberg, Dennis J.

    2011-01-01

    Hybrid Power Management (HPM) is the integration of diverse, state-of-the-art power devices in an optimal configuration for space and terrestrial applications (s ee figure). The appropriate application and control of the various power devices significantly improves overall system performance and efficiency. The basic vehicle architecture consists of a primary power source, and possibly other power sources, that provides all power to a common energy storage system that is used to power the drive motors and vehicle accessory systems. This architecture also provides power as an emergency power system. Each component is independent, permitting it to be optimized for its intended purpose. The key element of HPM is the energy storage system. All generated power is sent to the energy storage system, and all loads derive their power from that system. This can significantly reduce the power requirement of the primary power source, while increasing the vehicle reliability. Ultracapacitors are ideal for an HPM-based energy storage system due to their exceptionally long cycle life, high reliability, high efficiency, high power density, and excellent low-temperature performance. Multiple power sources and multiple loads are easily incorporated into an HPM-based vehicle. A gas turbine is a good primary power source because of its high efficiency, high power density, long life, high reliability, and ability to operate on a wide range of fuels. An HPM controller maintains optimal control over each vehicle component. This flexible operating system can be applied to all vehicles to considerably improve vehicle efficiency, reliability, safety, security, and performance. The HPM-based vehicle architecture has many advantages over conventional vehicle architectures. Ultracapacitors have a much longer cycle life than batteries, which greatly improves system reliability, reduces life-of-system costs, and reduces environmental impact as ultracapacitors will probably never need to be replaced and disposed of. The environmentally safe ultracapacitor components reduce disposal concerns, and their recyclable nature reduces the environmental impact. High ultracapacitor power density provides high power during surges, and the ability to absorb high power during recharging. Ultracapacitors are extremely efficient in capturing recharging energy, are rugged, reliable, maintenance-free, have excellent lowtemperature characteristic, provide consistent performance over time, and promote safety as they can be left indefinitely in a safe, discharged state whereas batteries cannot.

  6. Development of a web-based register for the Dutch national study on biologicals in JIA: www.ABC-register.nl.

    PubMed

    Prince, F H M; Ferket, I S; Kamphuis, S; Armbrust, W; Ten Cate, R; Hoppenreijs, E P A H; Koopman-Keemink, Y; van Rossum, M A J; van Santen-Hoeufft, M; Twilt, M; van Suijlekom-Smit, L W A

    2008-09-01

    Most clinical studies use paper case record forms (CRFs) to collect data. In the Dutch multi-centre observational study on biologicals we encountered several disadvantages of using the paper CRFs. These are delay in data collection, lack of overview in collected data and difficulties in obtaining up-to-date interim reports. Therefore, we wanted to create a more effective method of data collection compared with CRFs on paper in a multi-centre study. We designed a web-based register with the intention to make it easy to use for participating physicians and at the same time accurate and up-to-date. Security demands were taken into account to secure the safety of the patient data. The web-based register was tested with data from 161 juvenile idiopathic arthritis patients from nine different centres. Internal validity was obtained and user-friendliness guaranteed. To secure the completeness of the data automatically generated e-mail alerts were implemented into the web-based register. More transparency of data was achieved by including the option to automatically generate interim reports of data in the web-based register. The safety was tested and approved. By digitalizing the CRF we achieved our aim to provide easy, rapid and safe access to the database and contributed to a new way of data collection. Although the web-based register was designed for the current multi-centre observational study, this type of instrument can also be applied to other types of studies. We expect that especially collaborative study groups will find it an efficient tool to collect data.

  7. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less

  8. Security Management and Safeguards Office

    NASA Technical Reports Server (NTRS)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.

  9. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  10. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.

    PubMed

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-12-30

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

  11. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-01-01

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831

  12. Reviews of the Comprehensive Nuclear-Test-Ban Treaty and U.S. security

    NASA Astrophysics Data System (ADS)

    Jeanloz, Raymond

    2017-11-01

    Reviews of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the National Academy of Sciences concluded that the United States has the technical expertise and physical means to i) maintain a safe, secure and reliable nuclear-weapons stockpile without nuclear-explosion testing, and ii) effectively monitor global compliance once the Treaty enters into force. Moreover, the CTBT is judged to help constrain proliferation of nuclear-weapons technology, so it is considered favorable to U.S. security. Review of developments since the studies were published, in 2002 and 2012, show that the study conclusions remain valid and that technical capabilities are better than anticipated.

  13. Mobile agent application and integration in electronic anamnesis system.

    PubMed

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    Electronic anamnesis is to transform ordinary paper trails to digitally formatted health records, which include the patient's general information, health status, and follow-ups on chronic diseases. Its main purpose is to let the records could be stored for a longer period of time and could be shared easily across departments and hospitals. Which means hospital management could use less resource on maintaining ever-growing database and reduce redundancy, so less money would be spent for managing the health records. In the foreseeable future, building up a comprehensive and integrated medical information system is a must, because it is critical to hospital resource integration and quality improvement. If mobile agent technology is adopted in the electronic anamnesis system, it would help the hospitals to make the medical practices more efficiently and conveniently. Nonetheless, most of the hospitals today are still using paper-based health records to manage the medical information. The reason why the institutions continue using traditional practices to manage the records is because there is no well-trusted and reliable electronic anamnesis system existing and accepted by both institutions and patients. The threat of privacy invasion is one of the biggest concerns when the topic of electronic anamnesis is brought up, because the security threats drag us back from using such a system. So, the medical service quality is difficult to be improved substantially. In this case, we have come up a theory to remove such security threats and make electronic anamnesis more appealing for use. Our theory is to integrate the mobile agent technology with the backbone of electronic anamnesis to construct a hierarchical access control system to retrieve the corresponding information based upon the permission classes. The system would create a classification for permission among the users inside the medical institution. Under this framework, permission control center would distribute an access key to each user, so they would only allow using the key to access information correspondingly. In order to verify the reliability of the proposed system framework, we have also conducted a security analysis to list all the possible security threats that may harm the system and to prove the system is reliable and safe. If the system is adopted, the doctors would be able to quickly access the information while performing medical examinations. Hence, the efficiency and quality of healthcare service would be greatly improved.

  14. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    ERIC Educational Resources Information Center

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  15. Marine, Tropical, and Tsunami Services

    Science.gov Websites

    essential to the conduct of safe and efficient maritime operations and for the protection of the marine - Managed by National Data Buoy Center (NDBC) Awareness Weeks: Tsunami Preparedness Campaigns National Safe Prepared and Stay Safe! Tsunami Preparedness: Applying Lessons from the Past Pacific Tsunami Warning Center

  16. Interrelatedness of child health, protection and well-being: an application of the SAFE model in Rwanda.

    PubMed

    Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne

    2012-05-01

    This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    PubMed

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  18. Novel and potential application of cryopreservation to plant genetic transformation.

    PubMed

    Wang, Biao; Zhang, Zhibo; Yin, Zhenfang; Feng, Chaohong; Wang, Qiaochun

    2012-01-01

    The world population now is 6.7 billion and is predicted to reach 9 billion by 2050. Such a rapid growing population has tremendously increased the challenge for food security. Obviously, it is impossible for traditional agriculture to ensure the food security, while plant biotechnology offers considerable potential to realize this goal. Over the last 15 years, great benefits have been brought to sustainable agriculture by commercial cultivation of genetically modified (GM) crops. Further development of new GM crops will with no doubt contribute to meeting the requirements for food by the increasing population. The present article provides updated comprehensive information on novel and potential application of cryopreservation to genetic transformation. The major progresses that have been achieved in this subject include (1), long-term storage of a large number of valuable plant genes, which offers a good potential for further development of novel cultivars by genetic transformation; (2), retention of regenerative capacity of embryogenic tissues and protoplasts, which ensures efficient plant regeneration system for genetic transformation; (3), improvement of transformation efficiency and plant regeneration of transformed cells; (4), long-term preservation of transgenic materials with stable expression of transgenes and productive ability of recombinant proteins, which allows transgenic materials to be stored in a safe manner before being analyzed and evaluated, and allows establishment of stable seed stocks for commercial production of homologous proteins. Data provided in this article clearly demonstrate that cryo-technique has an important role to play in the whole chain of genetic transformation. Further studies coupling cryotechnique and genetic transformation are expected to significantly improve development of new GM crops. Copyright © 2011 Elsevier Inc. All rights reserved.

  19. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    PubMed

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  20. Efficient and reusable polyamide-56 nanofiber/nets membrane with bimodal structures for air filtration.

    PubMed

    Liu, Bowen; Zhang, Shichao; Wang, Xueli; Yu, Jianyong; Ding, Bin

    2015-11-01

    Nanofibrous media that both possess high airborne particle interception efficiency and robust air permeability would have broad technological implications for areas ranging from individual protection and industrial security to environmental governance; however, creating such filtration media has proved extremely challenging. Here we report a strategy to construct the bio-based polyamide-56 nanofiber/nets (PA-56 NFN) membranes with bimodal structures for effective air filtration via one-step electrospinning/netting. The PA-56 membranes are composed of completely covered two-dimensional (2D) ultrathin (∼20 nm) nanonets which are optimized by facilely regulating the solution concentration, and the bonded scaffold fibers constructed cavity structures which are synchronously created by using the CH3COOH inspiration. With integrated properties of small aperture, high porosity, and bonded scaffold, the resulting PA-56 NFN membranes exhibit high filtration efficiency of 99.995%, low pressure drop of 111 Pa, combined with large dust holding capacity of 49 g/m(2) and dust-cleaning regeneration ability, for filtrating ultrafine airborne particles in the most safe manner involving sieving principle and surface filtration. The successful synthesis of PA-56 NFN medium would not only make it a promising candidate for air filtration, but also provide new insights into the design and development of nanonet-based bimodal structures for various applications. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  2. Nutrition and food security policy in the Islamic Republic of Iran: situation analysis and roadmap towards 2021.

    PubMed

    Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo

    2018-05-03

    All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).

  3. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  4. Evaluation of the Efficiency of Liquid Cooling Garments using a Thermal Manikin

    DTIC Science & Technology

    2005-05-01

    temperatures. The software also calculates thermal resistances and evaporative resistances. TM tests were run dry (i.e. no sweating ) and wet (i.e...REPORT DOCUMENTATION PAGE Form ApprovedOMB No . 0704-0188 SECURITY CLASSIFICATION OF REPORT SECURITY CLASSIFICATION OF THIS PAGE SECURITY CLASSIFICATION...OF ABSTRACT 8. M05-17 1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE EVALUATION OF THE EFFICIENCY OF LIQUID COOLING GARMENTS USING A THERMAL

  5. Binary Hypothesis Testing With Byzantine Sensors: Fundamental Tradeoff Between Security and Efficiency

    NASA Astrophysics Data System (ADS)

    Ren, Xiaoqiang; Yan, Jiaqi; Mo, Yilin

    2018-03-01

    This paper studies binary hypothesis testing based on measurements from a set of sensors, a subset of which can be compromised by an attacker. The measurements from a compromised sensor can be manipulated arbitrarily by the adversary. The asymptotic exponential rate, with which the probability of error goes to zero, is adopted to indicate the detection performance of a detector. In practice, we expect the attack on sensors to be sporadic, and therefore the system may operate with all the sensors being benign for extended period of time. This motivates us to consider the trade-off between the detection performance of a detector, i.e., the probability of error, when the attacker is absent (defined as efficiency) and the worst-case detection performance when the attacker is present (defined as security). We first provide the fundamental limits of this trade-off, and then propose a detection strategy that achieves these limits. We then consider a special case, where there is no trade-off between security and efficiency. In other words, our detection strategy can achieve the maximal efficiency and the maximal security simultaneously. Two extensions of the secure hypothesis testing problem are also studied and fundamental limits and achievability results are provided: 1) a subset of sensors, namely "secure" sensors, are assumed to be equipped with better security countermeasures and hence are guaranteed to be benign, 2) detection performance with unknown number of compromised sensors. Numerical examples are given to illustrate the main results.

  6. 33 CFR 96.470 - How does the Coast Guard terminate an organization's authorization?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf of the U.S. § 96.470...

  7. 33 CFR 96.420 - What authority may an organization ask for under this regulation?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf of the U.S. § 96.420...

  8. 33 CFR 96.460 - How will I know what the Coast Guard requires of my organization if my organization receives...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized...

  9. 33 CFR 96.480 - What is the status of a certificate if the issuing organization has its authority terminated?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To...

  10. 10 CFR 30.4 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... access control measures that are not related to the safe use of, or security of, radiological materials... individual, corporation, partnership, firm, association, trust, estate, public or private institution, group... technical nature into practical application for experimental and demonstration purposes, including the...

  11. 7 CFR 1924.107 - Utilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... under this subpart must have adequate, economic, safe, energy efficient, dependable utilities with... wastewater systems are in compliance with the current provisions of the Safe Drinking Water Act and the Clean...

  12. 7 CFR 1924.107 - Utilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... under this subpart must have adequate, economic, safe, energy efficient, dependable utilities with... wastewater systems are in compliance with the current provisions of the Safe Drinking Water Act and the Clean...

  13. 7 CFR 1924.107 - Utilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... under this subpart must have adequate, economic, safe, energy efficient, dependable utilities with... wastewater systems are in compliance with the current provisions of the Safe Drinking Water Act and the Clean...

  14. 7 CFR 1924.107 - Utilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... under this subpart must have adequate, economic, safe, energy efficient, dependable utilities with... wastewater systems are in compliance with the current provisions of the Safe Drinking Water Act and the Clean...

  15. 7 CFR 1924.107 - Utilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... under this subpart must have adequate, economic, safe, energy efficient, dependable utilities with... wastewater systems are in compliance with the current provisions of the Safe Drinking Water Act and the Clean...

  16. NASA Unmanned Aircraft (UA) Control and Non-Payload Communication (CNPC) System Waveform Trade Studies

    NASA Technical Reports Server (NTRS)

    Chavez, Carlos; Hammel, Bruce; Hammel, Allan; Moore, John R.

    2014-01-01

    Unmanned Aircraft Systems (UAS) represent a new capability that will provide a variety of services in the government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized due to the lack of a common understanding of what is required to safely operate UAS in the National Airspace System (NAS). To address this deficiency, NASA has established a project called UAS Integration in the NAS (UAS in the NAS), under the Integrated Systems Research Program (ISRP) of the Aeronautics Research Mission Directorate (ARMD). This project provides an opportunity to transition concepts, technology, algorithms, and knowledge to the Federal Aviation Administration (FAA) and other stakeholders to help them define the requirements, regulations, and issues for routine UAS access to the NAS. The safe, routine, and efficient integration of UAS into the NAS requires new radio frequency (RF) spectrum allocations and a new data communications system which is both secure and scalable with increasing UAS traffic without adversely impacting the Air Traffic Control (ATC) communication system. These data communications, referred to as Control and Non-Payload Communications (CNPC), whose purpose is to exchange information between the unmanned aircraft and the ground control station to ensure safe, reliable, and effective unmanned aircraft flight operation. A Communications Subproject within the UAS in the NAS Project has been established to address issues related to CNPC development, certification and fielding. The focus of the Communications Subproject is on validating and allocating new RF spectrum and data link communications to enable civil UAS integration into the NAS. The goal is to validate secure, robust data links within the allocated frequency spectrum for UAS. A vision, architectural concepts, and seed requirements for the future commercial UAS CNPC system have been developed by RTCA Special Committee 203 (SC-203) in the process of determining formal recommendations to the FAA in its role provided for under the Federal Advisory Committee Act. NASA intends to conduct its research and development in keeping with this vision and associated architectural concepts. The prototype communication systems developed and tested by NASA will be used to validate and update the initial SC-203 requirements in order to provide a foundation for SC-203's Minimum Aviation System Performance Standards (MASPS).

  17. A feasibility study of evaluating transportation security systems and associated multi-modal efficiency impacts

    DOT National Transportation Integrated Search

    2006-08-01

    The overall purpose of this research project is to conduct a feasibility study and development of a general methodology to determine the impacts on multi-modal and system efficiency of alternative freight security measures. The methodology to be exam...

  18. SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING

    PubMed Central

    Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.

    2013-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  19. Climate Change and Global Food Security: Food Access, Utilization, and the US Food System

    NASA Astrophysics Data System (ADS)

    Brown, M. E.; Antle, J. M.; Backlund, P. W.; Carr, E. R.; Easterling, W. E.; Walsh, M.; Ammann, C. M.; Attavanich, W.; Barrett, C. B.; Bellemare, M. F.; Dancheck, V.; Funk, C.; Grace, K.; Ingram, J. S. I.; Jiang, H.; Maletta, H.; Mata, T.; Murray, A.; Ngugi, M.; Ojima, D. S.; O'Neill, B. C.; Tebaldi, C.

    2015-12-01

    This paper will summarize results from the USDA report entitled 'Climate change, Global Food Security and the U.S. Food system'. The report focuses on the impact of climate change on global food security, defined as "when all people at all times have physical, social, and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life". The assessment brought together authors and contributors from twenty federal, academic, nongovernmental, intergovernmental, and private organizations in four countries to identify climate change effects on food security through 2100, and analyze the U.S.'s likely connections with that world. This talk will describe how climate change will likely affect food access and food utilization, and summarize how the U.S. food system contributes to global food security, and will be affected by climate change.

  20. European Security in the Balkans: The Case of Macedonia

    DTIC Science & Technology

    2013-03-01

    for the Republic of Macedonia; it is the problem of the European Union as well, due to the historical fact that the European Great Powers had...integration of Bulgaria and Romania in the European Union was based on the short term political interests of the EU - to create a safe ring toward... Union in the Security of Europe: From Cold War to Terror War, 117. 28 Nicola Guy, The Birth of Albania, “Ethnic Nationalism, the Great Powers of World

  1. Security Perspectives and Policies: Lebanon, Syria, Israel, and the Palestinians. Conference Papers

    DTIC Science & Technology

    1991-05-01

    long life standing up to Arab demands than the Likud. expectancy rate in power, similarly, there are few Labor’s stated goals in 1988 were security...positions, such successful vote in Israel’s history), it was patronage to-renard a g.’% rate supporters, safe widely suggested b) leaders in other...Arafat and-his senior influence within the PLO’s various councils political advisors have elaborated upon- the PLO’s incommensurate with their

  2. 20 CFR 416.701 - Scope of subpart.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... Security Administration, to achieve efficient administration of the Supplemental Security Income (SSI... events to us. It is important for us to know about these events because they may affect your continued...

  3. 40 CFR 35.3500 - Purpose, policy, and applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Revolving Fund program under section 1452 of the Safe Drinking Water Act, as amended in 1996. It applies to... health protection objectives of the Safe Drinking Water Act, promote the efficient use of all funds, and... systems. (b) This subpart supplements section 1452 of the Safe Drinking Water Act by codifying statutory...

  4. 40 CFR 35.3500 - Purpose, policy, and applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Revolving Fund program under section 1452 of the Safe Drinking Water Act, as amended in 1996. It applies to... health protection objectives of the Safe Drinking Water Act, promote the efficient use of all funds, and... systems. (b) This subpart supplements section 1452 of the Safe Drinking Water Act by codifying statutory...

  5. A security framework for nationwide health information exchange based on telehealth strategy.

    PubMed

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  6. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    PubMed Central

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  7. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    PubMed

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  8. 45 CFR 1310.17 - Driver and bus monitor training.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... safe and efficient manner; (2) safely run a fixed route, including loading and unloading children... first aid in case of injury; (4) handle emergency situations, including vehicle evacuation procedures...

  9. Infrastructure-Based Sensors Augmenting Efficient Autonomous Vehicle Operations: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jun, Myungsoo; Markel, Anthony J

    Autonomous vehicle technology development relies on an on-board network of fused sensor inputs for safe and efficient operation. The fused sensors offer multiple perspectives of similar information aiding in system decision robustness. The high cost of full systems on individual vehicles is seen as a potential barrier to broad adoption and achieving system energy efficiency gains. Since traffic in autonomous vehicle technology development relies on an on-board network of fused sensor inputs for safe and efficient operation. The fused sensors offer multiple perspectives of similar information aiding in system decision robustness. The high cost of full systems on individual vehiclesmore » is seen as a potential barrier to broad adoption and achieving system energy efficiency gains.« less

  10. Feeling safe during an inpatient hospitalization: a concept analysis.

    PubMed

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  11. Tag-KEM from Set Partial Domain One-Way Permutations

    NASA Astrophysics Data System (ADS)

    Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru

    Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabin's encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.

  12. Safe and efficient use of the Internet.

    PubMed

    Downes, P K

    2007-07-14

    A minority of people abuse the freedom of the Internet to the detriment of the vast majority. Many people feel that the Internet requires more regulation to reduce the burden of hackers, viruses, hoaxes, adverts and spam that continue to proliferate unabated. Until this ever happens, it is down to the individual person or business to protect themselves against malicious attacks and to use the Internet in a safe and efficient manner.

  13. Can Your Older Patients Drive Safely?

    DOT National Transportation Integrated Search

    2017-09-01

    In many areas of the world, driving is an essential part of life and for reasons of comfort, convenience, and security remains the primary mode of transportation among older adults. Both normal aging and diseases that are more prevalent in advanced a...

  14. Semiannual Report: Oct 1, 2004 - Mar 31, 2005

    EPA Pesticide Factsheets

    Semiannual Report #EPA-350-R-05-002, April, 2005. During this semiannual reporting period, two of our more important activities focused on the efforts of the EPA to make air safe and healthy to breathe, and to help improve homeland security.

  15. 33 CFR 96.200 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Company and Vessel Safety Management Systems § 96.200 Purpose. This subpart establishes the minimum standards that the safety...

  16. 33 CFR 96.495 - How can I appeal a decision made by an authorized organization?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf of the U.S. § 96.495...

  17. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance... surveying travelers to measure customer satisfaction of aviation security in an effort to more efficiently... Title: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. Type of Request...

  18. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance... surveying travelers to measure customer satisfaction of aviation security in an effort to more efficiently.... Information Collection Requirement OMB Control Number 1652-0013; Aviation Security Customer Satisfaction...

  19. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  20. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  1. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    PubMed Central

    Lee, Tian-Fu; Wang, Zeng-Bo

    2017-01-01

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509

  2. SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.

  3. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  4. Thin film CdTe based neutron detectors with high thermal neutron efficiency and gamma rejection for security applications

    NASA Astrophysics Data System (ADS)

    Smith, L.; Murphy, J. W.; Kim, J.; Rozhdestvenskyy, S.; Mejia, I.; Park, H.; Allee, D. R.; Quevedo-Lopez, M.; Gnade, B.

    2016-12-01

    Solid-state neutron detectors offer an alternative to 3He based detectors, but suffer from limited neutron efficiencies that make their use in security applications impractical. Solid-state neutron detectors based on single crystal silicon also have relatively high gamma-ray efficiencies that lead to false positives. Thin film polycrystalline CdTe based detectors require less complex processing with significantly lower gamma-ray efficiencies. Advanced geometries can also be implemented to achieve high thermal neutron efficiencies competitive with silicon based technology. This study evaluates these strategies by simulation and experimentation and demonstrates an approach to achieve >10% intrinsic efficiency with <10-6 gamma-ray efficiency.

  5. 76 FR 45309 - Social Security Ruling 11-1p; Titles II and XVI: Procedures for Handling Requests To File...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-28

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0057] Social Security Ruling 11-1p; Titles II... AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling (SSR) SUMMARY: We are... administrative review process. This change will allow us to more efficiently use our limited resources to handle...

  6. Integrated Work Management: Overview, Course 31881

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simpson, Lewis Edward

    Integrated work management (IWM) is the process used for formally implementing the five-step process associated with integrated safety management (ISM) and integrated safeguards and security management (ISSM) at Los Alamos National Laboratory (LANL). IWM also directly supports the LANL Environmental Management System (EMS). IWM helps all workers and managers perform work safely and securely and in a manner that protects people, the environment, property, and the security of the nation. The IWM process applies to all work activities at LANL, from working in the office to designing experiments to assembling and detonating explosives. The primary LANL document that establishes andmore » describes IWM requirements is Procedure (P) 300, Integrated Work Management.« less

  7. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  8. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  9. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  10. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; CenterQuantum Information in Tsinghua University Team

    2017-04-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  11. CREM monitoring: a wireless RF application

    NASA Astrophysics Data System (ADS)

    Valencia, J. D.; Burghard, B. J.; Skorpik, J. R.; Silvers, K. L.; Schwartz, M. J.

    2005-05-01

    Recent security lapses within the Department of Energy laboratories prompted the establishment and implementation of additional procedures and training for operations involving classified removable electronic media (CREM) storage. In addition, the definition of CREM has been expanded and the number of CREM has increased significantly. Procedures now require that all CREM be inventoried and accounted for on a weekly basis. Weekly inventories consist of a physical comparison of each item against the reportable inventory listing. Securing and accounting for CREM is a continuous challenge for existing security systems. To address this challenge, an innovative framework, encompassing a suite of technologies, has been developed by Pacific Northwest National Laboratory (PNNL) to monitor, track, and locate CREM in safes, vaults, and storage areas. This Automated Removable Media Observation and Reporting (ARMOR)framework, described in this paper, is an extension of an existing PNNL program, SecureSafe. The key attributes of systems built around the ARMOR framework include improved accountability, reduced risk of human error, improved accuracy and timeliness of inventory data, and reduced costs. ARMOR solutions require each CREM to be tagged with a unique electronically readable ID code. Inventory data is collected from tagged CREM at regular intervals and upon detection of an access event. Automated inventory collection and report generation eliminates the need for hand-written inventory sheets and allows electronic transfer of the collected inventory data to a modern electronic reporting system. An electronic log of CREM access events is maintained, providing enhanced accountability for daily/weekly checks, routine audits, and follow-up investigations.

  12. Efficient Authorization of Rich Presence Using Secure and Composed Web Services

    NASA Astrophysics Data System (ADS)

    Li, Li; Chou, Wu

    This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.

  13. 78 FR 8128 - Request for Nominations of Experts to the EPA Office of Research and Development's Board of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... Program; Homeland Security Research Program; Human Health Risk Assessment Research Program; Safe and... --atmospheric physics Biology --biogeochemistry --cell biology --endocrinology (endocrine disruptors... analysis --uncertainty analysis Nanotechnology Public Health --children's health --community health...

  14. Understanding and managing the movements of hazardous material shipments through Texas population centers.

    DOT National Transportation Integrated Search

    2009-08-01

    Every day almost a million shipments of hazardous materials move safely and securely along our nations transportation system, via any combination of modes. Only a small fraction of total shipments interrupt their planned journey due to an incident...

  15. QUALITY ASSURANCE AND QUALITY CONTROL FOR WASTE CONTAINMENT FACILITIES. Project Summary

    EPA Science Inventory

    It is generally agreed that both quality assurance (QA) and quality control (QC) are essential to the proper installation and eventual performance of environmentally safe and secure waste containment systems. Even further, there are both manufacturing and construction aspects to...

  16. 49 CFR 393.100 - Which types of commercial motor vehicles are subject to the cargo securement standards of this...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...

  17. 49 CFR 393.100 - Which types of commercial motor vehicles are subject to the cargo securement standards of this...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...

  18. 49 CFR 393.100 - Which types of commercial motor vehicles are subject to the cargo securement standards of this...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...

  19. 49 CFR 393.100 - Which types of commercial motor vehicles are subject to the cargo securement standards of this...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...

  20. 49 CFR 393.100 - Which types of commercial motor vehicles are subject to the cargo securement standards of this...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...

  1. 33 CFR 96.400 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Purpose. 96.400 Section 96.400 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized...

  2. 48 CFR 25.301-1 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...

  3. 41 CFR 102-35.30 - What actions must I take or am I authorized to take regardless of the property disposition method?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Public Contracts and Property Management Federal Property Management Regulations System (Continued... of the disposition method used: (a) You must maintain property in a safe, secure, and cost-effective...

  4. 48 CFR 25.301-1 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...

  5. 48 CFR 25.301-1 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...

  6. 48 CFR 25.301-1 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...

  7. 48 CFR 25.301-1 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...

  8. Safety | Argonne National Laboratory

    Science.gov Websites

    laboratory's ongoing effort to provide a safe and productive environment for employees, users, other site Skip to main content Argonne National Laboratory Toggle Navigation Toggle Search Energy Environment Careers Education Community Diversity Directory Energy Environment National Security User Facilities

  9. No Safe Havens.

    ERIC Educational Resources Information Center

    Trump, Kenneth S.; Lavarello, Curtis

    2003-01-01

    Discusses implications of national survey of school-based police that finds majority of respondents believe schools are vulnerable to a terrorist attack. Describes school board's role in improving school safety, steps school officials can take to reduce risk, and some practical, cost-effective measures to increase security. (PKP)

  10. 78 FR 14629 - 10th Anniversary of the United States Department of Homeland Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-06

    ... (DHS) opened its doors with a single task: keeping the American people safe. Day by day, hour by hour... decade of service, our Nation recognizes the men and women who have carried out the Department of...

  11. Advancing STEM Career and Learning through Civic Engagement

    ERIC Educational Resources Information Center

    Xie, Yichun

    2014-01-01

    The Mayor's Youth Technology Corps (MYTC)--Creating Safe Communities through Information Technology Training in Homeland Security Applications (2008-2012)--offered a collaboration of resources, supports, and opportunities for strengthening science, technology, engineering, and mathematics (STEM) education efforts in an underserved community, the…

  12. SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach.

    PubMed

    Chenghong, Wang; Jiang, Yichen; Mohammed, Noman; Chen, Feng; Jiang, Xiaoqian; Al Aziz, Md Momin; Sadat, Md Nazmus; Wang, Shuang

    2017-01-01

    As genomic data are usually at large scale and highly sensitive, it is essential to enable both efficient and secure analysis, by which the data owner can securely delegate both computation and storage on untrusted public cloud. Counting query of genotypes is a basic function for many downstream applications in biomedical research (e.g., computing allele frequency, calculating chi-squared statistics, etc.). Previous solutions show promise on secure counting of outsourced data but the efficiency is still a big limitation for real world applications. In this paper, we propose a novel hybrid solution to combine a rigorous theoretical model (homomorphic encryption) and the latest hardware-based infrastructure (i.e., Software Guard Extensions) to speed up the computation while preserving the privacy of both data owners and data users. Our results demonstrated efficiency by using the real data from the personal genome project.

  13. SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach

    PubMed Central

    Chenghong, Wang; Jiang, Yichen; Mohammed, Noman; Chen, Feng; Jiang, Xiaoqian; Al Aziz, Md Momin; Sadat, Md Nazmus; Wang, Shuang

    2017-01-01

    As genomic data are usually at large scale and highly sensitive, it is essential to enable both efficient and secure analysis, by which the data owner can securely delegate both computation and storage on untrusted public cloud. Counting query of genotypes is a basic function for many downstream applications in biomedical research (e.g., computing allele frequency, calculating chi-squared statistics, etc.). Previous solutions show promise on secure counting of outsourced data but the efficiency is still a big limitation for real world applications. In this paper, we propose a novel hybrid solution to combine a rigorous theoretical model (homomorphic encryption) and the latest hardware-based infrastructure (i.e., Software Guard Extensions) to speed up the computation while preserving the privacy of both data owners and data users. Our results demonstrated efficiency by using the real data from the personal genome project. PMID:29854245

  14. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  15. SAFE (strategy, assessment, flexibility, and efficiency) for future use? Stages in master planning, programming, and architectural design.

    PubMed

    Westlake, P

    1995-10-01

    Health care facility design must incorporate four key elements: Strategy, Assessment, Flexibility, and Efficiency. These SAFE elements will offer the organization the greatest return on investment, because they encompass both present needs and future demand. They respect the integrated nature of functional operations by clustering them in ways that permit growth or consolidation. In the rapidly changing health care environment, flexibility is fundamental to successful design.

  16. Efficient Storing Energy Harvested by Triboelectric Nanogenerators Using a Safe and Durable All-Solid-State Sodium-Ion Battery.

    PubMed

    Hou, Huidan; Xu, Qingkai; Pang, Yaokun; Li, Lei; Wang, Jiulin; Zhang, Chi; Sun, Chunwen

    2017-08-01

    Storing energy harvested by triboelectric nanogenerators (TENGs) from ambient mechanical motion is still a great challenge for achieving low-cost and environmental benign power sources. Here, an all-solid-state Na-ion battery with safe and durable performance used for efficient storing pulsed energy harvested by the TENG is demonstrated. The solid-state sodium-ion batteries are charged by galvanostatic mode and pulse mode with the TENG, respectively. The all-solid-state sodium-ion battery displays excellent cyclic performance up to 1000 cycles with a capacity retention of about 85% even at a high charge and discharge current density of 48 mA g -1 . When charged by the TENG, an energy conversion efficiency of 62.3% is demonstrated. The integration of TENGs with the safe and durable all-solid-state sodium-ion batteries is potential for providing more stable power output for self-powered systems.

  17. Provision of safe domestic water for the promotion and protection of public health: a case study of the city of Beirut, Lebanon.

    PubMed

    Korfali, Samira Ibrahim; Jurdi, Mey

    2009-04-01

    Securing adequate safe drinking water and proper sanitation is a major challenge facing the developing world. The "Water for Life Decade" emphasizes the importance of upgrading national water quality and sanitation services. This study assessed the domestic water profile in the city of Beirut. Samples were collected from three types of household water sources (municipality, private wells, and vended water bottles) and assessed for their physiochemical and microbiological profile. At the same time, a cross-sectional survey assessing water consumption patterns and the prevalence of water-borne diseases was conducted. The results showed a deficient water quality profile in all three water sources. The measured physiochemical and bacteriological parameters reflected the high frequency of water-borne diseases. Action to secure a safe domestic water supply is essential. The plan should guarantee the protection of water sources, ensure sufficient treatment of domestic water and upgrade the national program for potable water quality control. Periodic quality monitoring and legislating the chaotic water-vending sector are indispensable. Additionally, the deterioration of private well sources by sea and wastewater infiltration necessitates the enforcement of legislation associated with the use and management of private wells. Consumer awareness and active contributions to promote and protect public health are important.

  18. Re-designing the PhEDEx Security Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, C.-H.; Wildish, T.; Zhang, X.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less

  19. Re-designing the PhEDEx Security Model

    NASA Astrophysics Data System (ADS)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  20. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  1. Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?

    PubMed

    Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M

    2015-11-26

    Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. We sought to compare residents' preferences for SMS text messaging compared with other forms of in-hospital communication when considering security versus ease of use. This study was a cross-sectional multi-institutional survey of internal medicine residents. Residents ranked different communication modalities based on efficiency, ease of use, and security using a Likert scale. Communication options included telephone, email, hospital paging, and SMS text messaging. Respondents also reported whether they had received confidential patient identifiers through any of these modalities. SMS text messaging was preferred by 71.7% (94/131) of respondents because of its efficiency and by 79.8% (103/129) of respondents because of its ease of use. For security, 82.5% (104/126) of respondents preferred the hospital paging system, whereas only 20.6% (26/126) of respondents preferred SMS text messaging for secure communication. In all, 70.9% (93/131) of respondents reported having received patient identifiers (first and/or last name), 81.7% (107/131) reported receiving patient initials, and 50.4% (66/131) reported receiving a patient's medical record number through SMS text messages. Residents prefer in-hospital communication through SMS text messaging because of its ease of use and efficiency. Despite security concerns, the majority of residents reported receiving confidential patient information through SMS text messaging. For providers, it is possible that the benefits of improved in-hospital communication with SMS text messaging and the presumed improvement in the coordination and delivery of patient care outweigh security concerns they may have. The tension between the security and convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.

  2. Development of the SAFE Checklist Tool for Assessing Site-Level Threats to Child Protection: Use of Delphi Methods and Application to Two Sites in India

    PubMed Central

    Betancourt, Theresa S.; Zuilkowski, Stephanie S.; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T.

    2015-01-01

    Background The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). Methods The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Results Field testing in two diverse sites in India—a construction site and a railway station—revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues. PMID:26540159

  3. Development of the SAFE Checklist Tool for Assessing Site-Level Threats to Child Protection: Use of Delphi Methods and Application to Two Sites in India.

    PubMed

    Betancourt, Theresa S; Zuilkowski, Stephanie S; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T

    2015-01-01

    The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Field testing in two diverse sites in India-a construction site and a railway station-revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues.

  4. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  5. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  6. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    PubMed

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

  7. PREMIX: PRivacy-preserving EstiMation of Individual admiXture.

    PubMed

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.

  8. The Use of Hysterosalpingography in the Diagnosis of Infertility and Other Gynecological Conditions

    PubMed Central

    Dutton, W. A. W.; Stapleton, J. G.

    1963-01-01

    Hysterosalpingography was performed on 175 patients who had gynecological symptoms but negative pelvic findings, in order to test a new method of introducing the contrast medium into the uterus and tubes and to record the incidence of pathology revealed. In 132 patients, an attempt was made to secure a No. 14 Foley catheter in the uterus for introducing the contrast medium. This method was successful in 124 patients and can be recommended as being simple, less painful and more efficient than older methods. Of 156 patients with the complaints of infertility (68), dysmenorrhea (31), pelvic pain (29) or menstrual disorder (28), hysterosalpingography revealed significant abnormality in 58; most of these (47) had chronic salpingitis. One flare-up of pelvic inflammation occurred but no other complications were observed. It was concluded that hysterosalpingography is now sufficiently safe and reliable to merit wider utilization in gynecological diagnosis. ImagesFig. 1Fig. 2Fig. 3Fig. 4Fig. 5Fig. 6Fig. 7 PMID:14088822

  9. Spent Nuclear Fuel Transportation: An Examination of Potential Lessons Learned From Prior Shipping Campaigns

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marsha Keister; Kathryn McBride

    The Nuclear Waste Policy Act of 1982 (NWPA), as amended, assigned the Department of Energy (DOE) responsibility for developing and managing a Federal system for the disposal of spent nuclear fuel (SNF) and high-level radioactive waste (HLW). The Office of Civilian Radioactive Waste Management (OCRWM) is responsible for accepting, transporting, and disposing of SNF and HLW at the Yucca Mountain repository in a manner that protects public health, safety, and the environment; enhances national and energy security; and merits public confidence. OCRWM faces a near-term challenge—to develop and demonstrate a transportation system that will sustain safe and efficient shipments ofmore » SNF and HLW to a repository. To better inform and improve its current planning, OCRWM has extensively reviewed plans and other documents related to past high-visibility shipping campaigns of SNF and other radioactive materials within the United States. This report summarizes the results of this review and, where appropriate, lessons learned.« less

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Trivelpiece, A.W.

    In January 1996, when the management and operation (M and O) contract for the Oak Ridge National Laboratory (ORNL) was awarded to Lockheed Martin Energy Research Corporation, they were presented with the opportunity to develop and implement a management structure tailored to the Laboratory's needs and functions. In response, they launched a Laboratory-wide reengineering effort and undertook other work with the goal of fostering excellence, relevance, and stewardship in all aspects of the Laboratory's operations. This effort is paying off in improvements in their ability to meet the expectations established for ORNL as a Department of Energy laboratory overseen bymore » the Office of Science: delivering advances in science and technology, securing new capabilities, improving the ability to operate safely and efficiently at reasonable cost, and being a good neighbor. The development of critical outcomes and objectives, now under way in partnership with the Department's Oak Ridge Operations Office, is aimed at providing a performance-based means of determining how ORNL measures up to these expectations.« less

  11. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  12. 10 CFR 34.101 - Notifications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... written report to the NRC's Office of Federal and State Materials and Environmental Management Programs... shielded position and secure it in this position; or (3) Failure of any component (critical to safe... overexposure submitted under 10 CFR 20.2203 which involves failure of safety components of radiography...

  13. 19 CFR 113.63 - Basic custodial bond conditions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 113.63 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT... transferred under those procedures, thereby assuming primary responsibility for the continued proper custody... use only authorized means of conveyance; (2) To keep safe any merchandise placed in its custody...

  14. 33 CFR 155.710 - Qualifications of person in charge.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS... control and monitoring systems, the procedures for reporting pollution incidents, and, if installed, the Crude-Oil Washing (COW), inert-gas, and vapor-control systems—to safely conduct a transfer of fuel oil...

  15. 33 CFR 155.710 - Qualifications of person in charge.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS... control and monitoring systems, the procedures for reporting pollution incidents, and, if installed, the Crude-Oil Washing (COW), inert-gas, and vapor-control systems—to safely conduct a transfer of fuel oil...

  16. 75 FR 14609 - Commercial Fishing Industry Vessel Safety Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-26

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2010-0163] Commercial Fishing... applications. SUMMARY: The Coast Guard seeks applications for membership on the Commercial Fishing Industry... Coast Guard on matters relating to the safe operation of commercial fishing industry vessels. DATES...

  17. 76 FR 30491 - National Hurricane Preparedness Week, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... Hurricane Preparedness Week, 2011 Proclamation 8680--National Safe Boating Week, 2011 Proclamation 8681... Hurricane Preparedness Week, 2011 By the President of the United States of America A Proclamation National Hurricane Preparedness Week highlights the importance of planning ahead to protect our families and secure...

  18. 46 CFR 16.101 - Purpose of regulations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...

  19. 46 CFR 16.101 - Purpose of regulations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...

  20. 46 CFR 16.101 - Purpose of regulations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...

  1. 46 CFR 16.101 - Purpose of regulations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...

  2. 46 CFR 16.101 - Purpose of regulations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...

  3. Dealing With Russian Tactical Nuclear Weapons

    DTIC Science & Technology

    2004-01-01

    the plants, facilities, and equipment necessary to safely secure and store weapons pits (the plutonium “triggers” at the center of a thermonuclear ... bomb , and hence the most critical piece) proffered by either party. Furthermore, the statute requires the IAEA to establish control over the pits until

  4. 48 CFR 225.7402-1 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...

  5. 48 CFR 225.7402-1 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...

  6. 48 CFR 225.7402-1 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...

  7. 48 CFR 225.7402-1 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...

  8. 48 CFR 225.7402-1 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...

  9. 29 CFR 1910.181 - Derricks.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., working means the external load, in pounds, applied to the derrick, including the weight of load attaching... securely affixed where it is visible to personnel responsible for the safe operation of the equipment. The... of service, and environment, or as specifically indicated below. These inspections shall include the...

  10. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Understanding of the importance of creating and maintaining safe working and living conditions for passengers... responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... space numbering; and (B) Understanding of various vessel types; and working knowledge of nautical terms...

  11. Realization and Addressing Analysis In Blockchain Bitcoin

    NASA Astrophysics Data System (ADS)

    Sakti Arief Daulay, Raja; Michrandi Nasution, Surya; Paryasto, Marisa W.

    2017-11-01

    The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.

  12. 31 CFR 500.517 - Access to safe deposit boxes under certain conditions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... hereby required to be filed. All reports made pursuant to this section shall bear on their face or have securely attached to them a statement reading, “this report is filed pursuant to 31 CFR 500.517”. [15 FR...

  13. The Future of the U.S. Nuclear Weapons Program

    NASA Astrophysics Data System (ADS)

    Brooks, Linton F.

    2007-03-01

    This paper will examine our plans for the future of the U.S. nuclear weapons program including efforts to ``transform'' the stockpile and supporting infrastructure. We proceed from the premise that the United States will need a safe, secure, and reliable nuclear deterrent for the foreseeable future. Moreover, the Stockpile Stewardship Program is working. Today's stockpile---comprised of legacy warheads left over from the Cold War---is safe and reliable. That said, we see increased risk, absent nuclear testing, in assuring the long-term safety and reliability of our current stockpile. Nor is today's nuclear weapons complex sufficiently ``responsive'' to fixing technical problems in the stockpile, or to potential adverse geopolitical change. Our task is to work to ensure that the U.S. nuclear weapons enterprise, including the stockpile and supporting infrastructure, meets long-term national security needs. Our approach is to develop and field replacement warheads for the legacy stockpile---so-called Reliable Replacement Warheads (RRW)---as a means to transform both the nuclear stockpile and supporting infrastructure.

  14. A Mutual Authentication Framework for Wireless Medical Sensor Networks.

    PubMed

    Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav

    2017-05-01

    Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.

  15. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    ERIC Educational Resources Information Center

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  16. Inventory of Safety-related Codes and Standards for Energy Storage Systems with some Experiences related to Approval and Acceptance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.

    The purpose of this document is to identify laws, rules, model codes, codes, standards, regulations, specifications (CSR) related to safety that could apply to stationary energy storage systems (ESS) and experiences to date securing approval of ESS in relation to CSR. This information is intended to assist in securing approval of ESS under current CSR and to identification of new CRS or revisions to existing CRS and necessary supporting research and documentation that can foster the deployment of safe ESS.

  17. Digital waterway construction based on inland electronic navigation chart

    NASA Astrophysics Data System (ADS)

    Wang, Xue; Pan, Junfeng; Zhu, Weiwei

    2015-12-01

    With advantages of large capacity, long distance, low energy consumption, low cost, less land occupation and light pollution, inland waterway transportation becomes one of the most important constituents of the comprehensive transportation system and comprehensive water resources utilization in China. As one of "three elements" of navigation, waterway is the important basis for the development of water transportation and plays a key supporting role in shipping economic. The paper discuss how to realize the informatization and digitization of waterway management based on constructing an integrated system of standard inland electronic navigation chart production, waterway maintenance, navigation mark remote sensing and control, ship dynamic management, and water level remote sensing and report, which can also be the foundation of the intelligent waterway construction. Digital waterway construction is an information project and also has a practical meaning for waterway. It can not only meet the growing high assurance and security requirements for waterway, but also play a significant advantage in improving transport efficiency, reducing costs, promoting energy conservation and so on. This study lays a solid foundation on realizing intelligent waterway and building a smooth, efficient, safe, green modern inland waterway system, and must be considered as an unavoidable problem for the coordinated development between "low carbon" transportation and social economic.

  18. Motor Carrier Efficiency Study Phase I

    DOT National Transportation Integrated Search

    2009-02-01

    The Safe, Accountable, Flexible, Efficient Transportation Equity Act: A Legacy for Users (SAFETEA-LU, Public Law 109-59), Section 5503, set aside funding to examine the application of wireless technology to improve the safety and efficiency of trucki...

  19. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    PubMed Central

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  20. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    PubMed

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  1. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    PubMed

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  2. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

    PubMed Central

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-01-01

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632

  3. Secure and Authenticated Data Communication in Wireless Sensor Networks.

    PubMed

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-08-10

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.

  4. Secure and Authenticated Data Communication in Wireless Sensor Networks

    PubMed Central

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  5. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  6. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  7. Development of an Internet Security Policy for health care establishments.

    PubMed

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  8. Strengthening Data Confidentiality and Integrity Protection in the Context of a Multi-Centric Information System Dedicated to Autism Spectrum Disorder.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe

    2017-01-01

    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.

  9. Airport Viz - a 3D Tool to Enhance Security Operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koch, Daniel B

    2006-01-01

    In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to amore » number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.« less

  10. Physical design correlates of efficiency and safety in emergency departments: a qualitative examination.

    PubMed

    Pati, Debajyoti; Harvey, Thomas E; Pati, Sipra

    2014-01-01

    The objective of this study was to explore and identify physical design correlates of safety and efficiency in emergency department (ED) operations. This study adopted an exploratory, multimeasure approach to (1) examine the interactions between ED operations and physical design at 4 sites and (2) identify domains of physical design decision-making that potentially influence efficiency and safety. Multidisciplinary gaming and semistructured interviews were conducted with stakeholders at each site. Study data suggest that 16 domains of physical design decisions influence safety, efficiency, or both. These include (1) entrance and patient waiting, (2) traffic management, (3) subwaiting or internal waiting areas, (4) triage, (5) examination/treatment area configuration, (6) examination/treatment area centralization versus decentralization, (7) examination/treatment room standardization, (8) adequate space, (9) nurse work space, (10) physician work space, (11) adjacencies and access, (12) equipment room, (13) psych room, (14) staff de-stressing room, (15) hallway width, and (16) results waiting area. Safety and efficiency from a physical environment perspective in ED design are mutually reinforcing concepts--enhancing efficiency bears positive implications for safety. Furthermore, safety and security emerged as correlated concepts, with security issues bearing implications for safety, thereby suggesting important associations between safety, security, and efficiency.

  11. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  12. 77 FR 66219 - Clearing Agency Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... operation of a registered clearing agency that identify minimum standards designed to enhance the regulatory...'', Securities Exchange Act Release No. 34-66868 (Apr. 27, 2012). Title VII was designed to provide greater... encourage the safe design and operation of entities that provide clearance and settlement services. The FMI...

  13. 77 FR 16046 - Commercial Fishing Safety Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-19

    ... Security on matters relating to the safe operation of commercial fishing industry vessels. DATES... balance; and (2) have experience in the operation of vessels to which Chapter 45 of Title 46, U.S.C... race, color, religion, sex, national origin, political affiliation, sexual orientation, gender identity...

  14. Sandia National Laboratories: Fabrication, Testing and Validation

    Science.gov Websites

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas safe, secure, reliable, and can fully support the Nation's deterrence policy. Employing only the most support of this mission, Sandia National Laboratories has a significant role in advancing the "state

  15. Big Explosives Experimental Facility - BEEF

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The Big Explosives Experimental Facility or BEEF is a ten acre fenced high explosive testing facility that provides data to support stockpile stewardship and other national security programs. At BEEF conventional high explosives experiments are safely conducted providing sophisticated diagnostics such as high speed optics and x-ray radiography.

  16. SECURING CONTAINERIZED HAZARDOUS WASTES WITH WELDED POLYETHYLENE ENCAPSULATES

    EPA Science Inventory

    Full-scale encapsulation of 208-liter (55-gal) drums was studied as a means for managing corroding containers of hazardous wastes in the field and rendering them suitable for transport and safe deposit within a final disposal site such as a landfill. Polyethylene (PE) receivers w...

  17. 29 CFR 1926.250 - General requirements for storage.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in tiers shall be stacked, racked, blocked, interlocked, or otherwise secured to prevent sliding, falling or collapse. (2) Maximum safe load limits of floors within buildings and structures, in pounds per..., tanks, and similar storage areas shall be equipped with personal fall arrest equipment meeting the...

  18. 33 CFR 96.100 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Purpose. 96.100 Section 96.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS General § 96.100 Purpose. This...

  19. 10 CFR 40.4 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Erection of fences and other access control measures that are not related to the safe use of, or security..., partnership, firm, association, trust, estate, public or private institution, group, Government agency other... Radiation Control Act of 1978 (92 Stat. 3021), any State or any political subdivision of, or any political...

  20. 10 CFR 40.4 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Erection of fences and other access control measures that are not related to the safe use of, or security..., partnership, firm, association, trust, estate, public or private institution, group, Government agency other... Radiation Control Act of 1978 (92 Stat. 3021), any State or any political subdivision of, or any political...

  1. Big Explosives Experimental Facility - BEEF

    ScienceCinema

    None

    2018-01-16

    The Big Explosives Experimental Facility or BEEF is a ten acre fenced high explosive testing facility that provides data to support stockpile stewardship and other national security programs. At BEEF conventional high explosives experiments are safely conducted providing sophisticated diagnostics such as high speed optics and x-ray radiography.

  2. 75 FR 16157 - Pharmaceutical Supply Chain; Public Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... supply of high quality, safe, and effective drug products and drug ingredients depends upon a series of... patients. Through a series of plenary sessions and working group breakout sessions, the workshop will... environment. Share improvements in programs and technology. Identify any barriers to securing the entire...

  3. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    PubMed

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  4. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    PubMed Central

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  5. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  6. Advanced Micro Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and Power Quality at DoD Installations

    DTIC Science & Technology

    2016-10-28

    assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy

  7. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

    PubMed Central

    Měsíček, Libor; Choi, Jongsun

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233

  8. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.

    PubMed

    Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  9. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    PubMed

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  10. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.

    PubMed

    Zandona, David J; Thompson, Jon M

    In the past decade, public and private organizations have experienced a significant and alarming rise in the number of data breaches. Across all sectors, there seems to be no safe haven for the protection of information. In the health care industry, the trend is even worse. Information security is at an unbelievable low point, and it is unlikely that government oversight can fix this issue. Health care organizations have ramped up their approaches to addressing the problem; however, these initiatives are often incremental rather than transformational. Hospitals need an overall organization-wide strategy to prevent breaches from occurring and to minimize effects if they do occur. This article provides an analysis of the literature related to health information security and offers a suggested strategy for hospital administrators to follow in order to create a more secure environment for patient health information.

  11. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  12. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    DTIC Science & Technology

    2013-03-01

    formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if

  13. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  14. KENNEDY SPACE CENTER, FLA. - Daniel L. Tweed, with the Facilities Division, NASA Spaceport Services, addresses attendees at the ribbon cutting for the KSC Security gates. Tweed was project manager. The two new Security gates on Kennedy Parkway (Gate 2) and NASA Parkway (Gate 3) were activated Aug. 1, allowing the general public to have access to the new Space Commerce Way, which will provide access to the Research Park and KSC Visitor Complex, and providing an alternate route for the general public between Titusville and Merritt Island that is accessible 24 hours a day. The gates are staffed 24 hours daily. Others taking part in the ribbon cutting were Center Director Jim Kennedy; Chief, Protective & Safe Guards Office, Calvin L. Burch; SGS Deputy Program Manager William A. Sample; and Bobby Porter, with Oneida Construction.

    NASA Image and Video Library

    2003-08-27

    KENNEDY SPACE CENTER, FLA. - Daniel L. Tweed, with the Facilities Division, NASA Spaceport Services, addresses attendees at the ribbon cutting for the KSC Security gates. Tweed was project manager. The two new Security gates on Kennedy Parkway (Gate 2) and NASA Parkway (Gate 3) were activated Aug. 1, allowing the general public to have access to the new Space Commerce Way, which will provide access to the Research Park and KSC Visitor Complex, and providing an alternate route for the general public between Titusville and Merritt Island that is accessible 24 hours a day. The gates are staffed 24 hours daily. Others taking part in the ribbon cutting were Center Director Jim Kennedy; Chief, Protective & Safe Guards Office, Calvin L. Burch; SGS Deputy Program Manager William A. Sample; and Bobby Porter, with Oneida Construction.

  15. Secure and Efficient Network Fault Localization

    DTIC Science & Technology

    2012-02-27

    ORGANIZATION NAME(S) AND ADDRESS (ES) Carnegie Mellon University,School of Computer Science,Computer Science Department,Pittsburgh,PA,15213 8. PERFORMING...ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT...efficiency than previously known protocols for fault localization. Our proposed fault localization protocols also address the security threats that

  16. 10 CFR 30.4 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Commission has entered into an effective agreement under subsection 274b. of the Act. Non-agreement State... access control measures that are not related to the safe use of, or security of, radiological materials... equivalent means the sum of the products of the dose equivalent to the organ or tissue and the weighting...

  17. SoS Lablet; Perpetually Available and Secure Information Systems

    DTIC Science & Technology

    2015-11-16

    settings, people simply err on the safe side and do a lot less sharing, which explains why all pull -based location sharing applications have failed so...number of data centers is raising concerns about their power consumption. Through an NSF GOALI Bruce Krogh and I have investigated the problem by

  18. Defense Experimentation and Stockpile Stewardship

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2014-10-28

    A primary mission of the site is to help ensure that the nation's nuclear weapon stockpile remains safe, secure and reliable. The stockpile stewardship program, working with the national weapons laboratories conducts a wide range of experiments using advanced diagnostic technologies, many of which were developed right here at the NNSS.

  19. Practical Strategies for Helping Children of Divorce in Today's Classroom.

    ERIC Educational Resources Information Center

    Miller, Paul A.; Ryan, Patti; Morrison, William

    1999-01-01

    Considers how to provide a supportive, secure environment to children of divorce through opportunities to exercise personal control, being tolerant of variable academic performance, and expressing faith in children's character and capacity for growth. Provides suggestions for creating safe channels for communication and teaching children coping…

  20. 33 CFR 96.380 - How will the Coast Guard handle compliance and enforcement of these regulations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... safety management system while operating the vessel or transferring cargoes. (b) A foreign vessel that... GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS How Will Safety Management Systems Be Certificated and Enforced...

Top