Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-07
... steel, fire and water resistant storage chests, gun safes, security safes, portable security safes, cash..., touchpads, plastic gun racks, keypad assemblies, panel lock assemblies, door backs, plastic trays, drawers..., wood gun shelf racks, cable assemblies, communication cables, gasket kits, door springs, metal handles...
ERIC Educational Resources Information Center
Caron, Jean; Julien, Marie; Huang, Jean Hua
2008-01-01
This study presents the changes in the overall and firearm suicide rates for Quebec (Canada) before and after Bill C-17, which was implemented to secure safe storage of firearms. It covers 20,009 suicide cases reported to the coroner's office. Interrupted time series analysis is used to compare suicide rates in the two periods. Firearm suicide…
Efficient proof of ownership for cloud storage systems
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.
Used fuel extended storage security and safeguards by design roadmap
DOE Office of Scientific and Technical Information (OSTI.GOV)
Durbin, Samuel G.; Lindgren, Eric Richard; Jones, Robert
2016-05-01
In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. Amore » set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.« less
29 CFR 1926.250 - General requirements for storage.
Code of Federal Regulations, 2010 CFR
2010-07-01
... in tiers shall be stacked, racked, blocked, interlocked, or otherwise secured to prevent sliding, falling or collapse. (2) Maximum safe load limits of floors within buildings and structures, in pounds per..., tanks, and similar storage areas shall be equipped with personal fall arrest equipment meeting the...
[Storage of plant protection products in farms: minimum safety requirements].
Dutto, Moreno; Alfonzo, Santo; Rubbiani, Maristella
2012-01-01
Failure to comply with requirements for proper storage and use of pesticides in farms can be extremely hazardous and the risk of accidents involving farm workers, other persons and even animals is high. There are still wide differences in the interpretation of the concept of "securing or making safe", by workers in this sector. One of the critical points detected, particularly in the fruit sector, is the establishment of an adequate storage site for plant protection products. The definition of "safe storage of pesticides" is still unclear despite the recent enactment of Legislative Decree 81/2008 regulating health and work safety in Italy. In addition, there are no national guidelines setting clear minimum criteria for storage of plant protection products in farms. The authors, on the basis of their professional experience and through analysis of recent legislation, establish certain minimum safety standards for storage of pesticides in farms.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conover, David R.
The purpose of this document is to identify laws, rules, model codes, codes, standards, regulations, specifications (CSR) related to safety that could apply to stationary energy storage systems (ESS) and experiences to date securing approval of ESS in relation to CSR. This information is intended to assist in securing approval of ESS under current CSR and to identification of new CRS or revisions to existing CRS and necessary supporting research and documentation that can foster the deployment of safe ESS.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott F
Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less
Review of evaluations of educational approaches to promote safe storage of firearms
McGee, K; Coyne-Beasley, T; Johnson, R
2003-01-01
Objective: To systematically review evaluation studies of educational interventions promoting safe firearm storage. Methods: Medline, ERIC, PsycINFO, Criminal Justice Periodicals Index, Cumulative Index of Nursing and Allied Health Literature, and Sociofile were searched. The references from each potentially eligible study were checked, and experts in the field were contacted for additional reports. In addition, an internet search was performed to identify programs not published in the conventional literature. Sources relevant to safe firearm storage promotion were selected and evaluated. Results: Seven studies met inclusion criteria: adult subjects, program description was included, and firearm storage outcomes were measured. One was a randomized controlled trial and the other six were one group pre-test and/or post-test. The studies were classified into the following categories based on the intervention strategies used: (1) counseling and firearm safety materials (n=3); (2) counseling/educational message (n=3); and (3) firearm safety materials distribution (n=1).The outcomes were safe firearms storage (firearms locked up and unloaded or removal from home) after intervention. Four studies, three using counseling and materials distribution, reported improved storage after the interventions. Conclusions: It is not yet clear what types of interventions, or which specific intervention components, prompt gun owners to securely store their weapons. Increased understanding of gun storage behaviors and stronger evaluation designs will aid further understanding of this important issue. PMID:12810734
Anestis, Michael D; Butterworth, Sarah E; Houtsma, Claire
2018-02-01
Firearm ownership and unsafe storage increase risk for suicide. Little is known regarding factors that influence storage practices and willingness to engage in means safety. Utilizing Amazon's Mechanical Turk program, we recruited an online sample of 300 adults living in the US who own at least one firearm. Firearm storage practices and openness to means safety measures were assessed using items designed for this study. Data were collected and analyzed in 2017. Firearms stored in non-secure locations and without a locking device were associated with lower beliefs in the relationship between firearm storage and suicide risk. Fearlessness about death moderated the association between current secure versus non-secure storage and beliefs regarding firearm storage and suicide risk, in that storage practices and beliefs were more strongly related at higher levels of fearlessness about death. For both secure and locked storage of a firearm, there was a significant indirect effect of current storage practices on willingness to engage in means safety in the future through current beliefs regarding the relationship between firearm storage and suicide risk. Unsafe storage practices were largely associated with an unwillingness to store firearms more safely or to allow a trusted peer to temporarily store the firearm outside the home in order to prevent their own or someone else's suicide. Self-report and cross-sectional data were used. Results may not generalize to non-firearm owners. Firearm owners are prone to inaccurate beliefs about the relationship between firearms and suicide. These beliefs may influence both current firearm storage practices and the willingness to engage in means safety. Copyright © 2017 Elsevier B.V. All rights reserved.
Digital Photograph Security: What Plastic Surgeons Need to Know.
Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H
2015-11-01
Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.
Reinventing Batteries for Grid Storage
Banerjee, Sanjoy
2017-12-09
The City University of New York's Energy Institute, with the help of ARPA-E funding, is creating safe, low cost, rechargeable, long lifecycle batteries that could be used as modular distributed storage for the electrical grid. The batteries could be used at the building level or the utility level to offer benefits such as capture of renewable energy, peak shaving and microgridding, for a safer, cheaper, and more secure electrical grid.
Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.
Sahi, Aqeel; Lai, David; Li, Yan
2016-11-01
Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.
Improvement of a Chemical Storage Room Ventilation System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yousif, Emad; Al-Dahhan, Wedad; Abed, Rashed Nema
Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. This manuscript is the third in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. We summarize an improvement to the chemical storage room ventilation system at Al-Nahrain University to create and maintain a safe working atmosphere in an area where chemicals are stored and handled, using US andmore » European design practices, standards, and regulations.« less
Saying goodbye to optical storage technology.
McLendon, Kelly; Babbitt, Cliff
2002-08-01
The days of using optical disk based mass storage devices for high volume applications like health care document imaging are coming to an end. The price/performance curve for redundant magnetic disks, known as RAID, is now more positive than for optical disks. All types of application systems, across many sectors of the marketplace are using these newer magnetic technologies, including insurance, banking, aerospace, as well as health care. The main components of these new storage technologies are RAID and SAN. SAN refers to storage area network, which is a complex mechanism of switches and connections that allow multiple systems to store huge amounts of data securely and safely.
Information storage for health-care providers: it's not as simple as it seems.
Hanauer, David
2004-01-01
As medical practices migrate from paper to computers for record keeping, new issues surrounding the safe storage of such data are arising. These range from choosing an electronic storage format to ensuring that any electronic information stored today will be available and readable years into the future. Privacy and security issues also continue to be important, especially since the HIPAA regulations were instituted. With the rapid advances in technology, finding the right solution may be like trying to hit a moving target, yet some basic principles, outlined in this article, should make this difficult task easier.
CREM monitoring: a wireless RF application
NASA Astrophysics Data System (ADS)
Valencia, J. D.; Burghard, B. J.; Skorpik, J. R.; Silvers, K. L.; Schwartz, M. J.
2005-05-01
Recent security lapses within the Department of Energy laboratories prompted the establishment and implementation of additional procedures and training for operations involving classified removable electronic media (CREM) storage. In addition, the definition of CREM has been expanded and the number of CREM has increased significantly. Procedures now require that all CREM be inventoried and accounted for on a weekly basis. Weekly inventories consist of a physical comparison of each item against the reportable inventory listing. Securing and accounting for CREM is a continuous challenge for existing security systems. To address this challenge, an innovative framework, encompassing a suite of technologies, has been developed by Pacific Northwest National Laboratory (PNNL) to monitor, track, and locate CREM in safes, vaults, and storage areas. This Automated Removable Media Observation and Reporting (ARMOR)framework, described in this paper, is an extension of an existing PNNL program, SecureSafe. The key attributes of systems built around the ARMOR framework include improved accountability, reduced risk of human error, improved accuracy and timeliness of inventory data, and reduced costs. ARMOR solutions require each CREM to be tagged with a unique electronically readable ID code. Inventory data is collected from tagged CREM at regular intervals and upon detection of an access event. Automated inventory collection and report generation eliminates the need for hand-written inventory sheets and allows electronic transfer of the collected inventory data to a modern electronic reporting system. An electronic log of CREM access events is maintained, providing enhanced accountability for daily/weekly checks, routine audits, and follow-up investigations.
Secure method for biometric-based recognition with integrated cryptographic functions.
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. The first panel is secured on a storage stand while the second panel is being lowered by crane onto the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851
Moving Large Wiring-Harness Boards
NASA Technical Reports Server (NTRS)
Shepherd, Samuel D.; Gurman, Isaac
1990-01-01
Carrier for wiring-harness fabrication boards enables lone operator to move board easily and safely. Holds harness while operator fabricating, while being stored, and being transported to equipment frame for mounting. When positioned for assembly of wiring harness, board and carrier give operator easy and convenient access to wires and cables, when positioned for transfer of wiring harness to or from storage area, carrier holds board securely while moved by one person.
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. Technicians monitor the progress as the second panel is being moved to join the first panel on the storage stand. To the right is the Launch Abort system secured on a work stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
The ROK Army’s Role When North Korea Collapses Without a War with the ROK
2001-02-01
produced large amounts of biological and chemical weapons. In addition, North Korea continues to develop nuclear weapons and missile technology and export...process. 6. Security and safe disposal of WMD. This includes research, production and storage facilities for nuclear, biological and chemical weapons...Publishers, 1989. Naisbitt, John . Megatrends Asia: Eight Asian Megatrends That Are Reshaping Our World, New York: Simon and Schuster. 1996. The New
Emery, Robert J
2012-11-01
Faced with the prospect of being unable to permanently dispose of low-level radioactive wastes (LLRW) generated from teaching, research, and patient care activities, component institutions of the University of Texas System worked collaboratively to create a dedicated interim storage facility to be used until a permanent disposal facility became available. Located in a remote section of West Texas, the University of Texas System Interim Storage Facility (UTSISF) was licensed and put into operation in 1993, and since then has provided safe and secure interim storage for up to 350 drums of dry solid LLRW at any given time. Interim storage capability provided needed relief to component institutions, whose on-site waste facilities could have possibly become overburdened. Experiences gained from the licensing and operation of the site are described, and as a new permanent LLRW disposal facility emerges in Texas, a potential new role for the storage facility as a surge capacity storage site in times of natural disasters and emergencies is also discussed.
Physical key-protected one-time pad
Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei
2013-01-01
We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925
Current Methods for Evaluation of Physical Security System Effectiveness.
1981-05-01
It also helps the user modify a data set before further processing. (c) Safeguards Engineering and Analysis Data Base (SEAD)--To complete SAFE’s...graphic display software in addition to a Fortran compiler, and up to about (3 35,000 words of storage. For a fairly complex problem, a single run through...operational software . 94 BIBLIOGRAPHY Lenz, J.E., "The PROSE (Protection System Evaluator) Model," Proc. 1979 Winter Simulation Conference, IEEE, 1979
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-05-01
The Department of Energy's Oak Ridge National Laboratory (ORNL) conducts cutting edge scientific research. ORNL utilizes removable electronic media, such as computer hard drives, compact disks, data tapes, etc., to store vast amounts of classified information. Incidents involving breakdowns in controls over classified removable electronic media have been a continuous challenge for the Department. The loss of even one piece of such media can have serious national security implications. In 2004, the Department had a complex-wide 'stand-down' of all activities using classified removable electronic media, and such media containing Secret/Restricted Data or higher classified data was designated 'Accountable Classified Removablemore » Electronic Media' (ACREM). As part of the stand-down, sites were required to conduct a 100 percent physical inventory of all ACREM; enter it all into accountability; and conduct security procedure reviews and training. Further, the Department implemented a series of controls, including conducting periodic inventories, utilizing tamper proof devices on ACREM safes, and appointing trained custodians to be responsible for the material. After performance testing and validation that the required accountability systems were in place, ACREM operations at ORNL were approved for restart on August 10, 2004. We conducted a review at ORNL and associated facilities to determine whether ACREM is managed, protected, and controlled consistent with applicable requirements. We found that: (1) Eight pieces of Secret/Restricted Data media had not been identified as ACREM and placed into a system of accountability. Consequently, the items were not subject to all required protections and controls, such as periodic accountability inventories, oversight by a trained custodian, or storage in a designated ACREM safe. (However, the items were secured in safes approved for classified material.) (2) Other required ACREM protections and controls were not implemented as follows: a tamper indicating device was not being used on an ACREM safe; records documenting when a certain safe was opened did not support that a purported inventory had been conducted; and a safe inventory had not been completed in a timely manner. (3) A Personal Digital Assistant and a thumb drive, both capable of recording or transmitting data, were stored in a security area without an analysis to identify vulnerabilities and compensatory measures having been conducted, as required. We also found that an ORNL Cooperative Research and Development Agreement partner had not disabled classified computer ports at the partner's site that were capable of writing classified information to external or removable media, as required. We made several recommendations designed to enhance the security of ACREM, security areas, and computers.« less
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. The second panel is being lifted by crane and technicians are monitoring the progress as it is being moved to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
Reviews on Security Issues and Challenges in Cloud Computing
NASA Astrophysics Data System (ADS)
An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.
2016-11-01
Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.
A Cloud Computing Based Patient Centric Medical Information System
NASA Astrophysics Data System (ADS)
Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko
This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.
An overview of ALARA considerations during Yankee Atomic`s Component Removal Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Granados, B.; Babineau, G.; Colby, B.
1995-03-01
In Februrary 1992, Yankee Atomic Electric Company (YAEC) permanently shutdown Yankee Nuclear Power Station in Rowe, Massachusetts, after thirty-two years of efficient operation. Yankee`s plan decommissioning is to defer dismantlement until a low level radioactive waste (LLRW) disposal facility is available. The plant will be maintained in a safe storage condition until a firm contract for the disposal of LLRW generated during decommissioning can be secured. Limited access to a LLRW disposal facility may occur during the safe storage period. Yankee intends to use these opportunities to remove components and structures. A Component Removal Project (CRP) was initiated in 1993more » to take advantage of one of these opportunities. A Componenet Removal Project (CRP) was initiated in 1993 to take advantage of one of these opportunities. The CRP includes removal of four steam generators, the pressurizer, and segmentation of reactor vessel internals and preparation of LLRW for shipment and disposal at Chem-Nuclear`s Barnwell, South Carolina facility. The CRP is projected to be completed by June 1994 at an estimated total worker exposure of less than 160 person-rem.« less
Trust Model to Enhance Security and Interoperability of Cloud Environment
NASA Astrophysics Data System (ADS)
Li, Wenjuan; Ping, Lingdi
Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.
Johnson, R. M.; Runyan, C. W.; Coyne-Beasley, T.; Lewis, M. A.; Bowling, J. M.
2008-01-01
Although safe firearm storage is a promising injury prevention strategy, many parents do not keep their firearms unloaded and locked up. Using the theory of planned behavior as a guiding conceptual framework, this study examines factors associated with safe storage among married women with children and who have firearms in their homes. Data come from a national telephone survey (n = 185). We examined beliefs about defensive firearm use, subjective norms, perceived behavioral control and firearm storage practices. A Wilcoxon–Mann–Whitney test was conducted to assess associations between psychosocial factors and firearm storage practices. Women were highly motivated to keep firearms stored safely. Those reporting safe storage practices had more favorable attitudes, more supportive subjective norms and higher perceptions of behavioral control than those without safe storage. One-fourth believed a firearm would prevent a family member from being hurt in case of a break-in, 58% believed a firearm could scare off a burglar. Some 63% said they leave decisions about firearm storage to their husbands. Women were highly motivated to store firearms safely as evidenced by favorable attitudes, supportive subjective norms and high perceptions of behavioral control. This was especially true for those reporting safer storage practices. PMID:17890758
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
Peace Operations in Mali: Theory into Practice Then Measuring Effectiveness
2017-06-09
community’s response along two broad lines of effort (LOE): Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a... Safe and Secure Environment , two objectives were measured. Objective #1 sought the Cessation of Large Scale Violence. Success was attained, as...Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a Safe and Secure Environment , two objectives were
Conceptual design report: Nuclear materials storage facility renovation. Part 6, Alternatives study
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-07-14
The Nuclear Materials Storage Facility (NMSF) at the Los Alamos National Laboratory (LANL) was a Fiscal Year (FY) 1984 line-item project completed in 1987 that has never been operated because of major design and construction deficiencies. This renovation project, which will correct those deficiencies and allow operation of the facility, is proposed as an FY 97 line item. The mission of the project is to provide centralized intermediate and long-term storage of special nuclear materials (SNM) associated with defined LANL programmatic missions and to establish a centralized SNM shipping and receiving location for Technical Area (TA)-55 at LANL. Based onmore » current projections, existing storage space for SNM at other locations at LANL will be loaded to capacity by approximately 2002. This will adversely affect LANUs ability to meet its mission requirements in the future. The affected missions include LANL`s weapons research, development, and testing (WRD&T) program; special materials recovery; stockpile survelliance/evaluation; advanced fuels and heat sources development and production; and safe, secure storage of existing nuclear materials inventories. The problem is further exacerbated by LANL`s inability to ship any materials offsite because of the lack of receiver sites for material and regulatory issues. Correction of the current deficiencies and enhancement of the facility will provide centralized storage close to a nuclear materials processing facility. The project will enable long-term, cost-effective storage in a secure environment with reduced radiation exposure to workers, and eliminate potential exposures to the public. This report is organized according to the sections and subsections outlined by Attachment 111-2 of DOE Document AL 4700.1, Project Management System. It is organized into seven parts. This document, Part VI - Alternatives Study, presents a study of the different storage/containment options considered for NMSF.« less
JOWOG 22/2 - Actinide Chemical Technology (July 9-13, 2012)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jackson, Jay M.; Lopez, Jacquelyn C.; Wayne, David M.
2012-07-05
The Plutonium Science and Manufacturing Directorate provides world-class, safe, secure, and reliable special nuclear material research, process development, technology demonstration, and manufacturing capabilities that support the nation's defense, energy, and environmental needs. We safely and efficiently process plutonium, uranium, and other actinide materials to meet national program requirements, while expanding the scientific and engineering basis of nuclear weapons-based manufacturing, and while producing the next generation of nuclear engineers and scientists. Actinide Process Chemistry (NCO-2) safely and efficiently processes plutonium and other actinide compounds to meet the nation's nuclear defense program needs. All of our processing activities are done in amore » world class and highly regulated nuclear facility. NCO-2's plutonium processing activities consist of direct oxide reduction, metal chlorination, americium extraction, and electrorefining. In addition, NCO-2 uses hydrochloric and nitric acid dissolutions for both plutonium processing and reduction of hazardous components in the waste streams. Finally, NCO-2 is a key team member in the processing of plutonium oxide from disassembled pits and the subsequent stabilization of plutonium oxide for safe and stable long-term storage.« less
Unicomb, Leanne; Arnold, Benjamin F.; Colford Jr., John M.; Luby, Stephen P.
2015-01-01
Background Shallow tubewells are the primary drinking water source for most rural Bangladeshis. Fecal contamination has been detected in tubewells, at low concentrations at the source and at higher levels at the point of use. We conducted a randomized controlled trial to assess whether improving the microbiological quality of tubewell drinking water by household water treatment and safe storage would reduce diarrhea in children <2 years in rural Bangladesh. Methods We randomly assigned 1800 households with a child aged 6-18 months (index child) into one of three arms: chlorine plus safe storage, safe storage and control. We followed households with monthly visits for one year to promote the interventions, track their uptake, test participants’ source and stored water for fecal contamination, and record caregiver-reported child diarrhea prevalence (primary outcome). To assess reporting bias, we also collected data on health outcomes that are not expected to be impacted by our interventions. Findings Both interventions had high uptake. Safe storage, alone or combined with chlorination, reduced heavy contamination of stored water. Compared to controls, diarrhea in index children was reduced by 36% in the chlorine plus safe storage arm (prevalence ratio, PR = 0.64, 0.55-0.73) and 31% in the safe storage arm (PR = 0.69, 0.60-0.80), with no difference between the two intervention arms. One limitation of the study was the non-blinded design with self-reported outcomes. However, the prevalence of health outcomes not expected to be impacted by water interventions did not differ between study arms, suggesting minimal reporting bias. Conclusions Safe storage significantly improved drinking water quality at the point of use and reduced child diarrhea in rural Bangladesh. There was no added benefit from combining safe storage with chlorination. Efforts should be undertaken to implement and evaluate long-term efforts for safe water storage in Bangladesh. Trial Registration ClinicalTrials.gov NCT01350063 PMID:25816342
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. PMID:27792784
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.
SSeCloud: Using secret sharing scheme to secure keys
NASA Astrophysics Data System (ADS)
Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang
2017-08-01
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
Heitzinger, K; Rocha, C A; Quick, R E; Montano, S M; Tilley, D H; Mock, C N; Carrasco, A J; Cabrera, R M; Hawes, S E
2016-07-01
Boiling is the most common method of household water treatment in developing countries; however, it is not always effectively practised. We conducted a randomized controlled trial among 210 households to assess the effectiveness of water pasteurization and safe-storage interventions in reducing Escherichia coli contamination of household drinking water in a water-boiling population in rural Peru. Households were randomized to receive either a safe-storage container or a safe-storage container plus water pasteurization indicator or to a control group. During a 13-week follow-up period, households that received a safe-storage container and water pasteurization indicator did not have a significantly different prevalence of stored drinking-water contamination relative to the control group [prevalence ratio (PR) 1·18, 95% confidence interval (CI) 0·92-1·52]. Similarly, receipt of a safe-storage container alone had no effect on prevalence of contamination (PR 1·02, 95% CI 0·79-1·31). Although use of water pasteurization indicators and locally available storage containers did not increase the safety of household drinking water in this study, future research could illuminate factors that facilitate the effective use of these interventions to improve water quality and reduce the risk of waterborne disease in populations that boil drinking water.
SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, ...
SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, STORAGE BUILDING (BUILDING 3584), CONVENTIONAL MUNITIONS SHOP (BUILDING 3580), AND SECURITY POLICE ENTRY CONTROL BUILDING (BUILDING 3582). VIEW TO SOUTHWEST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
Pumped storage system model and experimental investigations on S-induced issues during transients
NASA Astrophysics Data System (ADS)
Zeng, Wei; Yang, Jiandong; Hu, Jinhong
2017-06-01
Because of the important role of pumped storage stations in the peak regulation and frequency control of a power grid, pump turbines must rapidly switch between different operating modes, such as fast startup and load rejection. However, pump turbines go through the unstable S region in these transition processes, threatening the security and stability of the pumped storage station. This issue has mainly been investigated through numerical simulations, while field experiments generally involve high risks and are difficult to perform. Therefore, in this work, the model test method was employed to study S-induced security and stability issues for a pumped storage station in transition processes. First, a pumped storage system model was set up, including the piping system, model units, electrical control systems and measurement system. In this model, two pump turbines with different S-shaped characteristics were installed to determine the influence of S-shaped characteristics on transition processes. The model platform can be applied to simulate any hydraulic transition process that occurs in real power stations, such as load rejection, startup, and grid connection. On the experimental platform, the S-shaped characteristic curves were measured to be the basis of other experiments. Runaway experiments were performed to verify the impact of the S-shaped characteristics on the pump turbine runaway stability. Full load rejection tests were performed to validate the effect of the S-shaped characteristics on the water-hammer pressure. The condition of one pump turbine rejecting its load after another defined as one-after-another (OAA) load rejection was performed to validate the possibility of S-induced extreme draft tube pressure. Load rejection experiments with different guide vane closing schemes were performed to determine a suitable scheme to adapt the S-shaped characteristics. Through these experiments, the threats existing in the station were verified, the appropriate measures were summarized, and an important experimental basis for the safe and stable operation of a pumped storage station was provided.
7 CFR 400.408 - Safeguards and storage.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...
7 CFR 400.408 - Safeguards and storage.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...
7 CFR 400.408 - Safeguards and storage.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...
32 CFR 2001.53 - Open storage areas.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... storage. Doors other than those secured with the aforementioned locks shall be secured from the inside...
32 CFR 2001.53 - Open storage areas.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... storage. Doors other than those secured with the aforementioned locks shall be secured from the inside...
High-Level Radioactive Waste: Safe Storage and Ultimate Disposal.
ERIC Educational Resources Information Center
Dukert, Joseph M.
Described are problems and techniques for safe disposal of radioactive waste. Degrees of radioactivity, temporary storage, and long-term permanent storage are discussed. Included are diagrams of estimated waste volumes to the year 2000 and of an artist's conception of a permanent underground disposal facility. (SL)
76 FR 32867 - Hazardous Materials: Requirements for Storage of Explosives During Transportation
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-07
... from release into the environment. This final rule does not prohibit or promote the development of safe... Association Standard (NFPA) 498--Standard for Safe Havens and Interchange Lots for Vehicles Transporting Explosives (2010 Edition) for the construction and maintenance of safe havens used for unattended storage of...
Blanco, Sofía T; Rivas, Clara; Bravo, Ramón; Fernández, Javier; Artal, Manuela; Velasco, Inmaculada
2014-09-16
This paper discusses the influence of the noncondensable impurities CO and CH4 on Carbon Capture and Storage (CCS) technology. We calculated and drew conclusions about the impact of both impurities in the CO2 on selected transport, injection, and storage parameters (pipeline pressure drop, storage capacity, etc.), whose analysis is necessary for the safe construction and operation of CO2 pipelines and for the secure long-term geological storage of anthropogenic CO2. To calculate these parameters, it is necessary to acquire data on the volumetric properties and the vapor-liquid equilibrium of the fluid being subjected to CCS. In addition to literature data, we used new experimental data, which are presented here and were obtained for five mixtures of CO2+CO with compositions characteristic of the typical emissions of the E.U. and the U.S.A. Temperatures and pressures are based on relevant CO2 pipeline and geological storage site values. From our experimental results, Peng-Robinson, PC-SAFT, and GERG Equations of State for were validated CO2+CO under the conditions of CCS. We conclude that the concentration of both impurities strongly affects the studied parameters, with CO being the most influential and problematic. The overall result of these negative effects is an increase in the difficulties, risks, and overall costs of CCS.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... Secure Gun Storage or Safety Devices ACTION: 30-Day Notice of information collection. The Department of... approved collection. (2) Title of the Form/Collection: Certification of Secure Gun Storage or Safety... to the availability of secure gun storage or safety devices. (5) An estimate of the total number of...
Cryptonite: A Secure and Performant Data Repository on Public Clouds
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor
2012-06-29
Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using amore » StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.« less
Achieving the physical limits of the bounded-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mandayam, Prabha; Wehner, Stephanie; Centre for Quantum Technologies, National University of Singapore, 2 Science Drive 3, 117543 Singapore
2011-02-15
Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security canmore » be extended to a larger class of noisy quantum memories.« less
A&M. Radioactive parts security storage area. camera facing northwest. Outdoor ...
A&M. Radioactive parts security storage area. camera facing northwest. Outdoor storage of concrete storage casks. Photographer: M. Holmes. Date: November 21, 1959. INEEL negative no. 59-6081 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
Economic performance of water storage capacity expansion for food security
NASA Astrophysics Data System (ADS)
Gohar, Abdelaziz A.; Ward, Frank A.; Amer, Saud A.
2013-03-01
SummaryContinued climate variability, population growth, and rising food prices present ongoing challenges for achieving food and water security in poor countries that lack adequate water infrastructure. Undeveloped storage infrastructure presents a special challenge in northern Afghanistan, where food security is undermined by highly variable water supplies, inefficient water allocation rules, and a damaged irrigation system due three decades of war and conflict. Little peer-reviewed research to date has analyzed the economic benefits of water storage capacity expansions as a mechanism to sustain food security over long periods of variable climate and growing food demands needed to feed growing populations. This paper develops and applies an integrated water resources management framework that analyzes impacts of storage capacity expansions for sustaining farm income and food security in the face of highly fluctuating water supplies. Findings illustrate that in Afghanistan's Balkh Basin, total farm income and food security from crop irrigation increase, but at a declining rate as water storage capacity increases from zero to an amount equal to six times the basin's long term water supply. Total farm income increases by 21%, 41%, and 42% for small, medium, and large reservoir capacity, respectively, compared to the existing irrigation system unassisted by reservoir storage capacity. Results provide a framework to target water infrastructure investments that improve food security for river basins in the world's dry regions with low existing storage capacity that face ongoing climate variability and increased demands for food security for growing populations.
A Critical Review of the Impacts of Leaking CO 2 Gas and Brine on Groundwater Quality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qafoku, Nikolla; Zheng, Liange; Bacon, Diana H.
2015-09-30
Geological carbon sequestration (GCS) is a global carbon emission reduction strategy involving the capture of CO 2 emitted from fossil fuel burning power plants, as well as the subsequent injection of the captured CO 2 gas into deep saline aquifers or depleted oil and gas reservoirs. A critical question that arises from the proposed GCS is the potential impacts of CO 2 injection on the quality of drinking-water systems overlying CO 2 sequestration storage sites. Although storage reservoirs are evaluated and selected based on their ability to safely and securely store emplaced fluids, leakage of CO 2 from storage reservoirsmore » is a primary risk factor and potential barrier to the widespread acceptance of geologic CO 2 sequestration (OR Harvey et al. 2013; Y-S Jun et al. 2013; DOE 2007). Therefore, a systematic understanding of how CO 2 leakage would affect the geochemistry of potable aquifers, and subsequently control or affect elemental and contaminant release via sequential and/or simultaneous abiotic and biotic processes and reactions is vital.« less
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki
2011-03-01
We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.
Used Nuclear Fuel: From Liability to Benefit
NASA Astrophysics Data System (ADS)
Orbach, Raymond L.
2011-03-01
Nuclear power has proven safe and reliable, with operating efficiencies in the U.S. exceeding 90%. It provides a carbon-free source of electricity (with about a 10% penalty arising from CO2 released from construction and the fuel cycle). However, used fuel from nuclear reactors is highly toxic and presents a challenge for permanent disposal -- both from technical and policy perspectives. The half-life of the ``bad actors'' is relatively short (of the order of decades) while the very long lived isotopes are relatively benign. At present, spent fuel is stored on-site in cooling ponds. Once the used fuel pools are full, the fuel is moved to dry cask storage on-site. Though the local storage is capable of handling used fuel safely and securely for many decades, the law requires DOE to assume responsibility for the used fuel and remove it from reactor sites. The nuclear industry pays a tithe to support sequestration of used fuel (but not research). However, there is currently no national policy in place to deal with the permanent disposal of nuclear fuel. This administration is opposed to underground storage at Yucca Mountain. There is no national policy for interim storage---removal of spent fuel from reactor sites and storage at a central location. And there is no national policy for liberating the energy contained in used fuel through recycling (separating out the fissionable components for subsequent use as nuclear fuel). A ``Blue Ribbon Commission'' has been formed to consider alternatives, but will not report until 2012. This paper will examine alternatives for used fuel disposition, their drawbacks (e.g. proliferation issues arising from recycling), and their benefits. For recycle options to emerge as a viable technology, research is required to develop cost effective methods for treating used nuclear fuel, with attention to policy as well as technical issues.
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mollah, A.S.
Low level radioactive waste (LLW) is generated from various nuclear applications in Bangladesh. The major sources of radioactive waste in the country are at present: (a) the 3 MW TRIGA Mark-II research reactor; (b) the radioisotope production facility; (c) the medical, industrial and research facilities that use radionuclides; and (d) the industrial facility for processing monazite sands. Radioactive waste needs to be safely managed because it is potentially hazardous to human health and the environment. According to Nuclear Safety and Radiation Control Act-93, the Bangladesh Atomic Energy Commission (BAEC) is the governmental body responsible for the receipt and final disposalmore » of radioactive wastes in the whole country. Waste management policy has become an important environmental, social, and economical issue for LLW in Bangladesh. Policy and strategies will serve as a basic guide for radioactive waste management in Bangladesh. The waste generator is responsible for on-site collection, conditioning and temporary storage of the waste arising from his practice. The Central Waste Processing and Storage Unit (CWPSU) of BAEC is the designated national facility with the requisite facility for the treatment, conditioning and storage of radioactive waste until a final disposal facility is established and becomes operational. The Regulatory Authority is responsible for the enforcement of compliance with provisions of the waste management regulation and other relevant requirements by the waste generator and the CWPSU. The objective of this paper is to present, in a concise form, basic information about the radioactive waste management infrastructure, regulations, policies and strategies including the total inventory of low level radioactive waste in the country. For improvement and strengthening in terms of operational capability, safety and security of RW including spent radioactive sources and overall security of the facility (CWPSF), the facility is expected to serve waste management need in the country and, in the course of time, the facility may be turned into a regional level training centre. It is essential for safe conduction and culture of research and application in nuclear science and technology maintaining the relevant safety of man and environment and future generations to come. (authors)« less
Strategies for Countering Terrorist Safe Havens
2014-02-20
within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to...leadership targeting within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case ...surrogate forces and pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case
Estimating geological CO2 storage security to deliver on climate mitigation.
Alcalde, Juan; Flude, Stephanie; Wilkinson, Mark; Johnson, Gareth; Edlmann, Katriona; Bond, Clare E; Scott, Vivian; Gilfillan, Stuart M V; Ogaya, Xènia; Haszeldine, R Stuart
2018-06-12
Carbon capture and storage (CCS) can help nations meet their Paris CO 2 reduction commitments cost-effectively. However, lack of confidence in geologic CO 2 storage security remains a barrier to CCS implementation. Here we present a numerical program that calculates CO 2 storage security and leakage to the atmosphere over 10,000 years. This combines quantitative estimates of geological subsurface CO 2 retention, and of surface CO 2 leakage. We calculate that realistically well-regulated storage in regions with moderate well densities has a 50% probability that leakage remains below 0.0008% per year, with over 98% of the injected CO 2 retained in the subsurface over 10,000 years. An unrealistic scenario, where CO 2 storage is inadequately regulated, estimates that more than 78% will be retained over 10,000 years. Our modelling results suggest that geological storage of CO 2 can be a secure climate change mitigation option, but we note that long-term behaviour of CO 2 in the subsurface remains a key uncertainty.
Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.
2016-01-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566
Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M
2016-07-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).
ERIC Educational Resources Information Center
St. Lifer, Evan
1994-01-01
Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…
Detection and Prevention of Insider Threats in Database Driven Web Services
NASA Astrophysics Data System (ADS)
Chumash, Tzvi; Yao, Danfeng
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider both insider and outsider attacks in the third-party web hosting scenarios. We present SafeWS, a modular solution that is inserted between server side scripts and databases in order to prevent and detect website hijacking and unauthorized access to stored data. To achieve the required security, SafeWS utilizes a combination of lightweight cryptographic integrity and encryption tools, software engineering techniques, and security data management principles. We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small. SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine
The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention onmore » elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the option of evaluating equipment from Seagate/Xyratex.) Outline: The remainder of this report is structured as follows: - Section 1: Describes the growing importance of secure storage architectures and highlights some challenges for HPC. - Section 2: Provides background information on HPC storage architectures, relevant supporting technologies for secure storage and details on OpenStack components related to storage. Note, that background material on HPC storage architectures in this chapter can be skipped if the reader is already familiar with Lustre and GPFS. - Section 3: A review of protection mechanisms in two HPC filesystems; details about available isolation, authentication/authorization and performance capabilities are discussed. - Section 4: Describe technologies that can be used to bridge gaps in HPC storage and filesystems to facilitate...« less
75 FR 74019 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-30
... storage media. Retrievability: Information is retrieved by individual's name, Social Security Number (SSN... ``Records include individual's name, Social Security Number (SSN); employee identification number....'' * * * * * Storage: Delete entry and replace with ``Paper records in file folders and electronic storage media...
Utilization of Integrated Assessment Modeling for determining geologic CO2 storage security
NASA Astrophysics Data System (ADS)
Pawar, R.
2017-12-01
Geologic storage of carbon dioxide (CO2) has been extensively studied as a potential technology to mitigate atmospheric concentration of CO2. Multiple international research & development efforts, large-scale demonstration and commercial projects are helping advance the technology. One of the critical areas of active investigation is prediction of long-term CO2 storage security and risks. A quantitative methodology for predicting a storage site's long-term performance is critical for making key decisions necessary for successful deployment of commercial scale projects where projects will require quantitative assessments of potential long-term liabilities. These predictions are challenging given that they require simulating CO2 and in-situ fluid movements as well as interactions through the primary storage reservoir, potential leakage pathways (such as wellbores, faults, etc.) and shallow resources such as groundwater aquifers. They need to take into account the inherent variability and uncertainties at geologic sites. This talk will provide an overview of an approach based on integrated assessment modeling (IAM) to predict long-term performance of a geologic storage site including, storage reservoir, potential leakage pathways and shallow groundwater aquifers. The approach utilizes reduced order models (ROMs) to capture the complex physical/chemical interactions resulting due to CO2 movement and interactions but are computationally extremely efficient. Applicability of the approach will be demonstrated through examples that are focused on key storage security questions such as what is the probability of leakage of CO2 from a storage reservoir? how does storage security vary for different geologic environments and operational conditions? how site parameter variability and uncertainties affect storage security, etc.
Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon
2018-03-02
Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.
2018-01-01
Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance. PMID:29498641
A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage
2014-01-01
With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630
A secure and efficient audit mechanism for dynamic shared data in cloud storage.
Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo
2014-01-01
With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.
A protect solution for data security in mobile cloud storage
NASA Astrophysics Data System (ADS)
Yu, Xiaojun; Wen, Qiaoyan
2013-03-01
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
Proof of cipher text ownership based on convergence encryption
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.
A&M. Radioactive parts security storage area, heat removal storage casks. ...
A&M. Radioactive parts security storage area, heat removal storage casks. Plan, section, and details. Ralph M. Parsons 1480-7 ANP/GE-3-720-S-1. Date: November 1958. Approved by INEEL Classification Office for public release. INEEL index no. 034-0720-60-693-107459 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
Dumestre, Danielle O; Fraulin, Frankie O G
2017-11-01
Physicians are increasingly using smartphones to take clinical photographs. This study evaluates a smartphone application for clinical photography that prioritizes and facilitates patient security. Ethics approval was obtained to trial a smartphone clinical photography application, PicSafe Medi. Calgary plastic surgeons and residents used the application to obtain informed consent and photograph patients. Surveys gauging the application's usability, consent process, and photograph storage/sharing were then sent to surgeons and patients. Over a 6-month trial period, 15 plastic surgeons and residents used the application to photograph 86 patients. Over half of the patients (57%) completed the survey. The majority of patients (96%) were satisfied with the application's consent process, and all felt their photographs were secure. The majority (93%) of surgeons/residents completed the survey. The application was felt to overcome issues with current photography practices: inadequate consent and storage of photographs (100%), risk to patient confidentiality (92%), and unsecure photograph sharing (93%). Barriers to regular use of the application included need for cellphone service/Internet (54%), sanitary concerns due to the need for patients to sign directly on the phone (46%), inability to obtain proactive/retroactive consent (85%), and difficulty viewing photographs (80%). The majority of surgeons (85%) believe a smartphone application would be suitable for clinical patient photography, but due to its limitations, only 23% would use the trialed application. A smartphone clinical photography application addresses the patient confidentiality risks of current photography methods; however, limitations of the trialed application prevent its broad implementation.
303-K Storage Facility closure plan. Revision 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1993-12-15
Recyclable scrap uranium with zircaloy-2 and copper silicon alloy, uranium-titanium alloy, beryllium/zircaloy-2 alloy, and zircaloy-2 chips and fines were secured in concrete billets (7.5-gallon containers) in the 303-K Storage Facility, located in the 300 Area. The beryllium/zircaloy-2 alloy and zircaloy-2 chips and fines are designated as mixed waste with the characteristic of ignitability. The concretion process reduced the ignitability of the fines and chips for safe storage and shipment. This process has been discontinued and the 303-K Storage Facility is now undergoing closure as defined in the Resource Conservation and Recovery Act (RCRA) of 1976 and the Washington Administrative Codemore » (WAC) Dangerous Waste Regulations, WAC 173-303-040. This closure plan presents a description of the 303-K Storage Facility, the history of materials and waste managed, and the procedures that will be followed to close the 303-K Storage Facility. The 303-K Storage Facility is located within the 300-FF-3 (source) and 300-FF-5 (groundwater) operable units, as designated in the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement) (Ecology et al. 1992). Contamination in the operable units 300-FF-3 and 300-FF-5 is scheduled to be addressed through the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) of 1980 remedial action process. Therefore, all soil remedial action at the 304 Facility will be conducted as part of the CERCLA remedial action of operable units 300-FF-3 and 300-FF-5.« less
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)
2003-01-01
The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Demuth, Scott Francis; Sprinkle, James K.
As preparation to the year-end deliverable (Provide SSBD Best Practices for Generic Dry-Storage Pilot Scale Plant) for the Work Package (FT-15LA040501–Safeguards and Security by Design for Extended Dry Storage), the initial step was to select a generic dry-storage pilot plant design for SSBD. To be consistent with other DOE-NE Fuel Cycle Research and Development (FCR&D) activities, the Used Fuel Campaign was engaged for the selection of a design for this deliverable. For the work Package FT-15LA040501–“Safeguards and Security by Design for Extended Dry Storage”, SSBD will be initiated for the Generic Dry-Storage Pilot Scale Plant described by the layout ofmore » Reference 2. SSBD will consider aspects of the design that are impacted by domestic material control and accounting (MC&A), domestic security, and international safeguards.« less
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians monitor the progress as a crane lifts the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility while technicians prepare to lift the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
A&M. Radioactive parts security storage warehouses: TAN648 on left, and ...
A&M. Radioactive parts security storage warehouses: TAN-648 on left, and dolly storage building, TAN-647, on right. Camera facing south. This was the front entry for the warehouse and the rear of the dolly storage building. Date: August 6, 2003. INEEL negative no. HD-36-2-2 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
Secure key storage and distribution
Agrawal, Punit
2015-06-02
This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.
The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm
2017-03-01
and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201
Cryptography from noisy storage.
Wehner, Stephanie; Schaffner, Christian; Terhal, Barbara M
2008-06-06
We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; i.e., the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage; however, we consider an explicit noise model inspired by present-day technology. To illustrate the power of this new model, we show that a protocol for oblivious transfer is secure for any amount of quantum-storage noise, as long as honest players can perform perfect quantum operations. Our model also allows us to show the security of protocols that cope with noise in the operations of the honest players and achieve more advanced tasks such as secure identification.
Achana, Felix A.; Sutton, Alex J.; Kendrick, Denise; Wynn, Persephone; Young, Ben; Jones, David R.; Hubbard, Stephanie J.; Cooper, Nicola J.
2015-01-01
Background There is evidence from 2 previous meta-analyses that interventions to promote poison prevention behaviours are effective in increasing a range of poison prevention practices in households with children. The published meta-analyses compared any intervention against a “usual care or no intervention” which potentially limits the usefulness of the analysis to decision makers. We aim to use network meta-analysis to simultaneously evaluate the effectiveness of different interventions to increase prevalence of safe storage of i) Medicines only, ii) Other household products only, iii) Poisons (both medicines and non-medicines), iv) Poisonous plants; and v) Possession of poison control centre (PCC) telephone number in households with children. Methods Data on the effectiveness of poison prevention interventions was extracted from primary studies identified in 2 newly-undertaken systematic reviews. Effect estimates were pooled across studies using a random effects network meta-analysis model. Results 28 of the 47 primary studies identified were included in the analysis. Compared to usual care intervention, the intervention with education and low cost/free equipment elements was most effective in promoting safe storage of medicines (odds ratio 2.51, 95% credible interval 1.01 to 6.00) while interventions with education, low cost/free equipment, home safety inspection and fitting components were most effective in promoting safe storage of other household products (2.52, 1.12 to 7.13), safe storage of poisons (11.10, 1.60 to 141.50) and possession of PCC number (38.82, 2.19 to 687.10). No one intervention package was more effective than the others in promoting safe storage of poisonous plants. Conclusion The most effective interventions varied by poison prevention practice, but education alone was not the most effective intervention for any poison prevention practice. Commissioners and providers of poison prevention interventions should tailor the interventions they commission or provide to the poison prevention practices they wish to promote. Highlights Network meta-analysis is useful for comparing multiple injury-prevention interventions. More intensive poison prevention interventions were more effective than education alone. Education and low cost/free equipment was most effective in promoting safe storage of medicines. Education, low cost/free equipment, home safety inspection and fitting was most effective in promoting safe storage of household products and poisons. Education, low cost/free equipment and home inspection were most effective in promoting possession of a poison control centre number. None of the intervention packages was more effective than the others in promoting safe storage of poisonous plants. PMID:25894385
Achana, Felix A; Sutton, Alex J; Kendrick, Denise; Wynn, Persephone; Young, Ben; Jones, David R; Hubbard, Stephanie J; Cooper, Nicola J
2015-01-01
There is evidence from 2 previous meta-analyses that interventions to promote poison prevention behaviours are effective in increasing a range of poison prevention practices in households with children. The published meta-analyses compared any intervention against a "usual care or no intervention" which potentially limits the usefulness of the analysis to decision makers. We aim to use network meta-analysis to simultaneously evaluate the effectiveness of different interventions to increase prevalence of safe storage of i) Medicines only, ii) Other household products only, iii) Poisons (both medicines and non-medicines), iv) Poisonous plants; and v) Possession of poison control centre (PCC) telephone number in households with children. Data on the effectiveness of poison prevention interventions was extracted from primary studies identified in 2 newly-undertaken systematic reviews. Effect estimates were pooled across studies using a random effects network meta-analysis model. 28 of the 47 primary studies identified were included in the analysis. Compared to usual care intervention, the intervention with education and low cost/free equipment elements was most effective in promoting safe storage of medicines (odds ratio 2.51, 95% credible interval 1.01 to 6.00) while interventions with education, low cost/free equipment, home safety inspection and fitting components were most effective in promoting safe storage of other household products (2.52, 1.12 to 7.13), safe storage of poisons (11.10, 1.60 to 141.50) and possession of PCC number (38.82, 2.19 to 687.10). No one intervention package was more effective than the others in promoting safe storage of poisonous plants. The most effective interventions varied by poison prevention practice, but education alone was not the most effective intervention for any poison prevention practice. Commissioners and providers of poison prevention interventions should tailor the interventions they commission or provide to the poison prevention practices they wish to promote. Network meta-analysis is useful for comparing multiple injury-prevention interventions. More intensive poison prevention interventions were more effective than education alone. Education and low cost/free equipment was most effective in promoting safe storage of medicines. Education, low cost/free equipment, home safety inspection and fitting was most effective in promoting safe storage of household products and poisons. Education, low cost/free equipment and home inspection were most effective in promoting possession of a poison control centre number. None of the intervention packages was more effective than the others in promoting safe storage of poisonous plants.
Francis, Mark Rohit; Sarkar, Rajiv; Roy, Sheela; Jaffar, Shabbar; Mohan, Venkata Raghava; Kang, Gagandeep; Balraj, Vinohar
2016-11-02
Since point-of-use methods of water filtration have shown limited acceptance in Vellore, southern India, this study evaluated the effectiveness of decentralized membrane filtration 1) with safe storage, 2) without safe storage, versus 3) no intervention, consisting of central chlorination as per government guidelines, in improving the microbiological quality of drinking water and preventing childhood diarrhea. Periodic testing of water sources, pre-/postfiltration samples, and household water, and a biweekly follow up of children less than 2 years of age was done for 1 year. The membrane filters achieved a log reduction of 0.86 (0.69-1.06), 1.14 (0.99-1.30), and 0.79 (0.67-0.94) for total coliforms, fecal coliforms, and Escherichia coli, respectively, in field conditions. A 24% (incidence rate ratio, IRR [95% confidence interval, CI] = 0.76 [0.51-1.13]; P = 0.178) reduction in diarrheal incidence in the intervention village with safe storage and a 14% (IRR [95% CI] = 1.14 [0.75-1.77]; P = 0.530) increase in incidence for the intervention village without safe storage versus no intervention village was observed, although not statistically significant. Microbiologically, the membrane filters decreased fecal contamination; however, provision of decentralized membrane-filtered water with or without safe storage was not protective against childhood diarrhea. © The American Society of Tropical Medicine and Hygiene.
Francis, Mark Rohit; Sarkar, Rajiv; Roy, Sheela; Jaffar, Shabbar; Mohan, Venkata Raghava; Kang, Gagandeep; Balraj, Vinohar
2016-01-01
Since point-of-use methods of water filtration have shown limited acceptance in Vellore, southern India, this study evaluated the effectiveness of decentralized membrane filtration 1) with safe storage, 2) without safe storage, versus 3) no intervention, consisting of central chlorination as per government guidelines, in improving the microbiological quality of drinking water and preventing childhood diarrhea. Periodic testing of water sources, pre-/postfiltration samples, and household water, and a biweekly follow up of children less than 2 years of age was done for 1 year. The membrane filters achieved a log reduction of 0.86 (0.69–1.06), 1.14 (0.99–1.30), and 0.79 (0.67–0.94) for total coliforms, fecal coliforms, and Escherichia coli, respectively, in field conditions. A 24% (incidence rate ratio, IRR [95% confidence interval, CI] = 0.76 [0.51–1.13]; P = 0.178) reduction in diarrheal incidence in the intervention village with safe storage and a 14% (IRR [95% CI] = 1.14 [0.75–1.77]; P = 0.530) increase in incidence for the intervention village without safe storage versus no intervention village was observed, although not statistically significant. Microbiologically, the membrane filters decreased fecal contamination; however, provision of decentralized membrane-filtered water with or without safe storage was not protective against childhood diarrhea. PMID:27601525
Strategies for Countering Terrorist Safe Havens
2013-12-01
tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine these strategies...safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine...pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case studies will demonstrate
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... Secure Gun Storage or Safety Devices ACTION: 60-Day notice of information collection. The Department of...) Title of the Form/Collection: Certification of Secure Gun Storage or Safety Devices. (3) Agency form... gun storage or safety devices. (5) An estimate of the total number of respondents and the amount of...
Energy Storage | Transportation Research | NREL
, and safe energy storage systems to power the next generation of electric-drive vehicles (EDVs). While lasting, safe, and operate at maximum efficiency in a wide range of driving conditions and climates. The Consumers, Industry, and the Environment As manufacturers develop new electric-drive vehicles, NREL acts as
Williams, J.V.
1984-04-26
Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.
Code of Federal Regulations, 2012 CFR
2012-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2011 CFR
2011-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2010 CFR
2010-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2013 CFR
2013-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2014 CFR
2014-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure
Bible, J; Emery, R J; Williams, T; Wang, S
2006-11-01
Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.
Separators - Technology review: Ceramic based separators for secondary batteries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nestler, Tina; Schmid, Robert; Münchgesang, Wolfram
Besides a continuous increase of the worldwide use of electricity, the electric energy storage technology market is a growing sector. At the latest since the German energy transition ('Energiewende') was announced, technological solutions for the storage of renewable energy have been intensively studied. Storage technologies in various forms are commercially available. A widespread technology is the electrochemical cell. Here the cost per kWh, e. g. determined by energy density, production process and cycle life, is of main interest. Commonly, an electrochemical cell consists of an anode and a cathode that are separated by an ion permeable or ion conductive membranemore » - the separator - as one of the main components. Many applications use polymeric separators whose pores are filled with liquid electrolyte, providing high power densities. However, problems arise from different failure mechanisms during cell operation, which can affect the integrity and functionality of these separators. In the case of excessive heating or mechanical damage, the polymeric separators become an incalculable security risk. Furthermore, the growth of metallic dendrites between the electrodes leads to unwanted short circuits. In order to minimize these risks, temperature stable and non-flammable ceramic particles can be added, forming so-called composite separators. Full ceramic separators, in turn, are currently commercially used only for high-temperature operation systems, due to their comparably low ion conductivity at room temperature. However, as security and lifetime demands increase, these materials turn into focus also for future room temperature applications. Hence, growing research effort is being spent on the improvement of the ion conductivity of these ceramic solid electrolyte materials, acting as separator and electrolyte at the same time. Starting with a short overview of available separator technologies and the separator market, this review focuses on ceramic-based separators. Two prominent examples, the lithium-ion and sodium-sulfur battery, are described to show the current stage of development. New routes are presented as promising technologies for safe and long-life electrochemical storage cells.« less
Separators - Technology review: Ceramic based separators for secondary batteries
NASA Astrophysics Data System (ADS)
Nestler, Tina; Schmid, Robert; Münchgesang, Wolfram; Bazhenov, Vasilii; Schilm, Jochen; Leisegang, Tilmann; Meyer, Dirk C.
2014-06-01
Besides a continuous increase of the worldwide use of electricity, the electric energy storage technology market is a growing sector. At the latest since the German energy transition ("Energiewende") was announced, technological solutions for the storage of renewable energy have been intensively studied. Storage technologies in various forms are commercially available. A widespread technology is the electrochemical cell. Here the cost per kWh, e. g. determined by energy density, production process and cycle life, is of main interest. Commonly, an electrochemical cell consists of an anode and a cathode that are separated by an ion permeable or ion conductive membrane - the separator - as one of the main components. Many applications use polymeric separators whose pores are filled with liquid electrolyte, providing high power densities. However, problems arise from different failure mechanisms during cell operation, which can affect the integrity and functionality of these separators. In the case of excessive heating or mechanical damage, the polymeric separators become an incalculable security risk. Furthermore, the growth of metallic dendrites between the electrodes leads to unwanted short circuits. In order to minimize these risks, temperature stable and non-flammable ceramic particles can be added, forming so-called composite separators. Full ceramic separators, in turn, are currently commercially used only for high-temperature operation systems, due to their comparably low ion conductivity at room temperature. However, as security and lifetime demands increase, these materials turn into focus also for future room temperature applications. Hence, growing research effort is being spent on the improvement of the ion conductivity of these ceramic solid electrolyte materials, acting as separator and electrolyte at the same time. Starting with a short overview of available separator technologies and the separator market, this review focuses on ceramic-based separators. Two prominent examples, the lithium-ion and sodium-sulfur battery, are described to show the current stage of development. New routes are presented as promising technologies for safe and long-life electrochemical storage cells.
Ethylene oxide sterilisation--is it safe?
Gillespie, E H; Jackson, J M; Owen, G R
1979-01-01
Tests show that ethylene oxide penetrates and can sterilise long narrow tubes in a hospital ethylene oxide steriliser. Residual ethylene oxide levels in plastic tubing after sterilisation have been estimated. Although initially the levels were very high, storage for four days at room temperature reduced them to a safe level. If adequate controls of the sterilising process and storage are carried out, sterilisation by ethylene oxide is considered to be safe for new plastics and clean equipment. Images Figure PMID:512032
Safe teleradiology: information assurance as project planning methodology
NASA Astrophysics Data System (ADS)
Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2003-05-01
This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.
Safe operating conditions for NSLS-II Storage Ring Frontends commissioning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Seletskiy, S.; Amundsen, C.; Ha, K.
2015-04-02
The NSLS-II Storage Ring Frontends are designed to safely accept the synchrotron radiation fan produced by respective insertion device when the electron beam orbit through the ID is locked inside the predefined Active Interlock Envelope. The Active Interlock is getting enabled at a particular beam current known as AI safe current limit. Below such current the beam orbit can be anywhere within the limits of the SR beam acceptance. During the FE commissioning the beam orbit is getting intentionally disturbed in the particular ID. In this paper we explore safe operating conditions for the Frontends commissioning.
Spent Pot Lining Characterization Framework
NASA Astrophysics Data System (ADS)
Ospina, Gustavo; Hassan, Mohamed I.
2017-09-01
Spent pot lining (SPL) management represents a major concern for aluminum smelters. There are two key elements for spent pot lining management: recycling and safe storage. Spent pot lining waste can potentially have beneficial uses in co-firing in cement plants. Also, safe storage of SPL is of utmost importance. Gas generation of SPL reaction with water and ignition sensitivity must be studied. However, determining the feasibility of SPL co-firing and developing the required procedures for safe storage rely on determining experimentally all the necessary SPL properties along with the appropriate test methods, recognized by emissions standards and fire safety design codes. The applicable regulations and relevant SPL properties for this purpose are presented along with the corresponding test methods.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McTeer, Jennifer; Morris, Jenny; Wickham, Stephen
Interim storage is an essential component of the waste management lifecycle, providing a safe, secure environment for waste packages awaiting final disposal. In order to be able to monitor and detect change or degradation of the waste packages, storage building or equipment, it is necessary to know the original condition of these components (the 'waste storage system'). This paper presents an approach to establishing the baseline for a waste-storage system, and provides guidance on the selection and implementation of potential base-lining technologies. The approach is made up of two sections; assessment of base-lining needs and definition of base-lining approach. Duringmore » the assessment of base-lining needs a review of available monitoring data and store/package records should be undertaken (if the store is operational). Evolutionary processes (affecting safety functions), and their corresponding indicators, that can be measured to provide a baseline for the waste-storage system should then be identified in order for the most suitable indicators to be selected for base-lining. In defining the approach, identification of opportunities to collect data and constraints is undertaken before selecting the techniques for base-lining and developing a base-lining plan. Base-lining data may be used to establish that the state of the packages is consistent with the waste acceptance criteria for the storage facility and to support the interpretation of monitoring and inspection data collected during store operations. Opportunities and constraints are identified for different store and package types. Technologies that could potentially be used to measure baseline indicators are also reviewed. (authors)« less
Brick, Thomas; Primrose, Beryl; Chandrasekhar, R; Roy, Sheela; Muliyil, Jayaprakash; Kang, Gagandeep
2004-10-01
Water contamination, at source and during household storage, is a major cause of enterically transmitted infections in developing countries. This study assessed contamination of the municipal water in a south Indian town, which obtains its water intermittently from a surface lake and by pumping subsurface water from a dry river bed, and monitored microbial contamination during household storage. All samples of the 'treated' municipal water were contaminated when freshly pumped, and on household storage, 25/37 (67%) showed increased contamination during storage periods from 1 to 9 days. Household storage in brass, but not in containers of other materials significantly decreased contamination of water (p = 0.04). This was confirmed in the laboratory by testing water seeded with 10(3) to 10(5) Escherichia coli per 100 ml stored in containers of different materials (p < 0.01). Despite the requirements for provision of safe drinking water in municipal areas, in practice the water supplied in Vellore is contaminated and current household storage practices increase the level of contamination in at least two-thirds of households. The implementation of locally appropriate point-of-use disinfection and safe household storage practices in developing countries is an urgent need to ensure a safe, reliable year-round supply in areas where clean water is not available.
Introduction to Data Acquisition 3.Let’s Acquire Data!
NASA Astrophysics Data System (ADS)
Nakanishi, Hideya; Okumura, Haruhiko
In fusion experiments, diagnostic control and logging devices are usually connected through the field bus, e.g. GP-IB. Internet technologies are often applied for their remote operation. All equipment and digitizers are driven by pre-programmed sequences, in which clocks and triggers give the essential timing for data acquisition. Data production rate and amount must be checked in comparison with the transfer and store rates. To store binary raw data safely, journaling file systems are preferably used with redundant disks (RAID) or mirroring mechanism, such as “rsync”. A proper choice of the data compression method not only reduces the storage size but also improves the I/O throughputs. DBMS is even applicable to quick search or security around the table data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bryant, Steven L; Camacho-Lopez, Tara R; Tenney, Craig M
Representing the Center for Frontiers of Subsurface Energy Security (CFSES), this document is one of the entries in the Ten Hundred and One Word Challenge. As part of the challenge, the 46 Energy Frontier Research Centers were invited to represent their science in images, cartoons, photos, words and original paintings, but any descriptions or words could only use the 1000 most commonly used words in the English language, with the addition of one word important to each of the EFRCs and the mission of DOE: energy. The mission of the CFSES is to pursue the scientific understanding of multiscale, multiphysicsmore » processes and to ensure safe and economically feasible storage of carbon dioxide and other byproducts of energy production without harming the environment.« less
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
Guo, Lifeng; Yau, Wei-Chuen
2015-02-01
Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.
7 CFR 1421.103 - Authorized storage.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 10 2014-01-01 2014-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...
7 CFR 1421.103 - Authorized storage.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 10 2012-01-01 2012-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...
7 CFR 1421.103 - Authorized storage.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 10 2013-01-01 2013-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...
7 CFR 1421.103 - Authorized storage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...
7 CFR 1421.103 - Authorized storage.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 10 2011-01-01 2011-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
Code of Federal Regulations, 2012 CFR
2012-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2011 CFR
2011-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2014 CFR
2014-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2010 CFR
2010-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Recommended Practices for the Safe Design and Operation of Flywheels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bender, Donald Arthur
2015-12-01
Flywheel energy storage systems are in use globally in increasing numbers . No codes pertaining specifically to flywheel energy storage exist. A number of industrial incidents have occurred. This protocol recommends a technical basis for safe flywheel de sign and operation for consideration by flywheel developers, users of flywheel systems and standards setting organizations.
Optical Storage Technology Subgroup (FIMUG)
1990-04-01
SECURITY CLASSICATON O NGRS PAG E NPAGE OMNo. 0704- 01 " I a REPORT SECUR - ,. ASSF o RiSTRICTIVE MARKINGS Unclasified oJU IS M’ 2a SECURITY C,.ASS...USERS 22a. NAME OF RESPONSIBLE INDIVIDUAL i22o TELEPHONE (include Area Code) 22c OFFICE SYMBOL (I 00 Form 1473, JUN 06 Previous e1t3onJ art obSo1te...Mdium May Change Shape of Optical Storage." PC Week. 1988 (21 Jun). "More Volume Buyers Turning Eyes Toward Optical-Storage Market." PC Week. 1988 (25 Jul
Air Quality Inside Police Drug Safes and Drug Storage Areas.
Doran, Gregory S; Deans, Ralph; De Filippis, Carlo; Kostakis, Chris; Howitt, Julia A
2018-06-01
Storage of drug-based evidence inside sealed safes may allow chemical vapors to accumulate, creating concerns of drug exposure by inhalation, or the possibility of cross-contamination of drug evidence. Air samples were taken from inside eight drug safes and one small storage room at nine city and country police stations, as well as a large centralized drug evidence storage vault, in New South Wales (NSW), Australia. Sorbent tubes containing charcoal were used to determine whether any drug residues could be detected in the air, and to identify the types of chemicals present. Carbon traps were extracted and analyzed by LC-MS-MS for a suite of 22 licit and illicit drug residues and 2 metabolites. Carbon traps and SPME fibers were also analyzed by GC-MS for general volatile organic compound (VOC) residues. No detectable drug residues, either as airborne dust or vapor, were found in the safes, the storage room or the large central repository vault. No drugs were detected in any of the 34 urine samples collected at 8 of the 10 sampling locations, while only one of the five hair samples was positive for cocaine (9 pg/mg) provided by police exhibit officers at 3 of the 10 sampling locations. VOC analysis identified a variety of solvents associated with drug manufacture, plasticisers, personal care products and volatiles associated with plants such as cannabis. The results indicate that strong chemical odours emanating from drug safes are unlikely to be drug residues due to low volatility of drugs, and are more likely VOCs associated with their manufacture or from plant growing operations. Consideration should be given to the quality of air flow in rooms in which safes are housed and the use of air filtering inside safes to reduce the likelihood of VOC accumulation, and therefore the risk of human exposure.
75 FR 43906 - Hazardous Materials: Requirements for the Storage of Explosives During Transportation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... program in emergency response procedures for all employees working at the safe haven. NFPA 498 section 4.5... safe havens used for unattended storage of Division 1.1, 1.2, and 1.3 explosives. DATES: Comments must... circumstances and operational environment. B. Federal Motor Carrier Safety Regulations (FMCSRs), 49 CFR Parts...
Preparation for the Recovery of Spent Nuclear Fuel (SNF) at Andreeva Bay, North West Russia - 13309
DOE Office of Scientific and Technical Information (OSTI.GOV)
Field, D.; McAtamney, N.
Andreeva Bay is located near Murmansk in the Russian Federation close to the Norwegian border. The ex-naval site was used to de-fuel nuclear-powered submarines and icebreakers during the Cold War. Approximately 22,000 fuel assemblies remain in three Dry Storage Units (DSUs) which means that Andreeva Bay has one of the largest stockpiles of highly enriched spent nuclear fuel (SNF) in the world. The high contamination and deteriorating condition of the SNF canisters has made improvements to the management of the SNF a high priority for the international community for safety, security and environmental reasons. International Donors have, since 2002, providedmore » support to projects at Andreeva concerned with improving the management of the SNF. This long-term programme of work has been coordinated between the International Donors and responsible bodies within the Russian Federation. Options for the safe and secure management of SNF at Andreeva Bay were considered in 2004 and developed by a number of Russian Institutes with international participation. This consisted of site investigations, surveys and studies to understand the technical challenges. A principal agreement was reached that the SNF would be removed from the site altogether and transported to Russia's reprocessing facility at Mayak in the Urals. The analytical studies provided the information necessary to develop the construction plan for the site. Following design and regulatory processes, stakeholders endorsed the technical solution in April 2007. This detailed the processes, facilities and equipment required to safely remove the SNF and identified other site services and support facilities required on the site. Implementation of this strategy is now well underway with the facilities in various states of construction. Physical works have been performed to address the most urgent tasks including weather protection over one of the DSUs, installation of shielding over the cells, provision of radiation protection infrastructure and general preparation of the site for construction of the facilities for the removal of the SNF. This paper describes the development and implementation of the strategy and work to improve the safe and secure management of SNF, preparing it for retrieval and removal from Andreeva Bay. (authors)« less
NASA Astrophysics Data System (ADS)
Reynolds, John; Sandstrom, Mary; Brown, Geoffrey; Warner, Kirstin; Phillips, Jason; Shelley, Timothy; Reyes, Jose; Hsu, Peter
2013-06-01
One of the first steps in establishing safe handling procedures for explosives is small-scale safety and thermal (SSST) testing. To better understand the response of improvised materials or HMEs to SSST testing, 18 HME materials were compared to 3 standard military explosives in a proficiency-type round robin study among five laboratories--2 DoD and 3 DOE--sponsored by DHS. The testing matrix has been designed to address problems encountered with improvised materials--powder mixtures, liquid suspensions, partially wetted solids, immiscible liquids, and reactive materials. Over 30 issues have been identified that indicate standard test methods may require modification when applied to HMEs to derive accurate sensitivity assessments needed for development safe handling and storage practices. This presentation will discuss experimental difficulties encountered when testing these problematic samples, show inter-laboratory testing results, show some statistical interpretation of the results, and highlight some of the testing issues. Some of the work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344. LLNL-ABS-617519 (721812).
An object-based storage model for distributed remote sensing images
NASA Astrophysics Data System (ADS)
Yu, Zhanwu; Li, Zhongmin; Zheng, Sheng
2006-10-01
It is very difficult to design an integrated storage solution for distributed remote sensing images to offer high performance network storage services and secure data sharing across platforms using current network storage models such as direct attached storage, network attached storage and storage area network. Object-based storage, as new generation network storage technology emerged recently, separates the data path, the control path and the management path, which solves the bottleneck problem of metadata existed in traditional storage models, and has the characteristics of parallel data access, data sharing across platforms, intelligence of storage devices and security of data access. We use the object-based storage in the storage management of remote sensing images to construct an object-based storage model for distributed remote sensing images. In the storage model, remote sensing images are organized as remote sensing objects stored in the object-based storage devices. According to the storage model, we present the architecture of a distributed remote sensing images application system based on object-based storage, and give some test results about the write performance comparison of traditional network storage model and object-based storage model.
Gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of malaysia.
Bin Nordin, R; Araki, S; Sato, H; Yokoyama, K; Bin Wan Muda, W A; Win Kyi, D
2001-01-01
To identify gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of Malaysia, we conducted a 20-item questionnaire interview on storage of pesticide (4 questions), mixing of pesticide (3 questions), use of personal protective equipment and clothing while spraying pesticide (7 questions), activities during and after spraying of pesticide (5 questions), and maintenance of pesticide sprayer (1 question) in 496 tobacco farmers (395 males and 101 females) in Bachok District, Kelantan, Malaysia. Duration of employment was significantly longer in females than those in males (p<0.001). In addition, proportion with no formal education in females was significantly higher than those in males (p<0.05). The following eight common factors were extracted from the 20 questionnaires by principal components factor analysis after varimax rotation in all farmers: (1) use of personal protective equipment, (2) unsafe work habit, (3) reading and following instructions on pesticide label, (4) security, storage and disposal of pesticide container, (5) safe work habit, (6) proper handling of pesticide and maintenance of pesticide sprayer, (7) use of personal protective clothing, and (8) safe handling of pesticide. Results of analysis of covariance for the eight factor scores of all male and female farmers, controlling for educational level and duration of employment, showed that: (1) factor scores for use of personal protective equipment (p<0.001), use of personal protective clothing (p<0.001) and safe work habit (p<0.001) in females were significantly lower than those in males; (2) conversely, factor scores for reading and following instruction on pesticide label (p<0.001) and proper handling of pesticide and maintenance of pesticide sprayer (p<0.01) in males were significantly lower than those in females; and (3) there were no significant differences in other three factor scores (p>0.05). We therefore conclude that: (1) for female tobacco farmers, choice of personal attire tend to result in lower scores on use of personal protective equipment and personal protective clothing while personal hygiene practices result in lower score on safe work habit; and, (2) for male tobacco farmers, the lower scores on reading and following instruction on pesticide label and mixing pesticide and maintenance of pesticide sprayer in good condition suggests that they were not primarily involved in these activities. It is postulated that these differences in safe and unsafe practices of pesticide handling across gender is related to the choice of personal attire, personal hygiene practices and division of labour within farming households which in turn is influenced by prevailing sociocultural norms in the community.
Ch. 7: Food Safety, Nutrition, and Distribution
USDA-ARS?s Scientific Manuscript database
A safe and nutritious food supply is a vital component of food security. Food security, in a public health context, can be summarized as permanent access to a sufficient, safe, and nutritious food supply needed to maintain an active and healthy lifestyle. The impacts of climate change on food produc...
78 FR 27392 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Office (AMSO) provides a safe, secure, healthy, and functional workplace environment for CDC staff by... provides the tools needed for workers to be safe, work in a healthy environment, and ensures environmental... Office of Security and Emergency Preparedness (CAJJ); Office of Safety, Health and Environment (CAJP...
None Available
2017-12-09
The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. A few videos were selected for showing during the Summit to attendees. These 'performer videos' highlight innovative research that is ongoing and related to the main topics of the Summit's sessions. Featured in this video are Sanjoy Banerjee, Director of CUNY Energy Institute and Dan Steingart (Assistant Professor of Chemical Engineering, CUNY). The City University of New York's Energy Institute, with the help of ARPA-E funding, is creating safe, low cost, rechargeable, long lifecycle batteries that could be used as modular distributed storage for the electrical grid. The batteries could be used at the building level or the utility level to offer benefits such as capture of renewable energy, peak shaving and microgridding, for a safer, cheaper, and more secure electrical grid.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Banerjee, Sanjoy; Steingart, Dan
The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. A few videos were selected for showing during the Summit to attendees. These "performer videos" highlight innovative research that is ongoing and related to the main topics of the Summit's sessions. Featured in this video are Sanjoy Banerjee, Director of CUNY Energy Institute and Dan Steingart (Assistant Professor of Chemical Engineering,more » CUNY). The City University of New York's Energy Institute, with the help of ARPA-E funding, is creating safe, low cost, rechargeable, long lifecycle batteries that could be used as modular distributed storage for the electrical grid. The batteries could be used at the building level or the utility level to offer benefits such as capture of renewable energy, peak shaving and microgridding, for a safer, cheaper, and more secure electrical grid.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chung, D.; Ascanio, X.
1996-05-01
The Department of Energy has issued a technical standard for long-term (>50 years) storage and will soon issue a criteria document for interim (<20 years) storage of plutonium materials. The long-term technical standard, {open_quotes}Criteria for Safe Storage of Plutonium Metals and Oxides,{close_quotes} addresses the requirements for storing metals and oxides with greater than 50 wt % plutonium. It calls for a standardized package that meets both off-site transportation requirements, as well as remote handling requirements from future storage facilities. The interim criteria document, {open_quotes}Criteria for Interim Safe Storage of Plutonium-Bearing Solid Materials{close_quotes}, addresses requirements for storing materials with less thanmore » 50 wt% plutonium. The interim criteria document assumes the materials will be stored on existing sites, and existing facilities and equipment will be used for repackaging to improve the margin of safety.« less
NASA Astrophysics Data System (ADS)
Lupinetti, Anthony J.; Fife, Julie; Garcia, Eduardo; Abney, Kent D.
2000-07-01
Information gaps exist in the knowledge base needed for choosing among the alternate processes to be used in the safe conversion of fissile materials to optimal forms for safe interim storage, long-term storage, and ultimate disposition. The current baseline storage technology for various wastes uses borosilicate glasses.1 The focus of this paper is the synthesis of actinide-containing ceramic materials at low and moderate temperatures (200 °C-1000 °C) using molecular and polymeric actinide borane and carborane complexes.
ERIC Educational Resources Information Center
De Patta, Joe
2003-01-01
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
Safe and Durable High-Temperature Lithium-Sulfur Batteries via Molecular Layer Deposited Coating.
Li, Xia; Lushington, Andrew; Sun, Qian; Xiao, Wei; Liu, Jian; Wang, Biqiong; Ye, Yifan; Nie, Kaiqi; Hu, Yongfeng; Xiao, Qunfeng; Li, Ruying; Guo, Jinghua; Sham, Tsun-Kong; Sun, Xueliang
2016-06-08
Lithium-sulfur (Li-S) battery is a promising high energy storage candidate in electric vehicles. However, the commonly employed ether based electrolyte does not enable to realize safe high-temperature Li-S batteries due to the low boiling and flash temperatures. Traditional carbonate based electrolyte obtains safe physical properties at high temperature but does not complete reversible electrochemical reaction for most Li-S batteries. Here we realize safe high temperature Li-S batteries on universal carbon-sulfur electrodes by molecular layer deposited (MLD) alucone coating. Sulfur cathodes with MLD coating complete the reversible electrochemical process in carbonate electrolyte and exhibit a safe and ultrastable cycle life at high temperature, which promise practicable Li-S batteries for electric vehicles and other large-scale energy storage systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pretzsch, Gunter; Salewski, Peter; Sogalla, Martin
2013-07-01
The German Federal Ministry for the Environment, Nature Conservation and Nuclear Safety (BMU) on behalf of the Government of the Federal Republic of Germany supports the State Nuclear Regulatory Inspectorate of Ukraine (SNRIU) in enhancement of nuclear safety and radiation protection and strengthening of the physical protection. One of the main objectives of the agreement concluded by these parties in 2008 was the retrieval and safe interim storage of disused orphan high radioactive sealed sources in Ukraine. At present, the Ukrainian National Registry does not account all high active radiation sources but only for about 70 - 80 %. GRSmore » in charge of BMU to execute the program since 2008 concluded subcontracts with the waste management and interim storage facilities RADON at different regions in Ukraine as well with the waste management and interim storage facility IZOTOP at Kiev. Below selected examples of removal of high active Co-60 and Cs-137 sources from irradiation facilities at research institutes are described. By end of 2012 removal and safe interim storage of 12.000 disused radioactive sealed sources with a total activity of more than 5,7.10{sup 14} Bq was achieved within the frame of this program. The German support program will be continued up to the end of 2013 with the aim to remove and safely store almost all disused radioactive sealed sources in Ukraine. (authors)« less
Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel
2018-06-12
Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.
RxPATROL: a Web-based tool for combating pharmacy theft.
Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy
2009-01-01
To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.
Sandia National Laboratories: About Sandia: Leadership
Working With Sandia Working With Sandia Prospective Suppliers What Sandia Looks For In Our Suppliers What provides leadership and management direction for the safe, secure execution of all Sandia missions. View implement the Labs Director's strategic vision for safe, secure operations at Sandia. View full biography
Interim Safe Storage of Plutonium Production Reactors at the US DOE Hanford Site - 13438
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schilperoort, Daryl L.; Faulk, Darrin
2013-07-01
Nine plutonium production reactors located on DOE's Hanford Site are being placed into an Interim Safe Storage (ISS) period that extends to 2068. The Environmental Impact Statement (EIS) for ISS [1] was completed in 1993 and proposed a 75-year storage period that began when the EIS was finalized. Remote electronic monitoring of the temperature and water level alarms inside the safe storage enclosure (SSE) with visual inspection inside the SSE every 5 years are the only planned operational activities during this ISS period. At the end of the ISS period, the reactor cores will be removed intact and buried inmore » a landfill on the Hanford Site. The ISS period allows for radioactive decay of isotopes, primarily Co-60 and Cs-137, to reduce the dose exposure during disposal of the reactor cores. Six of the nine reactors have been placed into ISS by having an SSE constructed around the reactor core. (authors)« less
Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair
2009-09-01
As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.
A new data collaboration service based on cloud computing security
NASA Astrophysics Data System (ADS)
Ying, Ren; Li, Hua-Wei; Wang, Li na
2017-09-01
With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.
Safe arming system for two-explosive munitions
Jaroska, Miles F.; Niven, William A.; Morrison, Jasper J.
1978-01-01
A system for safely and positively detonating high-explosive munitions, including a source of electrical signals, a split-phase square-loop transformer responsive solely to a unique series of signals from the source for charging an energy storage circuit through a voltage doubling circuit, and a spark-gap trigger for initiating discharge of the energy in the storage circuit to actuate a detonator and thereby fire the munitions.
Kuz'menko, I E
2013-01-01
The article is devoted to the process of formation and development of CW destruction management system and medical support of professional activities of personnel. Founders of Medical department of the Federal Directorate for Safe Storage and Destruction of Chemical Weapons are presented. Main principles and ways of working of medical department in specific conditions are covered.
Madsen, Lizell Bustamante; Eddleston, Michael; Hansen, Kristian Schultz; Pearson, Melissa; Agampodi, Suneth; Jayamanne, Shaluka; Konradsen, Flemming
2015-01-01
Introduction An estimated 803 900 people worldwide died as a result of self-harm in 2012. The deliberate ingestion of pesticides has been identified as the method most frequently used to commit fatal self-harm globally. In Sri Lanka, it is estimated that up to 60% of all suicides are committed using this method. The aim of the present study is to assess the cost-effectiveness of an ongoing safe storage intervention currently taking place in a rural Sri Lankan district and to model the cost-effectiveness of implementing the safe storage intervention as well as four potential interventions (legislative, medical management, follow-up contact and mobile phone contact) on a national level. Methods and analysis Study design for all the strategies is a cost-effectiveness analysis. A governmental perspective is adopted. The time horizon for tracking the associated costs and health outcomes of the safe storage intervention on district level runs over 3 years. The time horizon is extended to 5 years when modelling a full national roll-out of the respective interventions. The discounting of costs and health outcomes are undertaken at the recommended real rate of 3%. Threshold analyses of the modelled strategies are employed to assess the strategies potential for cost-effectiveness, running scenarios with health outcome improvements ranging from 1% to 100%. Sensitivity analyses are also performed. The main outcome measures of the safe storage intervention are incremental cost-effectiveness ratios. Ethics and dissemination Ethical approval was granted for the safe storage project from the University of Peradeniya, Sri Lanka, in March of 2008. An amendment for the present study was granted from Rajarata University of Sri Lanka in November of 2013. Findings will be disseminated to public and private stakeholders in local and national government in Sri Lanka as well as the wider academic audience through peer-reviewed publications and international conferences. Trial registration number The safe storage cluster trial is registered with the Clinical Trials, ref: NCT1146496 (http://clinicaltrialsfeeds.org/clinical-trials/show/NCT1146496). PMID:25724984
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-17
... requirement that loaded storage casks also meet transportation requirements. Integration of storage and... transported from the storage location. As part of its evaluation of integration and compatibility between... evaluating compatibility of storage and transportation regulations. As part of its evaluation of integration...
Violano, Pina; Bonne, Stephanie; Duncan, Thomas; Pappas, Peter; Christmas, A Britton; Dennis, Andrew; Goldberg, Stephanie; Greene, Wendy; Hirsh, Michael; Shillinglaw, William; Robinson, Bryce; Crandall, Marie
2018-03-08
Over 50,000 homicides and suicides occur each year. An estimated half of all U.S. households are believed to have a firearm present, making them one of the most ubiquitous consumer products. Our goal was to determine if the manner of storage of a firearm in a home could potentially make a difference in the outcomes of intentional and unintentional injuries involving a firearm; specifically addressing the use of gun safes and devices that block/disable firearm function (trigger locks, cable locks, etc.). A comprehensive review of the literature was performed. We used GRADE (Grading of Recommendations Assessment, Development, and Evaluation) methodology to assess the breadth and quality of the data specific to our PICO (Population, Intervention, Comparator, Outcomes) questions. A total of 176 studies were initially identified, then 120 more added after a subsequent, literature review with 97 removed as duplicates. One hundred and ninety-one case reports, case series, and reviews were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of two studies which merited inclusion for PICO #1, should gun locks be used to prevent firearm injuries and six studies which merited inclusion for PICO #2, should safe storage for guns be used to prevent firearm injuries. PICO 1: We conditionally recommend that gun locks be used to prevent unintentional firearm injury.PICO 2: Because of the large effect size and the reasonable quality of available evidence with safe storage of firearms, we recommend safe storage prevent firearm-related injuries. Systematic review, level III.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
Code of Federal Regulations, 2012 CFR
2012-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
76 FR 18738 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... Records in the System: First, middle and last name, nickname, last four digits of Social Security Number..., Accessing, Retaining, and Disposing of Records: Storage: Records are stored on electronic storage media... characteristics (such as name, last four digits of Social Security Number (SSN), series, grade, dates of service...
77 FR 25993 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... disposing of records in the system: Storage: Electronic storage media. Retrievability: Name, Social Security... effective on June 1, 2012 unless comments are received which result in a contrary determination. ADDRESSES... records in the system: Name, Social Security Number (SSN), date of birth, home address, place of birth...
75 FR 36642 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... relating to the issue, return, and accountability of keys to secure areas. Records may contain name, Social... disposing of records in the system: Storage: Paper records in file folders and electronic storage media. Retrievability: By name, Social Security Number (SSN), key number, personal identification number (PIN), Magnetic...
NASA Astrophysics Data System (ADS)
Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei
2008-12-01
Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.
Safe and Secure Schools Assessment. Public School Information. Legislative Report, 2008
ERIC Educational Resources Information Center
Idaho State Department of Education, 2008
2008-01-01
As a result of high profile shootings and critical incidents in schools on a national level, combined with the lack of a cohesive, standardized approach to safety and security in Idaho Schools, Superintendent Tom Luna requested an appropriation to address this issue and the Legislature allocated 5150.000 in FY 2008 for the Safe and Secure…
Early Arrival or Trespassing? Leadership, School Security, and the Right to the School
ERIC Educational Resources Information Center
Irby, Decoteau J.; Thomas, Christopher
2013-01-01
School leaders are under constant pressure to ensure that schools are safe and to demonstrate that student safety and discipline are priorities. In many districts, schools rely on local law enforcement, school police, or security personnel to assist with promoting and maintaining safe schools. To encourage school leaders to think critically about…
Fail-safe storage rack for irradiated fuel rod assemblies
Lewis, D.R.
1993-03-23
A fail-safe storage rack is provided for interim storage of spent but radioactive nuclear fuel rod assemblies. The rack consists of a checkerboard array of substantially square, elongate receiving tubes fully enclosed by a double walled container, the outer wall of which is imperforate for liquid containment and the inner wall of which is provided with perforations for admitting moderator liquid flow to the elongate receiving tubes, the liquid serving to take up waste heat from the stored nuclear assemblies and dissipate same to the ambient liquid reservoir. A perforated cover sealing the rack facilitates cooling liquid entry and dissipation.
Fail-safe storage rack for irradiated fuel rod assemblies
Lewis, Donald R.
1993-01-01
A fail-safe storage rack is provided for interim storage of spent but radioactive nuclear fuel rod assemblies. The rack consists of a checkerboard array of substantially square, elongate receiving tubes fully enclosed by a double walled container, the outer wall of which is imperforate for liquid containment and the inner wall of which is provided with perforations for admitting moderator liquid flow to the elongate receiving tubes, the liquid serving to take up waste heat from the stored nuclear assemblies and dissipate same to the ambient liquid reservoir. A perforated cover sealing the rack facilitates cooling liquid entry and dissipation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ludwick, J D; Moore, E B
1984-01-01
Safety and cost information is developed for the conceptual decommissioning of five different types of reference independent spent fuel storage installations (ISFSIs), each of which is being given consideration for interim storage of spent nuclear fuel in the United States. These include one water basin-type ISFSI (wet) and four dry ISFSIs (drywell, silo, vault, and cask). The reference ISFSIs include all component parts necessary for the receipt, handling and storage of spent fuel in a safe and efficient manner. Three decommissioning alternatives are studied to obtain comparisons between costs (in 1981 dollars), occupational radiation doses, and potential radiation doses tomore » the public. The alternatives considered are: DECON (immediate decontamination), SAFSTOR (safe storage followed by deferred decontamination), and ENTOMB (entombment followed by long-term surveillance).« less
A compressive sensing based secure watermark detection and privacy preserving storage framework.
Qia Wang; Wenjun Zeng; Jun Tian
2014-03-01
Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service, such as the cloud. In this paper, we identify a cloud computing application scenario that requires simultaneously performing secure watermark detection and privacy preserving multimedia data storage. We then propose a compressive sensing (CS)-based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a CS domain to protect the privacy. During CS transformation, the privacy of the CS matrix and the watermark pattern is protected by the MPC protocols under the semi-honest security model. We derive the expected watermark detection performance in the CS domain, given the target image, watermark pattern, and the size of the CS matrix (but without the CS matrix itself). The correctness of the derived performance has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the CS domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.
Gonzalez-Cortes, S.; Slocombe, D. R.; Xiao, T.; Aldawsari, A.; Yao, B.; Kuznetsov, V. L.; Liberti, E.; Kirkland, A. I.; Alkinani, M. S.; Al-Megren, H. A.; Thomas, J. M.; Edwards, P. P.
2016-01-01
Hydrogen is often described as the fuel of the future, especially for application in hydrogen powered fuel-cell vehicles (HFCV’s). However, its widespread implementation in this role has been thwarted by the lack of a lightweight, safe, on-board hydrogen storage material. Here we show that benign, readily-available hydrocarbon wax is capable of rapidly releasing large amounts of hydrogen through microwave-assisted catalytic decomposition. This discovery offers a new material and system for safe and efficient hydrogen storage and could facilitate its application in a HFCV. Importantly, hydrogen storage materials made of wax can be manufactured through completely sustainable processes utilizing biomass or other renewable feedstocks. PMID:27759014
NASA Astrophysics Data System (ADS)
Hartatik; Hartono, R.; Purnomo, A.; Riasti, B. K.; Munawaroh, H.
2017-02-01
Direct Plastics are used for various human purposes, ranging from household to industry. Tableware and drink made of plastic is very practical to use, easy to clean, durable and cost far less than tableware made of the other material. However, must also be considered in terms of security in the use of plastic containers for food storage because there are adverse effects. There are seven types of plastic based material used, namely Polyethylene, Terephthalate, High Density Polyethylene, Polyvinyl Chloride or V/PVC, Low Density Polyethylene or LDPE, Polypropylene, Polystyrene, Plastics others including polycarbonate. Experts claims that the plastic code numbers 2, 4 and 5 are used for equipment safely eat/drink because it is more stable and safe if used correctly. In this study will analyze the relationship between the recent education, family income to perception and behavior in the use of plastics in food storage daily as one solution to healthy living. The population of this research is all the people in the Solo area particularly housewife and all the people in the productive age. Data were obtained through a survey with cluster random sampling method. Statistical method used is a parametric method and Chi Square test This method is used as an alternative method of parametric when some assumptions are not met. Based on the results of Chi Square test with α = 15% was concluded that recent education and income related to the behavior of people using plastic products as one of the solutions to Healthy Living.
SLIGHTLY IRRADIATED FUEL (SIF) INTERIM DISPOSITION PROJECT
DOE Office of Scientific and Technical Information (OSTI.GOV)
NORTON SH
2010-02-23
CH2M HILL Plateau Remediation Company (CH2M HILL PRC) is proud to submit the Slightly Irradiated Fuel (SIF) Interim Disposition Project for consideration by the Project Management Institute as Project of the Year for 2010. The SIF Project was a set of six interrelated sub-projects that delivered unique stand-alone outcomes, which, when integrated, provided a comprehensive and compliant system for storing high risk special nuclear materials. The scope of the six sub-projects included the design, construction, testing, and turnover of the facilities and equipment, which would provide safe, secure, and compliant Special Nuclear Material (SNM) storage capabilities for the SIF material.more » The project encompassed a broad range of activities, including the following: Five buildings/structures removed, relocated, or built; Two buildings renovated; Structural barriers, fencing, and heavy gates installed; New roadways and parking lots built; Multiple detection and assessment systems installed; New and expanded communication systems developed; Multimedia recording devices added; and A new control room to monitor all materials and systems built. Project challenges were numerous and included the following: An aggressive 17-month schedule to support the high-profile Plutonium Finishing Plant (PFP) decommissioning; Company/contractor changeovers that affected each and every project team member; Project requirements that continually evolved during design and construction due to the performance- and outcome-based nature ofthe security objectives; and Restrictions imposed on all communications due to the sensitive nature of the projects In spite of the significant challenges, the project was delivered on schedule and $2 million under budget, which became a special source of pride that bonded the team. For years, the SIF had been stored at the central Hanford PFP. Because of the weapons-grade piutonium produced and stored there, the PFP had some of the tightest security on the Hanford nuclear reservation. Workers had to pass through metal detectors when they arrived at the plant and materials leaving the plant had to be scanned for security reasons. Whereas other high-security nuclear materials were shipped from the PFP to Savannah River, S.C. as part ofa Department of Energy (DOE) program to consolidate weapons-grade plutonium, it was determined that the SIF should remain onsite pending disposition to a national repository. Nevertheless, the SIF still requires a high level of security that the PFP complex has always provided. With the 60-year PFP mission of producing and storing plutonium concluded, the environmental cleanup plans for Hanford call for the demolition of the 63-building PFP complex. Consequently, if the SIF remained at PFP it not only would have interfered with the environmental cleanup plans, but would have required $100 million in facility upgrades to meet increased national security requirements imposed after the 9/11 terrorist attacks. A new smaller and more cost-effective area was needed to store this material, which led to the SIF Project. Once the SIF project was successfully completed and the SIF was safely removed from PFP, the existing Protected Area at PFP could be removed, and demolition could proceed more quickly without being encumbered by restrictive security requirements that an active Protected Area requires. The lightened PFP security level brought by safely removing and storing the SIF would also yield lowered costs for deactivation and demolition, as well as reduce overall life-cycle costs.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...
Managing security and privacy concerns over data storage in healthcare research.
Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M
2011-08-01
Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.
Evaluation of a community-based safe firearm and ammunition storage intervention.
Simonetti, Joseph A; Rowhani-Rahbar, Ali; King, Cassie; Bennett, Elizabeth; Rivara, Frederick P
2018-06-01
Safe firearm storage practices are associated with a lower risk of unintentional and self-inflicted firearm injuries among household members, though many firearms remain unlocked and/or loaded. Conduct a preliminary evaluation of a community-based firearm safety intervention and assess participants' preferences for firearm locking devices and their comfort with potential firearm safety counsellors. Baseline event and follow-up surveys among adult participants to assess changes in firearm storage practices, including whether all household firearms were stored locked, all were unloaded, all ammunition was locked, and a composite measure assessing whether all firearms were locked and unloaded and all ammunition was stored locked. A total of 206 out of 415 participants completed both surveys and were included. Nearly 9 in 10 respondents preferred the firearm lock box rather than a trigger lock. At follow-up, a significantly greater proportion reported that all household firearms were locked (+13.7%) and unloaded (+8.5%) and a non-significantly greater proportion reported that all ammunition was locked (+6.3%). A significantly greater proportion reported practising all three safe firearm and ammunition storage practices at follow-up (+12.6%). A majority reported they would be comfortable or very comfortable discussing firearm safety with various safety counsellors, though women were less likely to do so than men. This intervention that included distribution of a free, participant-selected locking device improved safe firearm storage practices among participants. Differences in participant preferences for devices and safety counsellors suggest that a 'one size fits all' approach may be inadequate in affecting population-level storage practices. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Marine data security based on blockchain technology
NASA Astrophysics Data System (ADS)
Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang
2018-03-01
With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.
Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang, Shangping; Zhao, Duqiao; Zhang, Yaling
2017-01-01
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.
ERIC Educational Resources Information Center
Neville, Angela
1996-01-01
Provides a list of recommendations for safely managing hazardous waste containers. Encourages training of employees on the hazards of the wastes they handle and the correct procedures for managing containers. (DDR)
Ishizuka, Akinori; Tanji, Masataka; Hayashi, Nobuatsu; Wakabayashi, Akihiro; Tatsumoto, Hideki; Hotta, Kunimoto
2006-12-01
For the long term storage of tap water, we developed a separate type of tank (5 m3) equipped with an electrolysis system to control bacterial growth. The electrolysis conditions using 20A direct current and a water flow rate of 10 L/min were capable of producing available chlorine (AC) at the rate of 5-8mg/min and raising the AC level of the stored tap water by about 0.2 mg/kg within 20-30 min The electrolyzed tap water with 0.2 mg/kg AC showed a capability per ml of killing 10(5)-10(6) cfu of bacteria such as Escherichia coli and Pseudomonas aeruginosa within 15 sec. A 6-month trial operation of the storage system with an automatic electrolysis control to keep AC level ranging 0.2-0.4 mg/kg demonstrated that the system worked well for the stored tap water in suppressing bacterial growth as well as in keeping good potable quality with reference to the 46 parameters specified for Japanese tap water. Actually, the electrolysis treatment was administered intermittently with an interval of about two weeks. Thus we believe the developed system has good potential to secure a potable water supply not only in the occasion of emergencies but also in countries having problems in the supply of safe drinking water.
Reducing Risk in CO2 Sequestration: A Framework for Integrated Monitoring of Basin Scale Injection
NASA Astrophysics Data System (ADS)
Seto, C. J.; Haidari, A. S.; McRae, G. J.
2009-12-01
Geological sequestration of CO2 is an option for stabilization of atmospheric CO2 concentrations. Technical ability to safely store CO2 in the subsurface has been demonstrated through pilot projects and a long history of enhanced oil recovery and acid gas disposal operations. To address climate change, current injection operations must be scaled up by a factor of 100, raising issues of safety and security. Monitoring and verification is an essential component in ensuring safe operations and managing risk. Monitoring provides assurance that CO2 is securely stored in the subsurface, and the mechanisms governing transport and storage are well understood. It also provides an early warning mechanism for identification of anomalies in performance, and a means for intervention and remediation through the ability to locate the CO2. Through theoretical studies, bench scale experiments and pilot tests, a number of technologies have demonstrated their ability to monitor CO2 in the surface and subsurface. Because the focus of these studies has been to demonstrate feasibility, individual techniques have not been integrated to provide a more robust method for monitoring. Considering the large volumes required for injection, size of the potential footprint, length of time a project must be monitored and uncertainty, operational considerations of cost and risk must balance safety and security. Integration of multiple monitoring techniques will reduce uncertainty in monitoring injected CO2, thereby reducing risk. We present a framework for risk management of large scale injection through model based monitoring network design. This framework is applied to monitoring CO2 in a synthetic reservoir where there is uncertainty in the underlying permeability field controlling fluid migration. Deformation and seismic data are used to track plume migration. A modified Ensemble Kalman filter approach is used to estimate flow properties by jointly assimilating flow and geomechanical observations. Issues of risk, cost and uncertainty are considered.
Mobile-PKI Service Model for Ubiquitous Environment
NASA Astrophysics Data System (ADS)
Jeun, Inkyung; Chun, Kilsoo
One of the most important things in PKI(Public Key Infrastructure) is the private key management issue. The private key must be deal with safely for secure PKI service. Even though PKI service is usually used for identification and authentication of user in e-commerce, PKI service has many inconvenient factors. Especially, the fact that storage media of private key for PKI service is limited to PC hard disk drive or smart card users must always carry, gives an inconvenience to user and is not suitable in ubiquitous network. This paper suggests the digital signature service using a mobile phone(m-PKI service) which is suitable in future network. A mobile phone is the most widely used for personal communication means and has a characteristic of high movability. We can use the PKI service anytime and anywhere using m-PKI.
2014-04-17
CAPE CANAVERAL, Fla. - The second set of two Ogive panels for the Orion Launch Abort System have arrived at the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. The Ogive panels are being uncrated for storage inside the LASF. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Kim Shiflett
Cho, Eun Seon; Ruminski, Anne M; Aloni, Shaul; Liu, Yi-Sheng; Guo, Jinghua; Urban, Jeffrey J
2016-02-23
Interest in hydrogen fuel is growing for automotive applications; however, safe, dense, solid-state hydrogen storage remains a formidable scientific challenge. Metal hydrides offer ample storage capacity and do not require cryogens or exceedingly high pressures for operation. However, hydrides have largely been abandoned because of oxidative instability and sluggish kinetics. We report a new, environmentally stable hydrogen storage material constructed of Mg nanocrystals encapsulated by atomically thin and gas-selective reduced graphene oxide (rGO) sheets. This material, protected from oxygen and moisture by the rGO layers, exhibits exceptionally dense hydrogen storage (6.5 wt% and 0.105 kg H2 per litre in the total composite). As rGO is atomically thin, this approach minimizes inactive mass in the composite, while also providing a kinetic enhancement to hydrogen sorption performance. These multilaminates of rGO-Mg are able to deliver exceptionally dense hydrogen storage and provide a material platform for harnessing the attributes of sensitive nanomaterials in demanding environments.
DOT National Transportation Integrated Search
2001-09-20
A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...
Gender Difference in Safe and Unsafe Practice of Pesticide Handling in Tobacco Farmers of Malaysia
BIN NORDIN, Rusli; ARAKI, Shunichi; SATO, Hajime; YOKOYAMA, Kazuhito; BIN WAN MUDA, Wan Abdul Manan; WIN KYI, Daw
2001-01-01
To identify gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of Malaysia, we conducted a 20-item questionnaire interview on storage of pesticide (4 questions), mixing of pesticide (3 questions), use of personal protective equipment and clothing while spraying pesticide (7 questions), activities during and after spraying of pesticide (5 questions), and maintenance of pesticide sprayer (1 question) in 496 tobacco farmers (395 males and 101 females) in Bachok District, Kelantan, Malaysia. Duration of employment was significantly longer in females than those in males (p<0.001). In addition, proportion with no formal education in females was significantly higher than those in males (p<0.05). The following eight common factors were extracted from the 20 questionnaires by principal components factor analysis after varimax rotation in all farmers: (1) use of personal protective equipment, (2) unsafe work habit, (3) reading and following instructions on pesticide label, (4) security, storage and disposal of pesticide container, (5) safe work habit, (6) proper handling of pesticide and maintenance of pesticide sprayer, (7) use of personal protective clothing, and (8) safe handling of pesticide. Results of analysis of covariance for the eight factor scores of all male and female farmers, controlling for educational level and duration of employment, showed that: (1) factor scores for use of personal protective equipment (p<0.001), use of personal protective clothing (p<0.001) and safe work habit (p<0.001) in females were significantly lower than those in males; (2) conversely, factor scores for reading and following instruction on pesticide label (p<0.001) and proper handling of pesticide and maintenance of pesticide sprayer (p<0.01) in males were significantly lower than those in females; and (3) there were no significant differences in other three factor scores (p>0.05). We therefore conclude that: (1) for female tobacco farmers, choice of personal attire tend to result in lower scores on use of personal protective equipment and personal protective clothing while personal hygiene practices result in lower score on safe work habit; and, (2) for male tobacco farmers, the lower scores on reading and following instruction on pesticide label and mixing pesticide and maintenance of pesticide sprayer in good condition suggests that they were not primarily involved in these activities. It is postulated that these differences in safe and unsafe practices of pesticide handling across gender is related to the choice of personal attire, personal hygiene practices and division of labour within farming households which in turn is influenced by prevailing sociocultural norms in the community. PMID:22973149
ERIC Educational Resources Information Center
Tanner-Smith, Emily E.; Fisher, Benjamin W.
2015-01-01
Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…
Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.
Keys, Yolanda; Stichler, Jaynelle F
Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.
CarbonSAFE Illinois - Macon County
DOE Office of Scientific and Technical Information (OSTI.GOV)
Whittaker, Steve
CarbonSAFE Illinois is a a Feasibility study to develop an established geologic storage complex in Macon County, Illinois, for commercial-scale storage of industrially sourced CO2. Feasibility activities are focused on the Mt. Simon Storage Complex; a step-out well will be drilled near existing storage sites (i.e., the Midwest Geological Sequestration Consortium’s Illinois Basin – Decatur Project and the Illinois Industrial Carbon Capture and Storage Project) to further establish commercial viability of this complex and to evaluate EOR potential in a co-located oil-field trend. The Archer Daniels Midland facility (ethanol plant), City Water, Light, and Power in Springfield, Illinois (coal-fired powermore » station), and other regional industries are potential sources of anthropogenic CO2 for storage at this complex. Site feasibility will be evaluated through drilling results, static and dynamic modeling, and quantitative risk assessment. Both studies will entail stakeholder engagement, consideration of infrastructure requirements, existing policy, and business models. Project data will help calibrate the National Risk Assessment Partnership (NRAP) Toolkit to better understand the risks of commercial-scale carbon storage.« less
The Interface of Safety and Security in Transport: A Regional Perspective
DOE Office of Scientific and Technical Information (OSTI.GOV)
Welch, Tim; Duhamel, David A; Nandakumar, A. N.
Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios and developing transport security plans. Many participants also reported their appreciation of the workshop exercises that specifically focused on practical aspects of safety and security of transport of radioactive material. These workshop outcomes highlight the important role professionals can offer when they receive additional safety training and education for radioactive material in transport. Moreover, these professionals can help to increase capacity in countries with developing nuclear security regimes. This paper explores workshop outcomes and transportation regulations and guidelines for radioactive material.« less
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...
Storage of Poisonous Substances and Firearms in Homes with Young Children Visitors and Older Adults
Coyne-Beasley, Tamera; Runyan, Carol W.; Baccaglini, Lorena; Perkis, David; Johnson, Renee M.
2011-01-01
Background Most unintentional childhood poisonings and firearm injuries occur in residential environments. Therefore, a preventive strategy includes limiting children’s access to poisons and firearms through safe storage. This study examines storage of poisons and firearms among households with older adults, and households where young children reside compared to those where they visit only. Methods Sample is from a 2002 national random-digit-dial survey of 1003 households. Analyses were weighted to reflect the national population. Results There were 637 households with children residents or visitors aged <6 years. Seventy-five percent of the households (n =480) had children aged <6 as visitors only, and 15% had older adult residents (aged ≥70 years). Poisons and firearms were stored less securely in homes with young children as visitors as compared to those homes with resident young children. In 55% of homes where young children lived, and 74% of homes where young children were only visitors, household chemicals were reportedly stored unlocked. Although firearm ownership was comparable between the two categories of households (33% vs 34%), homes in which children were only visitors were more likely to store firearms unlocked (56%), than homes in which children resided (33%). Homes with older adult residents had more firearms present. Conclusions Children are at risk from improperly stored poisonous substances and firearms in their own homes and homes they visit. Strategies are needed to improve the storage practices of both poisons and firearms to minimize in-home hazards to young children, particularly raising awareness of these hazards to young visitors. PMID:15626565
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
33 CFR 62.27 - Safe water marks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-30
... Parts 30 and 3400 SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight... No. FR-5271-F-03] RIN 2502-A170 SAFE Mortgage Licensing Act: Minimum Licensing Standards and... pursuant to the Secure and Fair Enforcement Mortgage Licensing Act of 2008 (SAFE Act or Act), to ensure...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO ...
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO EAST. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in Weapons Storage Area, Plattsburgh, Clinton County, NY
What CFOs should know before venturing into the cloud.
Rajendran, Janakan
2013-05-01
There are three major trends in the use of cloud-based services for healthcare IT: Cloud computing involves the hosting of health IT applications in a service provider cloud. Cloud storage is a data storage service that can involve, for example, long-term storage and archival of information such as clinical data, medical images, and scanned documents. Data center colocation involves rental of secure space in the cloud from a vendor, an approach that allows a hospital to share power capacity and proven security protocols, reducing costs.
Energy Storage for the Power Grid
Imhoff, Carl; Vaishnav, Dave; Wang, Wei
2018-05-30
The iron vanadium redox flow battery was developed by researchers at Pacific Northwest National Laboratory as a solution to large-scale energy storage for the power grid. This technology provides the energy industry and the nation with a reliable, stable, safe, and low-cost storage alternative for a cleaner, efficient energy future.
27 CFR 22.92 - Storage facilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...
30 CFR 57.4401 - Storage tank foundations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Storage tank foundations. 57.4401 Section 57... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations...
27 CFR 22.92 - Storage facilities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...
27 CFR 22.92 - Storage facilities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...
12 CFR 978.5 - Storage of confidential information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Storage of confidential information. 978.5... OPERATIONS AND AUTHORITIES BANK REQUESTS FOR INFORMATION § 978.5 Storage of confidential information. Each Bank shall: (a) Store all identified confidential information in secure storage areas or filing...
41 CFR 50-204.28 - Storage of radioactive materials.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Storage of radioactive... CONTRACTS Radiation Standards § 50-204.28 Storage of radioactive materials. Radioactive materials stored in a nonradiation area shall be secured against unauthorized removal from the place of storage. ...
27 CFR 22.92 - Storage facilities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...
41 CFR 50-204.28 - Storage of radioactive materials.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 41 Public Contracts and Property Management 1 2014-07-01 2014-07-01 false Storage of radioactive... CONTRACTS Radiation Standards § 50-204.28 Storage of radioactive materials. Radioactive materials stored in a nonradiation area shall be secured against unauthorized removal from the place of storage. ...
27 CFR 22.92 - Storage facilities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...
41 CFR 50-204.28 - Storage of radioactive materials.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Storage of radioactive... CONTRACTS Radiation Standards § 50-204.28 Storage of radioactive materials. Radioactive materials stored in a nonradiation area shall be secured against unauthorized removal from the place of storage. ...
30 CFR 57.4401 - Storage tank foundations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Storage tank foundations. 57.4401 Section 57... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations...
Report: Information Security Series: Security Practices Safe Drinking Water Information System
Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.
Using the Method of Water Poverty Index (WPI) to Evaluate the Region Water Security
NASA Astrophysics Data System (ADS)
Fu, Q.; Kachanoski, G.
2008-12-01
Water security is a widely concerned issue in the world nowadays. A new method, water poverty index (WPI), has been used to evaluate the regional water security. Twelve state farms in Heilongjiang Province, Northeastern China were selected to evaluate water security status based on the data of 2006 by using WPI and mean deviation grading method. The method of WPI includes five key indexes, such as resources(R), access (A), capacity(C), utilization (U) and environment (E). Each key index includes several sub-indexes. According to the results of WPI, the grade of each farm has been calculated by using the method of mean deviation grading. Thus, the radar images can be protracted of each farm. From the radar images, the conclusions can be drawn that the WPI values of Farms 853 and Hongqiling were in very safe status, while that of Farm Raohe was in safe status, those of Farms Youyi, 597, 852, 291 and Jiangchuan were in moderate safe status, that of Farm Beixing was in low safe status and those of Farms Shuangyashan, Shuguang and Baoshan were in unsafe status. The results from this study can provide basic information for decision making on rational use of water resources and regulations for regional water safety guarantee system.
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
Cryptography for Big Data Security
2015-07-13
Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S) Distribution A: Public Release Ariel Hamlin1 Nabil...Email: arkady@ll.mit.edu ii Contents 1 Cryptography for Big Data Security 1 1.1 Introduction...48 Chapter 1 Cryptography for Big Data Security 1.1 Introduction With the amount
33 CFR 62.27 - Safe water marks.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is...
10 CFR 34.35 - Labeling, storage, and transportation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Labeling, storage, and transportation. 34.35 Section 34.35... REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Equipment § 34.35 Labeling, storage, and transportation. (a... changer or the storage container has securely attached to it a durable, legible, and clearly visible label...
10 CFR 34.35 - Labeling, storage, and transportation.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Labeling, storage, and transportation. 34.35 Section 34.35... REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Equipment § 34.35 Labeling, storage, and transportation. (a... changer or the storage container has securely attached to it a durable, legible, and clearly visible label...
30 CFR 56.4401 - Storage tank foundations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Storage tank foundations. 56.4401 Section 56... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be...
30 CFR 56.4401 - Storage tank foundations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Storage tank foundations. 56.4401 Section 56... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
A&M. Radioactive parts security storage area, TAN647 and TAN648. Plot ...
A&M. Radioactive parts security storage area, TAN-647 and TAN-648. Plot plan, fencing details. Relationship to hot shop and railroad turntable. Ralph M. Parsons 1480-7-ANP/GE-3-102. Date: November 19958. Approved by INEEL Classification Office for public release. INEEL index no. 034-0100-00-693-107447 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
Wen, Wei; Wu, Jin-ming; Jiang, Yin-zhu; Yu, Sheng-lan; Bai, Jun-qiang; Cao, Min-hua; Cui, Jie
2015-01-01
Lithium-ion batteries (LIBs) are promising energy storage devices for portable electronics, electric vehicles, and power-grid applications. It is highly desirable yet challenging to develop a simple and scalable method for constructions of sustainable materials for fast and safe LIBs. Herein, we exploit a novel and scalable route to synthesize ultrathin nanobelts of anatase TiO2, which is resource abundant and is eligible for safe anodes in LIBs. The achieved ultrathin nanobelts demonstrate outstanding performances for lithium storage because of the unique nanoarchitecture and appropriate composition. Unlike conventional alkali-hydrothermal approaches to hydrogen titanates, the present room temperature alkaline-free wet chemistry strategy guarantees the ultrathin thickness for the resultant titanate nanobelts. The anatase TiO2 ultrathin nanobelts were achieved simply by a subsequent calcination in air. The synthesis route is convenient for metal decoration and also for fabricating thin films of one/three dimensional arrays on various substrates at low temperatures, in absence of any seed layers. PMID:26133276
Effective Use of Household Water Treatment and Safe Storage in Response to the 2010 Haiti Earthquake
Lantagne, Daniele; Clasen, Thomas
2013-01-01
When water supplies are compromised during an emergency, responders often recommend household water treatment and safe storage (HWTS) methods, such as boiling or chlorination. We evaluated the near- and longer-term impact of chlorine and filter products distributed shortly after the 2010 earthquake in Haiti. HWTS products were deemed as effective to use if they actually improved unsafe household drinking water to internationally accepted microbiological water quality standards. The acute emergency survey (442 households) was conducted within 8 weeks of emergency onset; the recovery survey (218 households) was conducted 10 months after onset. Effective use varied by HWTS product (from 8% to 63% of recipients in the acute phase and from 0% to 46% of recipients in the recovery phase). Higher rates of effective use were associated with programs that were underway in Haiti before the emergency, had a plan at initial distribution for program continuation, and distributed products with community health worker support and a safe storage container. PMID:23836571
Cho, Eun Seon; Ruminski, Anne M.; Aloni, Shaul; ...
2016-02-23
Interest in hydrogen fuel is growing for automotive applications; however, safe, dense, solid-state hydrogen storage remains a formidable scientific challenge. Metal hydrides offer ample storage capacity and do not require cryogens or exceedingly high pressures for operation. However, hydrides have largely been abandoned because of oxidative instability and sluggish kinetics. We report a new, environmentally stable hydrogen storage material constructed of Mg nanocrystals encapsulated by atomically thin and gas-selective reduced graphene oxide (rGO) sheets. This material, protected from oxygen and moisture by the rGO layers, exhibits exceptionally dense hydrogen storage (6.5 wt% and 0.105 kg H 2 per litre inmore » the total composite). As rGO is atomically thin, this approach minimizes inactive mass in the composite, while also providing a kinetic enhancement to hydrogen sorption performance. In conclusion, these multilaminates of rGO-Mg are able to deliver exceptionally dense hydrogen storage and provide a material platform for harnessing the attributes of sensitive nanomaterials in demanding environments.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
... institutions that sponsor chemical laboratories accountable for providing safe working environments. Beyond... current laboratory practices, security, and emergency response, as well as promoting safe handling of.... Safety and training programs have been implemented to promote the safe handling of chemicals from...
Safety and security of radioactive sources in industrial radiography in Bangladesh
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mollah, A. S.; Nazrul, M. Abdullah
2013-07-01
Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less
Emerging Security Mechanisms for Medical Cyber Physical Systems.
Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K
2016-01-01
The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.
Safe and Secure Services Based on NGN
NASA Astrophysics Data System (ADS)
Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito
Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.
NASA Astrophysics Data System (ADS)
Atkins, Chad G.; Buckley, Kevin; Chen, Deborah; Schulze, H. G.; Devine, Dana V.; Blades, Michael W.; Turner, Robin F. B.
2015-07-01
Modern transfusion medicine relies on the safe, secure, and cost-effective delivery of donated red blood cells (RBCs). Once isolated, RBCs are suspended in a defined additive solution and stored in plastic blood bags in which, over time, they undergo chemical, physiological, and morphological changes that may have a deleterious impact on some patients. Regulations limit the storage period to 42 days and the cells do not routinely undergo analytical testing before use. In this study, we use Raman spectroscopy to interrogate stored RBCs and we identify metabolic and cell-breakdown products, such as haemoglobin and membrane fragments, that build-up in the blood bags as the cells age. Our work points the way to the development of an instrument which could quickly and easily assess the biochemical nature of stored RBC units before they are transfused.
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. Both panels were moved by crane and lowered onto a storage stand at the far end of the facility. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is being lifted by crane for the move to a storage stand at the other end of the facility. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been lifted by crane and technicians are preparing it for the move to a storage stand at the other end of the facility. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is being lifted by crane for the move to a storage stand at the other end of the facility. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. The second panel is being lifted by crane and technicians are monitoring the progress as it is being moved to join the first panel on the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
Grid Computing for Earth Science
NASA Astrophysics Data System (ADS)
Renard, Philippe; Badoux, Vincent; Petitdidier, Monique; Cossu, Roberto
2009-04-01
The fundamental challenges facing humankind at the beginning of the 21st century require an effective response to the massive changes that are putting increasing pressure on the environment and society. The worldwide Earth science community, with its mosaic of disciplines and players (academia, industry, national surveys, international organizations, and so forth), provides a scientific basis for addressing issues such as the development of new energy resources; a secure water supply; safe storage of nuclear waste; the analysis, modeling, and mitigation of climate changes; and the assessment of natural and industrial risks. In addition, the Earth science community provides short- and medium-term prediction of weather and natural hazards in real time, and model simulations of a host of phenomena relating to the Earth and its space environment. These capabilities require that the Earth science community utilize, both in real and remote time, massive amounts of data, which are usually distributed among many different organizations and data centers.
Russian Contract Procurement Document
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tobin, J G
2010-03-29
This contract supports the enhancement of physical protection or nuclear material control and accounting systems at institutes or enterprises of the newly independent states under the material protection control and accounting (MPC&A) program. The contract is entered into pursuant to the MPC&A Program, a gratuitous technical assistance program, in accordance with the bilateral Agreements between the Russian Federation and the United States of America concerning the Safe and Secure Transportation, Storage and Destruction of Weapons and the Prevention of Weapons Proliferation of June 1992, as extended and amended by Protocol signed of June 1999, Agreement between the Government of themore » Russian Federation regarding Cooperation in the Area of Nuclear Materials Physical Protection, Control and Accounting of October 1999 and the Russian Federation law of May 1999 on the taxation exemption of gratuitous technical assistance with Russian Federation under registration No.DOE001000.« less
Fimag: the United Kingdom disaster victim/forensic identification imaging system.
Rutty, Guy N; Robinson, Claire; Morgan, Bruno; Black, Sue; Adams, Catherine; Webster, Philip
2009-11-01
Imaging is an integral diagnostic tool in mass fatality investigations undertaken traditionally by plain X-rays, fluoroscopy, and dental radiography. However, little attention has been given to appropriate image reporting, secure data transfer and storage particularly in relation to the need to meet stringent judicial requirements. Notwithstanding these limitations, it is the risk associated with the safe handling and investigation of contaminated fatalities which is providing new challenges for mass fatality radiological imaging. Mobile multi-slice computed tomography is an alternative to these traditional modalities as it provides a greater diagnostic yield and an opportunity to address the requirements of the criminal justice system. We present a new national disaster victim/forensic identification imaging system--Fimag--which is applicable for both contaminated and non-contaminated mass fatality imaging and addresses the issues of judicial reporting. We suggest this system opens a new era in radiological diagnostics for mass fatalities.
Runyan, Carol W; Brooks-Russell, Ashley; Brandspigel, Sara; Betz, Marian; Tung, Gregory; Novins, Douglas; Agans, Robert
2017-11-01
To examine the extent to which law enforcement agencies (LEAs) and gun retailers are willing to offer voluntary, temporary storage as a part of an overall suicide prevention effort. We invited all LEAs and gun retailers in 8 US states to respond to questionnaires asking about their willingness to offer temporary gun storage and their recommendations to gun owners about safe storage. We collected data in 2016 from 448 LEAs and 95 retailers (response rates of 53% and 25%, respectively). Three quarters of LEAs (74.8%; 95% confidence interval [CI] = 72.1, 77.5) indicated they already provided temporary storage compared with 47.6% (95% CI = 39.2, 56.0) of retailers. LEAs were most willing to provide storage when a gun owner was concerned about the mental health of a family member. Retailers were more receptive than were LEAs to providing storage when visitors were coming or for people wanting storage while traveling. Both groups recommended locking devices within the home, but LEAs were slightly more favorable to storing guns away from the home. Law enforcement agencies and gun retailers are important resources for families concerned about suicide.
Geological conditions of safe long-term storage and disposal of depleted uranium hexafluoride
NASA Astrophysics Data System (ADS)
Laverov, N. P.; Velichkin, V. I.; Omel'Yanenko, B. I.; Yudintsev, S. V.; Tagirov, B. R.
2010-08-01
The production of enriched uranium used in nuclear weapons and fuel for atomic power plants is accompanied by the formation of depleted uranium (DU), the amount of which annually increases by 35-40 kt. To date, more than 1.6 Mt DU has accumulated in the world. The main DU mass is stored as environ-mentally hazardous uranium hexafluoride (UF6), which is highly volatile and soluble in water with the formation of hydrofluoric acid. To ensure safe UF6 storage, it is necessary to convert this compound in chemically stable phases. The industrial reprocessing of UF6 into U3O8 and HF implemented in France is highly expensive. We substantiate the expediency of long-term storage of depleted uranium hexafluoride in underground repositories localized in limestone. On the basis of geochemical data and thermodynamic calculations, we show that interaction in the steel container-UF6-limestone-groundwater system gives rise to the development of a slightly alkaline reductive medium favorable for chemical reaction with formation of uraninite (UO2) and fluorite (CaF2). The proposed engineering solution not only ensures safe DU storage but also makes it possible to produce uraninite, which can be utilized, if necessary, in fast-neutron reactors. In the course of further investigations aimed at safe maintenance of DU, it is necessary to study the kinetics of conversion of UF6 into stable phases, involving laboratory and field experiments.
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage
Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-01-01
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query. PMID:29652810
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.
Guo, Yeting; Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-04-13
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query.
WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING ...
WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING 3583), STORAGE BUILDING (BUILDING 3584)NIGHT AND SECURITY POLICE ENTRY CONTROL (BUILDING 3582)LEFT. VIEW TO NORTHEAST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
Development of an Automated Security Incident Reporting System (SIRS) for Bus Transit
DOT National Transportation Integrated Search
1986-12-01
The security incident reporting system (sirs) is a microcomputer-based software program demonstrated at the metropolitan transit commission (mtc) in Minneapolis, mn. Sirs is designed to provide convenient storage, update and retrieval of security inc...
Integrity and security in an Ada runtime environment
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.
Weinhardt, Lance S; Galvao, Loren W; Mwenyekonde, Thokozani; Grande, Katarina M; Stevens, Patricia; Yan, Alice F; Mkandawire-Valhmu, Lucy; Masanjala, Winford; Kibicho, Jennifer; Ngui, Emmanuel; Emer, Lindsay; Watkins, Susan C
2014-01-01
Poverty and lack of a predictable, stable source of food are two fundamental determinants of ill health, including HIV/AIDS. Conversely, episodes of poor health and death from HIV can disrupt the ability to maintain economic stability in affected households, especially those that rely on subsistence farming. However, little empirical research has examined if, and how, improvements in people's economic status and food security translate into changes in HIV vulnerability. In this paper, we describe in detail the methods and protocol of an academic-NGO collaboration on a quasi-experimental, longitudinal study of the mechanisms and magnitude of the impact of a multilevel economic and food security program (Support to Able-Bodied Vulnerable Groups to Achieve Food Security; SAFE), as implemented by CARE. Primary outcomes include HIV vulnerability (i.e., HIV risk behaviors, HIV infection), economic status (i.e., income, household assets) and food security (including anthropometric measures). We recruited participants from two types of areas of rural central Malawi: traditional authorities (TA) selected by CARE to receive the SAFE program (intervention group) and TAs receiving other unrelated CARE programming (controls). In the intervention TAs, we recruited 598 program participants (398 women, 200 men) and interviewed them at baseline and 18- and 36-month follow-ups; we interviewed 301 control households. In addition, we conducted random surveys (n = 1002) in the intervention and control areas with a 36-month assessment interval, prior to and after implementation of SAFE. Thus, we are examining intervention outcomes both in direct SAFE program participants and their larger communities. We are using multilevel modeling to examine mediators and moderators of the effects of SAFE on HIV outcomes at the individual and community levels and determine the ways in which changes in HIV outcomes feed back into economic outcomes and food security at later interviews. Finally, we are conducting a qualitative end-of-program evaluation consisting of in-depth interviews with 90 SAFE participants. In addition to examining pathways linking structural factors to HIV vulnerability, this research will yield important information for understanding the impact of a multilevel environmental/structural intervention on HIV, with the potential for other sustainable long-term public health benefits.
US Capitol Security - Our Nation's Capitol - A Safe Place for All?
DOT National Transportation Integrated Search
2000-08-01
This article describes the Volpe Centrer's role in developing a new security system for the US Capitol. The US Capitol Police turned to the Center because of our proven capabilities as security experts. We brought to the project: our knowledge of sec...
Hybrid Power Management-Based Vehicle Architecture
NASA Technical Reports Server (NTRS)
Eichenberg, Dennis J.
2011-01-01
Hybrid Power Management (HPM) is the integration of diverse, state-of-the-art power devices in an optimal configuration for space and terrestrial applications (s ee figure). The appropriate application and control of the various power devices significantly improves overall system performance and efficiency. The basic vehicle architecture consists of a primary power source, and possibly other power sources, that provides all power to a common energy storage system that is used to power the drive motors and vehicle accessory systems. This architecture also provides power as an emergency power system. Each component is independent, permitting it to be optimized for its intended purpose. The key element of HPM is the energy storage system. All generated power is sent to the energy storage system, and all loads derive their power from that system. This can significantly reduce the power requirement of the primary power source, while increasing the vehicle reliability. Ultracapacitors are ideal for an HPM-based energy storage system due to their exceptionally long cycle life, high reliability, high efficiency, high power density, and excellent low-temperature performance. Multiple power sources and multiple loads are easily incorporated into an HPM-based vehicle. A gas turbine is a good primary power source because of its high efficiency, high power density, long life, high reliability, and ability to operate on a wide range of fuels. An HPM controller maintains optimal control over each vehicle component. This flexible operating system can be applied to all vehicles to considerably improve vehicle efficiency, reliability, safety, security, and performance. The HPM-based vehicle architecture has many advantages over conventional vehicle architectures. Ultracapacitors have a much longer cycle life than batteries, which greatly improves system reliability, reduces life-of-system costs, and reduces environmental impact as ultracapacitors will probably never need to be replaced and disposed of. The environmentally safe ultracapacitor components reduce disposal concerns, and their recyclable nature reduces the environmental impact. High ultracapacitor power density provides high power during surges, and the ability to absorb high power during recharging. Ultracapacitors are extremely efficient in capturing recharging energy, are rugged, reliable, maintenance-free, have excellent lowtemperature characteristic, provide consistent performance over time, and promote safety as they can be left indefinitely in a safe, discharged state whereas batteries cannot.
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
Aqueous cathode for next-generation alkali-ion batteries.
Lu, Yuhao; Goodenough, John B; Kim, Youngsik
2011-04-20
The lithium-ion batteries that ushered in the wireless revolution rely on electrode strategies that are being stretched to power electric vehicles. Low-cost, safe electrical-energy storage that enables better use of alternative energy sources (e.g., wind, solar, and nuclear) requires an alternative strategy. We report a demonstration of the feasibility of a battery having a thin, solid alkali-ion electrolyte separating a water-soluble redox couple as the cathode and lithium or sodium in a nonaqueous electrolyte as the anode. The cell operates without a catalyst and has high storage efficiency. The possibility of a flow-through mode for the cathode allows flexibility of the cell design for safe, large-capacity electrical-energy storage at an acceptable cost.
30 CFR 57.4401 - Storage tank foundations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...
30 CFR 57.4401 - Storage tank foundations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
49 CFR 1280.6 - Storage of classified documents.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...
Constraints on the magnitude and rate of CO2 dissolution at Bravo Dome natural gas field
Sathaye, Kiran J.; Hesse, Marc A.; Cassidy, Martin; Stockli, Daniel F.
2014-01-01
The injection of carbon dioxide (CO2) captured at large point sources into deep saline aquifers can significantly reduce anthropogenic CO2 emissions from fossil fuels. Dissolution of the injected CO2 into the formation brine is a trapping mechanism that helps to ensure the long-term security of geological CO2 storage. We use thermochronology to estimate the timing of CO2 emplacement at Bravo Dome, a large natural CO2 field at a depth of 700 m in New Mexico. Together with estimates of the total mass loss from the field we present, to our knowledge, the first constraints on the magnitude, mechanisms, and rates of CO2 dissolution on millennial timescales. Apatite (U-Th)/He thermochronology records heating of the Bravo Dome reservoir due to the emplacement of hot volcanic gases 1.2–1.5 Ma. The CO2 accumulation is therefore significantly older than previous estimates of 10 ka, which demonstrates that safe long-term geological CO2 storage is possible. Integrating geophysical and geochemical data, we estimate that 1.3 Gt CO2 are currently stored at Bravo Dome, but that only 22% of the emplaced CO2 has dissolved into the brine over 1.2 My. Roughly 40% of the dissolution occurred during the emplacement. The CO2 dissolved after emplacement exceeds the amount expected from diffusion and provides field evidence for convective dissolution with a rate of 0.1 g/(m2y). The similarity between Bravo Dome and major US saline aquifers suggests that significant amounts of CO2 are likely to dissolve during injection at US storage sites, but that convective dissolution is unlikely to trap all injected CO2 on the 10-ky timescale typically considered for storage projects. PMID:25313084
How To Keep Your Schools Safe and Secure.
ERIC Educational Resources Information Center
Gilbert, Christopher B.
1996-01-01
Discusses unforeseen costs (including potential litigation expenses), benefits, and consequences of adopting security measures (such as metal detectors, drug dogs, security cameras, campus police, dress codes, crime watch programs, and communication devices) to counter on-campus violence and gang activity. High-tech gadgetry alone is insufficient.…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Requirements for cancellation....17Ad-19 Section 240.17Ad-19 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
1981-07-01
security measures to in- crease the survivability of these assets. However, sabotage, terrorism and vandalism continue to be serious threats to DCS and its...Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures
13 CFR 107.50 - Definition of terms.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., electric transmission systems, storage systems, and cyber security. (2) Installation and/or inspection... distribution systems, electric transmission systems, or grid cyber security. (3) Auditing or consulting...
13 CFR 107.50 - Definition of terms.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., electric transmission systems, storage systems, and cyber security. (2) Installation and/or inspection... distribution systems, electric transmission systems, or grid cyber security. (3) Auditing or consulting...
Unconditional security from noisy quantum storage
NASA Astrophysics Data System (ADS)
Wehner, Stephanie
2010-03-01
We consider the implementation of two-party cryptographic primitives based on the sole physical assumption that no large-scale reliable quantum storage is available to the cheating party. An important example of such a task is secure identification. Here, Alice wants to identify herself to Bob (possibly an ATM machine) without revealing her password. More generally, Alice and Bob wish to solve problems where Alice holds an input x (e.g. her password), and Bob holds an input y (e.g. the password an honest Alice should possess), and they want to obtain the value of some function f(x,y) (e.g. the equality function). Security means that the legitimate users should not learn anything beyond this specification. That is, Alice should not learn anything about y and Bob should not learn anything about x, other than what they may be able to infer from the value of f(x,y). We show that any such problem can be solved securely in the noisy-storage model by constructing protocols for bit commitment and oblivious transfer, where we prove security against the most general attack. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties. Our work raises a large number of immediate theoretical as well as experimental questions related to many aspects of quantum information science, such as for example understanding the information carrying properties of quantum channels and memories, randomness extraction, min-entropy sampling, as well as constructing small handheld devices which are suitable for the task of secure identification. [4pt] Full version available at arXiv:0906.1030 (theoretical) and arXiv:0911.2302 (practically oriented).
30 CFR 56.4401 - Storage tank foundations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...
30 CFR 56.4401 - Storage tank foundations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...
33 CFR 127.313 - Bulk storage.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...
33 CFR 127.313 - Bulk storage.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...
33 CFR 127.313 - Bulk storage.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...
33 CFR 127.313 - Bulk storage.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...
33 CFR 127.313 - Bulk storage.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...
30 CFR 77.1103 - Flammable liquids; storage.
Code of Federal Regulations, 2010 CFR
2010-07-01
... storage tanks shall be mounted securely on firm foundations. Outlet piping shall be provided with flexible connections or other special fittings to prevent adverse effects from tank settling. (c) Fuel lines shall be... hazards. (d) Areas surrounding flammable-liquid storage tanks and electric substations and transformers...
Changing Homeland Security: The Year in Review - 2008
2009-01-01
new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar
Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.
Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y
2010-05-01
A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.
Comparison of two closed carriers for vitrification of human blastocysts in a donor program.
Guerrero, Jaime; Gallardo, Miguel; Rodríguez-Arnedo, Adoración; Ten, Jorgen; Bernabeu, Rafael
2018-04-01
The survival of human blastocysts to vitrification with two different carriers is compared. Both vitrification carriers used in this study are in the category of closed carriers, as they completely isolate the samples from direct contact with liquid nitrogen or its vapours during cooling and storage, until warming. This characteristic is appealing because it reduces or eliminates the theoretical risk of cross-contamination during that period of time. The two closed vitrification systems used present very different design and features: in the High Security Vitrification device, the carrier straw containing the embryos is encapsulated inside an external straw before plunging in liquid nitrogen, resulting in thermal insulation during cooling. On the other hand, in the SafeSpeed carrier embryos are loaded in a thin-walled, narrow capillary designed to maximize the thermal transference. Both closed carriers achieved comparable outcomes in terms of survival of blastocysts to the vitrification process, with 97.5% vs. 96.1% survival with HSV and SafeSpeed, respectively. In conclusion, the cooling and warming rates at which these carriers operate, in combination with the cytosolic solute concentration in the cells of the cryopreserved blastocysts attained after a cryoprotectant-loading protocol, result in successful vitrification of human blastocysts for human assisted reproduction. Copyright © 2018. Published by Elsevier Inc.
B. Loth; R.P. Karrfalt
2017-01-01
The U.S. Department of Agriculture Forest Service (USDA FS) National Seed Laboratory (NSL) began long term seed storage for genetic conservation, in 2005, for USDA FS units and cooperators. This program requires secure storage of both seeds and the data documenting the identification of the seeds. The Agricultural Research Service (ARS) has provided both of these...
Information security : is your information safe?
DOT National Transportation Integrated Search
1999-01-01
This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
Student Perceptions of High-Security School Environments
ERIC Educational Resources Information Center
Bracy, Nicole L.
2011-01-01
Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…
77 FR 25721 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-01
... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...
Safe Schools Survey: Post-Secondary Survey Results.
ERIC Educational Resources Information Center
Mowery, Andrea
This report provides the results of a survey of safety and security at colleges and universities in Minnesota, along with policy recommendations to improve safety and security at Minnesota post-secondary institutions. It is based on campus security reports voluntarily submitted by 60 of the 110 Minnesota post-secondary institutions, personal…
How to Be Safe and Secure against School Vandalism.
ERIC Educational Resources Information Center
Stover, Del
1990-01-01
During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
75 FR 6000 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-05
... storage media. RETRIEVABILITY: Records are retrieved by the user's name, Social Security Number, or... amended. DATES: This proposed action will be effective without further notice on March 8, 2010, unless....'' STORAGE: Delete entry and replace with ``Paper in file folders and electronic storage media...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...
46 CFR 193.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 193.15-20 Carbon dioxide storage. (a...
33 CFR 127.1313 - Storage of hazardous materials.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...
33 CFR 127.1313 - Storage of hazardous materials.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...
33 CFR 127.1313 - Storage of hazardous materials.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...
33 CFR 127.1313 - Storage of hazardous materials.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...
33 CFR 127.1313 - Storage of hazardous materials.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...
46 CFR 193.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 193.15-20 Carbon dioxide storage. (a...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Temporary storage of spent fuel after cessation of reactor... Procedures § 51.23 Temporary storage of spent fuel after cessation of reactor operation—generic determination... necessary, spent fuel generated in any reactor can be stored safely and without significant environmental...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Temporary storage of spent fuel after cessation of reactor... Procedures § 51.23 Temporary storage of spent fuel after cessation of reactor operation—generic determination... necessary, spent fuel generated in any reactor can be stored safely and without significant environmental...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schruder, Kristan; Goodwin, Derek
2013-07-01
AECL's Fuel Packaging and Storage (FPS) Project was initiated in 2004 to retrieve, transfer, and stabilize an identified inventory of degraded research reactor fuel that had been emplaced within in-ground 'Tile Hole' structures in Chalk River Laboratories' Waste Management Area in the 1950's and 60's. Ongoing monitoring of the legacy fuel storage conditions had identified that moisture present in the storage structures had contributed to corrosion of both the fuel and the storage containers. This prompted the initiation of the FPS Project which has as its objective to design, construct, and commission equipment and systems that would allow for themore » ongoing safe storage of this fuel until a final long-term management, or disposition, pathway was available. The FPS Project provides systems and technologies to retrieve and transfer the fuel from the Waste Management Area to a new facility that will repackage, dry, safely store and monitor the fuel for a period of 50 years. All equipment and the new storage facility are designed and constructed to meet the requirements for Class 1 Nuclear Facilities in Canada. (authors)« less
Environmental analysis Waste Isolation Pilot Plant (WIPP) cost reduction proposals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The Waste Isolation Pilot Plant (WIPP) is a research and development facility to demonstrate the safe disposal of radioactive wastes resulting from the defense activities and programs of the United States government. The facility is planned to be developed in bedded salt at the Los Medanos site in southeastern New Mexico. The environmental consequences of contruction and operation of the WIPP facility are documented in ''Final Environmental Impact Statement, Waste Isolation Pilot Plant''. The proposed action addressed by this environmental analysis is to simplify and reduce the scope of the WIPP facility as it is currently designed. The proposed changesmore » to the existing WIPP design are: limit the waste storage rate to 500,000 cubic feet per year; eliminate one shaft and revise the underground ventilation system; eliminate the underground conveyor system; combine the Administration Building, the Underground Personnel Building and the Waste Handling Building office area; simplify the central monitoring system; simplify the security control systems; modify the Waste Handling Building; simplify the storage exhaust system; modify the above ground salt handling logistics; simplify the power system; reduce overall site features; simplify the Warehouse/Shops Building and eliminate the Vehicle Maintenance Building; and allow resource recovery in Control Zone IV.« less
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-06-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
Aerial surveillance vehicles augment security at shipping ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Muhammad K.; Cheng, Samuel; Sluss, James J., Jr.; Landers, Thomas L.
2008-10-01
With the ever present threat to commerce, both politically and economically, technological innovations provide a means to secure the transportation infrastructure that will allow efficient and uninterrupted freight-flow operations for trade. Currently, freight coming into United States ports is "spot checked" upon arrival and stored in a container yard while awaiting the next mode of transportation. For the most part, only fences and security patrols protect these container storage yards. To augment these measures, the authors propose the use of aerial surveillance vehicles equipped with video cameras and wireless video downlinks to provide a birds-eye view of port facilities to security control centers and security patrols on the ground. The initial investigation described in this paper demonstrates the use of unmanned aerial surveillance vehicles as a viable method for providing video surveillance of container storage yards. This research provides the foundation for a follow-on project to use autonomous aerial surveillance vehicles coordinated with autonomous ground surveillance vehicles for enhanced port security applications.
Reversible capture and release of Cl 2 and Br 2 with a redox-active metal–organic framework
Tulchinsky, Yuri; Hendon, Christopher H.; Lomachenko, Kirill A.; ...
2017-03-28
Extreme toxicity, corrosiveness, and volatility pose serious challenges for the safe storage and transportation of elemental chlorine and bromine, which play critical roles in the chemical industry. Solid materials capable of forming stable nonvolatile compounds upon reaction with elemental halogens may partially mitigate these challenges by allowing safe halogen release on demand. Here we demonstrate that elemental halogens quantitatively oxidize coordinatively unsaturated Co(II) ions in a robust azolate metal-organic framework (MOF) to produce stable and safe-to-handle Co(III) materials featuring terminal Co(III)-halogen bonds. Thermal treatment of the oxidized MOF causes homolytic cleavage of the Co(III)-halogen bonds, reduction to Co(II), and concomitantmore » release of elemental halogens. The reversible chemical storage and thermal release of elemental halogens occur with no significant losses of structural integrity, as the parent cobaltous MOF retains its crystallinity and porosity even after three oxidation/reduction cycles. Finally, these results highlight a material operating via redox mechanism that may find utility in the storage and capture of other noxious and corrosive gases.« less
Progress and future direction for the interim safe storage and disposal of Hanford high-level waste
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kinzer, J.E.; Wodrich, D.D.; Bacon, R.F.
This paper describes the progress made at the largest environmental cleanup program in the United States. Substantial advances in methods to start interim safe storage of Hanford Site high-level wastes, waste characterization to support both safety- and disposal-related information needs, and proceeding with cost-effective disposal by the U.S. Department of Energy (DOE) and its Hanford Site contractors, have been realized. Challenges facing the Tank Waste Remediation System (TWRS) Program, which is charged with the dual and parallel missions of interim safe storage and disposal of the high-level tank waste stored at the Hanford Site, are described. In these times ofmore » budget austerity, implementing an ongoing program that combines technical excellence and cost effectiveness is the near-term challenge. The technical initiatives and progress described in this paper are made more cost effective by DOE`s focus on work force productivity improvement, reduction of overhead costs, and reduction, integration and simplification of DOE regulations and operations requirements to more closely model those used in the private sector.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marvy, A.; Lioure, A; Heriard-Dubreuil, G.
2003-02-24
As part of the work scope set in the French law on high level long lived waste R&D passed in 1991, CEA is conducting a research program to establish the scientific basis and assess the feasibility of long term storage as an option for the safe management of nuclear waste for periods as long as centuries. This goal is a significant departure from the current industrial practice where storage facilities are usually built to last only a few decades. From a technical viewpoint such an extension in time seems feasible provided care and maintenance is exercised. Considering such long periodsmore » of time, the risk for Society of loosing oversight and control of such a facility is real, which triggers the question of whether and how long term storage safety can be actually achieved. Therefore CEA commissioned a study (1) in which MUTADIS Consultants (2) and CEPN (3) were both involved. The case study looks into several past and actual human enterprises conducted over significant periods o f time, one of them dating back to the end of the 18th century, and all identified out of the nuclear field. Then-prevailing societal behavior and organizational structures are screened out to show how they were or are still able to cope with similar oversight and control goals. As a result, the study group formulated a set of performance criteria relating to issues like responsibility, securing funds, legal and legislative implications, economic sustainable development, all being areas which are not traditionally considered as far as technical studies are concerned. These criteria can be most useful from the design stage onward, first in an attempt to define the facility construction and operating guiding principles, and thereafter to substantiate the safety case for long term storage and get geared to the public dialogue on that undertaking should it become a reality.« less
Energy Storage Systems Are Coming: Are You Ready
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conover, David R.
2015-12-05
Energy storage systems (batteries) are not a new concept, but the technology being developed and introduced today with an increasing emphasis on energy storage, is new. The increased focus on energy, environmental and economic issues in the built environment is spurring increased application of renewables as well as reduction in peak energy use - both of which create a need for energy storage. This article provides an overview of current and anticipated energy storage technology, focusing on ensuring the safe application and use of energy storage on both the grid and customer side of the utility meter.
Waste water compliance: staying on the offense
USDA-ARS?s Scientific Manuscript database
Cattlemen and regulators are interested in safe and effective environmental stewardship of beef production. Recent interest has focused on better management of runoff storage. Typically, storage ponds hold feedlot surface runoff until it can be applied to crops. While stored, the nutrient laden w...
ERIC Educational Resources Information Center
Johnson, Betty D.
1996-01-01
Describes how the library staff at Stetson University in central Florida coped with flooding. Offers recommendations on storage; carpeting; fans and humidifiers; emergency phone contacts; labeled keys; protective coverings for books; safe storage for "disaster" materials and equipment; removal of less valuable materials; sandbags;…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-25
... Specification (TS) Surveillance Requirement 3.1.6.1 to verify the operability of the concrete cask heat removal....6.1 to verify the operability of the concrete cask heat removal system to maintain safe storage...
10 CFR 1016.21 - Protection of Restricted Data in storage.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...
77 FR 30332 - Mr. James Chaisson; Order Prohibiting Involvement in NRC-Licensed Activities
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-22
...) deliberately failed to implement NRC security requirements for the use, storage, and protection of licensed... requirements pertaining to the use, storage, and protection of licensed material. He periodically stored the... Radioactive Material License, which required TGR to limit the storage of radioactive material approved on the...
10 CFR 1016.21 - Protection of Restricted Data in storage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...
10 CFR 1016.21 - Protection of Restricted Data in storage.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...
46 CFR 193.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... storage. (a) Except as provided in paragraph (b) of this section, the cylinders shall be located outside...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...
46 CFR 76.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 3 2013-10-01 2013-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...
46 CFR 95.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a...
46 CFR 193.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... storage. (a) Except as provided in paragraph (b) of this section, the cylinders shall be located outside...
46 CFR 76.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 3 2011-10-01 2011-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...
46 CFR 95.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...
46 CFR 76.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 3 2012-10-01 2012-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...
46 CFR 95.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...
46 CFR 76.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 3 2014-10-01 2014-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...
10 CFR 1016.21 - Protection of Restricted Data in storage.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...
10 CFR 1016.21 - Protection of Restricted Data in storage.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...
System and method for key generation in security tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.
Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).
Irrigation infrastructure and water appropriation rules for food security
NASA Astrophysics Data System (ADS)
Gohar, Abdelaziz A.; Amer, Saud A.; Ward, Frank A.
2015-01-01
In the developing world's irrigated areas, water management and planning is often motivated by the need for lasting food security. Two important policy measures to address this need are improving the flexibility of water appropriation rules and developing irrigation storage infrastructure. Little research to date has investigated the performance of these two policy measures in a single analysis while maintaining a basin wide water balance. This paper examines impacts of storage capacity and water appropriation rules on total economic welfare in irrigated agriculture, while maintaining a water balance. The application is to a river basin in northern Afghanistan. A constrained optimization framework is developed to examine economic consequences on food security and farm income resulting from each policy measure. Results show that significant improvements in both policy aims can be achieved through expanding existing storage capacity to capture up to 150 percent of long-term average annual water supplies when added capacity is combined with either a proportional sharing of water shortages or unrestricted water trading. An important contribution of the paper is to show how the benefits of storage and a changed water appropriation system operate under a variable climate. Results show that the hardship of droughts can be substantially lessened, with the largest rewards taking place in the most difficult periods. Findings provide a comprehensive framework for addressing future water scarcity, rural livelihoods, and food security in the developing world's irrigated regions.
Washetine, Kevin; Kara-Borni, Mehdi; Heeke, Simon; Bonnetaud, Christelle; Félix, Jean-Marc; Ribeyre, Lydia; Bence, Coraline; Ilié, Marius; Bordone, Olivier; Pedro, Marine; Maitre, Priscilla; Tanga, Virginie; Gormally, Emmanuelle; Mossuz, Pascal; Lorimier, Philippe; Marquette, Charles Hugo; Mouroux, Jérôme; Cohen, Charlotte; Lassalle, Sandra; Long-Mira, Elodie; Clément, Bruno; Dagher, Georges; Hofman, Véronique; Hofman, Paul
2018-06-11
Collected specimens for research purposes may or may not be made available depending on their scarcity and/or on the project needs. Their protection against degradation or in the event of an incident is pivotal. Duplication and storage on a different site is the best way to assure their sustainability. The conservation of samples at room temperature (RT) by duplication can facilitate their protection. We describe a security system for the collection of non-small cell lung cancers (NSCLC) stored in the biobank of the Nice Hospital Center, France, by duplication and conservation of lyophilized (dried), encapsulated DNA kept at RT. Therefore, three frozen tissue collections from non-smoking, early stage and sarcomatoid carcinoma NSCLC patients were selected for this study. DNA was extracted, lyophilized and encapsulated at RT under anoxic conditions using the DNAshell technology. In total, 1974 samples from 987 patients were encapsulated. Six and two capsules from each sample were stored in the biobanks of the Nice and Grenoble (France) Hospitals, respectively. In conclusion, DNA maintained at RT allows for the conservation, duplication and durability of collections of interest stored in biobanks. This is a low-cost and safe technology that requires a limited amount of space and has a low environmental impact.
78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...
77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-28
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...
1989-12-26
unauthorized storage (storage of material in a non-storage area), storage of a hazardous material in a storage area which was not designed for such a... hazard , e.g., storing flammable liquid in a non- sprinklered storeroom, and excessive amounts of material in a storage area. Applicable Reports: JAGs 6460...have been secured (locked) because of hazardous contents (e.g., flammable liquids, ordnance)but were not for various reasons presented an opportunity for
Sznitman, Sharon R; Goldberg, Victoria; Sheinman-Yuffe, Hedva; Flechter, Ezequiel; Bar-Sela, Gil
2016-11-15
Increasingly more jurisdictions worldwide are legalizing medical cannabis. Major concerns related to such policies are that improper storage and disposal arrangements may lead to the diversion and unintentional digestion of cannabis. These concerns are particularly acute among patients with cancer because they take home medical cannabis for extended periods and have high rates of treatment termination and mortality shortly after the onset of treatment with medical cannabis. Therefore, leftover cannabis is potentially particularly prevalent, and potentially improperly stored, in households of current and deceased patients with cancer. The current study investigated the risk of medical cannabis diversion and unintentional digestion among oncology patients treated with medical cannabis and caregivers of recently deceased patients who were treated with medical cannabis. A total of 123 oncology patients treated with medical cannabis and 37 caregivers of deceased oncology patients treated with medical cannabis were interviewed regarding practices and the information received concerning the safe storage and disposal of medical cannabis, as well as experiences of theft, diversion, and unintentional digestion. High rates of suboptimal storage were reported and caregivers were found to be particularly unlikely to have received information regarding the safe storage and disposal of medical cannabis. Few incidences of theft, diversion, and unintentional digestion were reported. Oncologists and other health care providers have an important, yet unfilled, role to play with regard to educating patients and caregivers of the importance of the safe storage and disposal of medical cannabis. Interventions designed to alert patients treated with medical cannabis and their caregivers to the problem of diversion, along with strategies to limit it, have the potential to limit diversion and unintentional exposure to medical cannabis. Cancer 2016;122:3363-3370. © 2016 American Cancer Society. © 2016 American Cancer Society.
Why Do Parents with Toddlers Store Poisonous Products Safely?
Beirens, Tinneke M. J.; van Beeck, Eduard F.; Brug, Johannes; den Hertog, Paul; Raat, Hein
2010-01-01
Unintentional poisoning is a major cause of nonfatal injuries in children aged 0–24 months. Associations between self-reported habits on the child safe storage of medication and cleaning products and family, and psychosocial factors were assessed, using a model based on the Protection Motivation Theory. By identifying correlates of safety behavior in this manner, more insight in factors which influence this behavior is obtained. Health promotion activities in order to promote safety behavior should address these factors in order to increase the effectiveness of the health message. Data were gathered from a cross-sectional survey using self-administered questionnaires, mailed to a population sample of 2470 parents with toddlers. The results indicate that the promotion of safe storage of medication and cleaning products should address the family situation, personal cognitive factors as well as social factors. Interventions should particularly focus on parents' self-efficacy of storing poisonous products in a child safe manner and on the vulnerability of their child in their home concerning an unintentional poisoning incident. PMID:20671943
29 CFR 1910.176 - Handling materials-general.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... (b) Secure storage. Storage of material shall not create a hazard. Bags, containers, bundles, etc... on spur railroad tracks where a rolling car could contact other cars being worked, enter a building...
29 CFR 1910.176 - Handling materials-general.
Code of Federal Regulations, 2011 CFR
2011-07-01
.... (b) Secure storage. Storage of material shall not create a hazard. Bags, containers, bundles, etc... on spur railroad tracks where a rolling car could contact other cars being worked, enter a building...
29 CFR 1910.176 - Handling materials-general.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... (b) Secure storage. Storage of material shall not create a hazard. Bags, containers, bundles, etc... on spur railroad tracks where a rolling car could contact other cars being worked, enter a building...
29 CFR 1910.176 - Handling materials-general.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... (b) Secure storage. Storage of material shall not create a hazard. Bags, containers, bundles, etc... on spur railroad tracks where a rolling car could contact other cars being worked, enter a building...
29 CFR 1910.176 - Handling materials-general.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... (b) Secure storage. Storage of material shall not create a hazard. Bags, containers, bundles, etc... on spur railroad tracks where a rolling car could contact other cars being worked, enter a building...
Practical School Security: Basic Guidelines for Safe and Secure Schools.
ERIC Educational Resources Information Center
Trump, Kenneth S.
This book is written primarily for elementary and secondary school administrators and teachers, but college faculty involved in providing teacher or administrator education would also benefit from the practical approach to issues of school security. Chapters 1 through 3 establish a framework for dealing with the myths and realities of school…
The Handbook for Campus Safety and Security Reporting. 2016 Edition
ERIC Educational Resources Information Center
US Department of Education, 2016
2016-01-01
Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…
Secure, safe, and sensitive solutions.
Hughan, Tina
2012-04-01
Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend.
Gleeson, John F; Lederman, Reeva; Wadley, Greg; Bendall, Sarah; McGorry, Patrick D; Alvarez-Jimenez, Mario
2014-04-01
Internet-based treatments for early psychosis offer considerable promise, but safety and security need to be established. This study pilot tested Horyzons, a novel online treatment application that integrates purpose-built moderated social networking with psychoeducation for recovery from early psychosis. Safety, privacy, and security were evaluated during a one-month single-group trial with 20 young consumers recovering from early psychosis who were recruited in Melbourne, Australia. Known clinical risk factors informed the safety protocol. Safety, privacy, and security were evaluated with respect to relapse and self-harm, users' perceptions of safety and privacy, and activity using Horyzons. No clinical or security problems with use of Horyzons were noted. Participants described feeling safe and trusting Horyzons. Private moderated online social networking combined with psychoeducation was a safe and secure therapeutic environment for consumers recovering from a first episode of psychosis. Testing the intervention in a randomized controlled trial is warranted.
Policies | High-Performance Computing | NREL
Use Learn about policy governing user accountability, resource use, use by foreign nationals states. Data Security Learn about the data security policy, including data protection, data security retention policy, including project-centric and user-centric data. Shared Storage Usage Learn about a policy
41 CFR 109-38.202-50 - Security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...
41 CFR 109-38.202-50 - Security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...
41 CFR 109-38.202-50 - Security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...
41 CFR 109-38.202-50 - Security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...
75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...
Sentinel 2 MMFU: The first European Mass Memory System Based on NAND-Flash Storage Technology
NASA Astrophysics Data System (ADS)
Staehle, M.; Cassel, M.; Lonsdorfer, U.; Gliem, F.; Walter, D.; Fichna, T.
2011-08-01
Sentinel-2 is the multispectral optical mission of the EU-ESA GMES (Global Monitoring for Environment and Security) program, currently under development by Astrium-GmbH in Friedrichshafen (Germany) for a launch in 2013. The mission features a 490 Mbit/s optical sensor operating at high duty cycles, requiring in turn a large 2.4 Tbit on-board storage capacity.The required storage capacity motivated the selection of the NAND-Flash technology which was already secured by a lengthy period (2004-2009) of detailed testing, analysis and qualification by Astrium GmbH, IDA and ESTEC. The mass memory system is currently being realized by Astrium GmbH.
Ensuring the security and availability of a hospital wireless LAN system.
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-01-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
Caruso, Ronald D
2004-01-01
Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brasser, Thomas; Hertes, Uwe; Meyer, Thorsten
2013-07-01
Within the scope of 'Nuclear Security of Radioactive Sources', the German government implemented the modernization of Ukrainian State Production Company's transport and storage facility for radioactive sources (TSF) in Kiev. The overall management of optimizing the physical protection of the storage facility (including the construction of a hot cell for handling the radioactive sources) is currently carried out by the German Federal Foreign Office (AA). AA jointly have assigned Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, Germany's leading expert institution in the area of nuclear safety and waste management, to implement the project and to ensure transparency by financial andmore » technical monitoring. Sealed radioactive sources are widely used in industry, medicine and research. Their life cycle starts with the production and finally ends with the interim/long-term storage of the disused sources. In Ukraine, IZOTOP is responsible for all radioactive sources throughout their life cycle. IZOTOP's transport and storage facility (TSF) is the only Ukrainian storage facility for factory-fresh radioactive sources up to an activity of about 1 million Ci (3.7 1016 Bq). The TSF is specially designed for the storage and handling of radioactive sources. Storage began in 1968, and is licensed by the Ukrainian state authorities. Beside the outdated state of TSF's physical protection and the vulnerability of the facility linked with it, the lack of a hot cell for handling and repacking radioactive sources on the site itself represents an additional potential hazard. The project, financed by the German Federal Foreign Office, aims to significantly improve the security of radioactive sources during their storage and handling at the TSF site. Main tasks of the project are a) the modernization of the physical protection of the TSF itself in order to prevent any unauthorized access to radioactive sources as well as b) the construction of a hot cell to reduce the number of transports of radioactive sources within the city of Kiev. In future, the new established hot cell at IZOTOP's transport and storage facility will be useful for identification and characterization of orphan/disused radioactive sources. The projects implemented are performed in accordance with international recommendations (e. g. IAEA) and national normative documents and will make a crucial contribution towards an improved safety and security management of radioactive sources in Ukraine. (authors)« less
Safe and Secure Virtualization: Answers for IMA next Generation and Beyond
NASA Astrophysics Data System (ADS)
Almeida, Jose; Vatrinet, Francis
2010-08-01
This paper presents some of the challenges the aerospace industry is facing for the future and explains why and how a safe and secured virtualization technology can help solving these challenges Efforts around the next generation of IMA have already started, like the European FP7 funded project SCARLETT or the IDEE5 project and many avionics players and working groupware focused on how the new technologies like SMP capabilities introduced in latest CPU architectures, can help increasing system performances in future avionics system. We present PikeOS, a separation micro-kernel, which applies the state-of-the-art techniques and widely recognized standards such as ARINC 653 and MILS in order to guarantee safety and security properties, and still improve overall performance.
SPIDERS Bi-Directional Charging Station Interconnection Testing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, M.
2013-09-01
The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) program is a multi-year Department of Defense-Department of Energy (DOE) collaborative effort that will demonstrate integration of renewables into island-able microgrids using on-site generation control, demand response, and energy storage with robust security features at multiple installations. Fort Carson, Colorado, will be the initial development and demonstration site for use of plug-in electric vehicles as energy storage (also known as vehicle-to-grid or V2G).
1984-07-01
34. - . . ’-... " " " ". ’ UNCLASSIFIED SECURITY CLASSIFICATION OF T0IS PAGE (lhen Det £ntered) REPORT DOCUMENTATION PAGE READ INSTRUCTIONS...RUMERODF PAGES 267 14 MONITORING AGENCY NAME & ADDRESS(II dillerent from Controllind Office) IS. SECURITY CLASS. (o this report) UNCLASSIFIED ISa...lower storage level. This is the basis for the mapping of the PIL3 read operation and workloads into a queueing netowrk model. S PAGE 135 REFERENCE
Encrypted holographic data storage based on orthogonal-phase-code multiplexing.
Heanue, J F; Bashaw, M C; Hesselink, L
1995-09-10
We describe an encrypted holographic data-storage system that combines orthogonal-phase-code multiplexing with a random-phase key. The system offers the security advantages of random-phase coding but retains the low cross-talk performance and the minimum code storage requirements typical in an orthogonal-phase-code-multiplexing system.
46 CFR 193.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide and Clean Agent Extinguishing Systems, Details § 193.15-20 Carbon dioxide storage. (a) Except as provided in...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...
18 CFR 3a.61 - Storage and custody of classified information.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...
18 CFR 3a.61 - Storage and custody of classified information.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...
18 CFR 3a.61 - Storage and custody of classified information.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...
18 CFR 3a.61 - Storage and custody of classified information.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...
To ensure secure gun storage and gun safety devices.
Rep. Jackson Lee, Sheila [D-TX-18
2013-07-11
House - 09/13/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee.
During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…
Monolithic natural gas storage delivery system based on sorbents
Hornbostel, Marc; Krishnan, Gopala N.; Sanjurjo, Angel
2016-09-27
The invention provides methods for producing a strong, light, sorbent-based storage/dispenser system for gases and fuels. The system comprises a porous monolithic material with an adherent strong impervious skin that is capable of storing a gas under pressure in a safe and usable manner.
Storage of nuclear materials by encapsulation in fullerenes
Coppa, Nicholas V.
1994-01-01
A method of encapsulating radioactive materials inside fullerenes for stable long-term storage. Fullerenes provide a safe and efficient means of disposing of nuclear waste which is extremely stable with respect to the environment. After encapsulation, a radioactive ion is essentially chemically isolated from its external environment.
76 FR 5120 - Highway-Rail Grade Crossing; Safe Clearance
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... driver from entering onto a highway-rail grade crossing unless there is sufficient space to drive... crossing unless there is sufficient space to drive completely through the grade crossing without stopping... as the ``clear storage distance.'' \\1\\ Chapter 8 guidance material also refers to ``storage space...
Flywheel Rotor Safe-Life Technology
NASA Technical Reports Server (NTRS)
Ratner, J. K. H.; Chang, J. B.; Christopher, D. A.; McLallin, Kerry L. (Technical Monitor)
2002-01-01
Since the 1960s, research has been conducted into the use of flywheels as energy storage systems. The-proposed applications include energy storage for hybrid and electric automobiles, attitude control and energy storage for satellites, and uninterruptible power supplies for hospitals and computer centers. For many years, however, the use of flywheels for space applications was restricted by the total weight of a system employing a metal rotor. With recent technological advances in the manufacturing of composite materials, however, lightweight composite rotors have begun to be proposed for such applications. Flywheels with composite rotors provide much higher power and energy storage capabilities than conventional chemical batteries. However, the failure of a high speed flywheel rotor could be a catastrophic event. For this reason, flywheel rotors are classified by the NASA Fracture Control Requirements Standard as fracture critical parts. Currently, there is no industry standard to certify a composite rotor for safe and reliable operation forth( required lifetime of the flywheel. Technical problems hindering the development of this standard include composite manufacturing inconsistencies, insufficient nondestructive evaluation (NDE) techniques for detecting defects and/or impact damage, lack of standard material test methods for characterizing composite rotor design allowables, and no unified proof (over-spin) test for flight rotors. As part of a flywheel rotor safe-life certification pro-ram funded b the government, a review of the state of the art in composite rotors is in progress. The goal of the review is to provide a clear picture of composite flywheel rotor technologies. The literature review has concentrated on the following topics concerning composites and composite rotors: durability (fatigue) and damage tolerance (safe-life) analysis/test methods, in-service NDE and health monitoring techniques, spin test methods/ procedures, and containment options. This report presents the papers selected for their relevance to this topic and summarizes them.
To advance the science and engineering of decontaminating pipe systems and safely disposing of high-volumes of contaminated water, Agency homeland security researchers are developing a Water Security Test Bed (WSTB).
Developing useful transit-related crime and incident data
DOT National Transportation Integrated Search
2000-04-01
Transit agencies have an obligation to provide a reasonably safe and secure system for their patrons and employees. Transit management must make decisions regarding the best use of police, security personnel, and other resources to reduce crime and i...
Radiotoxicity and decay heat power of spent nuclear fuel of VVER type reactors at long-term storage.
Bergelson, B R; Gerasimov, A S; Tikhomirov, G V
2005-01-01
Radiotoxicity and decay heat power of the spent nuclear fuel of VVER-1000 type reactors are calculated during storage time up to 300,000 y. Decay heat power of radioactive waste (radwaste) determines parameters of the heat removal system for the safe storage of spent nuclear fuel. Radiotoxicity determines the radiological hazard of radwaste after its leakage and penetration into the environment.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
RBC Storage Effect on Coagulation, Microparticles and Microchimerism in Critically Ill Patients
2015-03-01
Award Number: W81XWH-11-2-0028 TITLE: “RBC Storage Effect on Coagulation, Microparticles and Microchimerism in Critically Ill Patients...27 DEC 2010 - 26 DEC 2015 – 4. TITLE AND SUBTITLE "“RBC Storage Effect on Coagulation, Microparticles and 5a. CONTRACT NUMBER Microchimerism in...15. SUBJECT TERMS RBC storage age; microchimerism; critically ill patients; coagulation; microparticles 16. SECURITY CLASSIFICATION OF: U 17
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Municipal Mortgage & Equity LLC, Prolink Holdings Corp., RPM Technologies, Inc., SARS Corp., Secured Digital Storage Corp., Siboney Corp., SiriCOMM... securities of SARS Corp. because it has not filed any periodic reports since the period ended June 30, 2008...
41 CFR 109-38.202-50 - Security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Security. 109-38.202-50....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area with restricted access to prevent possible fraud or misuse. Tags which are damaged or unusable will be...
77 FR 13574 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-07
... electronic storage media. Retrievability: Individual's name and last four of Social Security Number (SSN... commuting to and from work. Categories of records in the system: Name, last four of Social Security Number... contain the full name of the individual and last four of Social Security Number (SSN). The system manager...
An Automated Sample Divider for Farmers Stock Peanuts
USDA-ARS?s Scientific Manuscript database
In-shell peanuts are harvested, loaded into drying trailers, and delivered to a central facility where they are dried to a moisture content safe for long term storage, sampled, graded, then unloaded into bulk storage. Drying trailers have capacities ranging from five to twenty-five tons of dry farme...
An automated sample divider for farmers stock peanuts
USDA-ARS?s Scientific Manuscript database
In-shell peanuts are harvested, loaded into drying trailers, and delivered to a central facility where they are dried to a moisture content safe for long term storage, sampled, graded, then unloaded into bulk storage. Drying trailers have capacities ranging from five to twenty-five tons of dry farme...
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.
Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang
2017-06-17
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs
Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang
2017-01-01
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12–1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15–1.26 times the storage utilization efficiency compared with other schemes. PMID:28629135
Hansky, Bert; Vogt, Juergen; Gueldner, Holger; Schulte-Eistrup, Sebastian; Lamp, Barbara; Heintze, Johannes; Horstkotte, Dieter; Koerfer, Reiner
2007-01-01
Securing transvenous left ventricular (LV) pacing leads without an active fixation mechanism in proximal coronary vein (CV) segments is usually challenging and frequently impossible. We investigated how active fixation leads can be safely implanted in this location, how to avoid perforating the free wall of the CV, and how to recognize and respond to perforations. In five patients with no alternative to LV pacing from proximal CV segments, 4 Fr SelectSecure (Medtronic, Minneapolis, MN, USA) leads, which have a fixed helix, were implanted through a modified 6 Fr guide catheter with a pre-shaped tip (Launcher, Medtronic). Active fixation leads were successfully implanted in proximal CVs in five patients. There were no complications. Acute and chronic pacing thresholds were comparable to those of conventional CV leads. The pre-shaped guide catheter tip remains in close proximity to the myocardial aspect of the CV, directing the lead helix toward a safe implantation site. If only proximal CV pacing sites are available, 4 Fr SelectSecure leads can be safely implanted through a modified Launcher guide catheter, avoiding more invasive implantation techniques. Other than venous stenting or implantation of leads with retractable tines, SelectSecure leads are expected to remain extractable.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Limitations and... daily basis does not in itself constitute the establishment of a watch. The minimum safe manning levels specified in a vessel's COI or other safe manning document take into consideration routine maintenance...
Dryden Flight Research Center Chemical Pharmacy Program
NASA Technical Reports Server (NTRS)
Davis, Bette
1997-01-01
The Dryden Flight Research Center (DFRC) Chemical Pharmacy "Crib" is a chemical sharing system which loans chemicals to users, rather than issuing them or having each individual organization or group purchasing the chemicals. This cooperative system of sharing chemicals eliminates multiple ownership of the same chemicals and also eliminates stockpiles. Chemical management duties are eliminated for each of the participating organizations. The chemical storage issues, hazards and responsibilities are eliminated. The system also ensures safe storage of chemicals and proper disposal practices. The purpose of this program is to reduce the total releases and transfers of toxic chemicals. The initial cost of the program to DFRC was $585,000. A savings of $69,000 per year has been estimated for the Center. This savings includes the reduced costs in purchasing, disposal and chemical inventory/storage responsibilities. DFRC has chemicals stored in 47 buildings and at 289 locations. When the program is fully implemented throughout the Center, there will be three chemical locations at this facility. The benefits of this program are the elimination of chemical management duties; elimination of the hazard associated with chemical storage; elimination of stockpiles; assurance of safe storage; assurance of proper disposal practices; assurance of a safer workplace; and more accurate emissions reports.
NASA Astrophysics Data System (ADS)
Jing, Wenjun; Zhao, Yan
2018-02-01
Stability is an important part of geotechnical engineering research. The operating experiences of underground storage caverns in salt rock all around the world show that the stability of the caverns is the key problem of safe operation. Currently, the combination of theoretical analysis and numerical simulation are the mainly adopts method of reserve stability analysis. This paper introduces the concept of risk into the stability analysis of underground geotechnical structure, and studies the instability of underground storage cavern in salt rock from the perspective of risk analysis. Firstly, the definition and classification of cavern instability risk is proposed, and the damage mechanism is analyzed from the mechanical angle. Then the main stability evaluating indicators of cavern instability risk are proposed, and an evaluation method of cavern instability risk is put forward. Finally, the established cavern instability risk assessment system is applied to the analysis and prediction of cavern instability risk after 30 years of operation in a proposed storage cavern group in the Huai’an salt mine. This research can provide a useful theoretical base for the safe operation and management of underground storage caverns in salt rock.
46 CFR 95.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a) Except as provided in paragraph (b) of this...
46 CFR 95.15-20 - Carbon dioxide storage.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a) Except as provided in paragraph (b) of this...
Factors Influencing the Adoption of Cloud Storage by Information Technology Decision Makers
ERIC Educational Resources Information Center
Wheelock, Michael D.
2013-01-01
This dissertation uses a survey methodology to determine the factors behind the decision to adopt cloud storage. The dependent variable in the study is the intent to adopt cloud storage. Four independent variables are utilized including need, security, cost-effectiveness and reliability. The survey includes a pilot test, field test and statistical…
46 CFR 153.935a - Storage of cargo samples.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Storage of cargo samples. 153.935a Section 153.935a Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS... § 153.935a Storage of cargo samples. (a) The master shall make sure that any cargo samples are stored in...
Inherently safe passive gas monitoring system
Cordaro, Joseph V.; Bellamy, John Stephen; Shuler, James M.; Shull, Davis J.; Leduc, Daniel R.
2016-09-06
Generally, the present disclosure is directed to gas monitoring systems that use inductive power transfer to safely power an electrically passive device included within a nuclear material storage container. In particular, the electrically passive device can include an inductive power receiver for receiving inductive power transfer through a wall of the nuclear material storage container. The power received by the inductive power receiver can be used to power one or more sensors included in the device. Thus, the device is not required to include active power generation components such as, for example, a battery, that increase the risk of a spark igniting flammable gases within the container.
Safe and Secure Federal Websites Act of 2014
Rep. Bentivolio, Kerry L. [R-MI-11
2013-12-03
Senate - 07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
The effects of prompting and reinforcement on safe behavior of bicycle and motorcycle riders.
Okinaka, Takeru; Shimazaki, Tsuneo
2011-01-01
A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was effective at increasing safe behavior exhibited by bicycle and motorcycle riders. No differences were observed between vehicle type or gender with regard to engagement in safe behavior.
CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks
Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang
2016-01-01
In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293
Infectious disease protection for healthcare security officers.
D'Angelo, Michael S; Arias, Jean
2015-01-01
Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.
Improved security monitoring method for network bordary
NASA Astrophysics Data System (ADS)
Gao, Liting; Wang, Lixia; Wang, Zhenyan; Qi, Aihua
2013-03-01
This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false alarm or missing alarm of the security incident effectively.
What you see is not what you get in the PDF document format.
Dahl, Mads R; Simonsen, Eivind O; Høyer, Christian B
2011-03-01
The sharing and storage of scientific knowledge, information and data are today mainly in digitized form, which will become the predominant means of communicating scientific work in the future. One of the best-established formats is the open standard of PDF (Portable Document Format), which is renowned for its flexibility and stability. In this article, we expose a major flaw in the format with respect to the security of confidential information, such that even organizations responsible for safeguarding and setting the standards for data management were unintentionally revealing confidential patient data. By collecting and analysing a random sample of files from a health informatics organization, we demonstrate the extent of the problem and determine its cause by code analysis of an example. In conclusion, we suggest the development of a knowledge-sharing format that does not demand expert skills for safe usage: WYSIWYS (What You See Is What You Store). © The Author(s) 2011.
2014-04-17
CAPE CANAVERAL, Fla. - The second set of Ogive panels for the Orion Launch Abort System have arrived at the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the Ogive panels has been uncrated and has been lowered by crane onto a work stand for storage. To the left are the first two Ogive panels positioned on a work stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Kim Shiflett
Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead
2017-03-28
connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in
A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications.
Bao, Shu-Di; Chen, Meng; Yang, Guang-Zhong
2017-11-01
A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet-based applications and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally and the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks.
NASA Astrophysics Data System (ADS)
Basri, M.; Mawengkang, H.; Zamzami, E. M.
2018-03-01
Limitations of storage sources is one option to switch to cloud storage. Confidentiality and security of data stored on the cloud is very important. To keep up the confidentiality and security of such data can be done one of them by using cryptography techniques. Data Encryption Standard (DES) is one of the block cipher algorithms used as standard symmetric encryption algorithm. This DES will produce 8 blocks of ciphers combined into one ciphertext, but the ciphertext are weak against brute force attacks. Therefore, the last 8 block cipher will be converted into 8 random images using Least Significant Bit (LSB) algorithm which later draws the result of cipher of DES algorithm to be merged into one.
ERIC Educational Resources Information Center
Kennedy, Mike
1999-01-01
Describes how colleges and universities are using technology, as well as traditional methods, to keep campuses safe and reduce crime. Topics include using free pizza in a successful contest to teach students about campus safety, installing security cameras, using access-control cards, providing adequate lighting, and creating a bicycle patrol…
14. END VIEW OF THE PLUTONIUM STORAGE VAULT FROM THE ...
14. END VIEW OF THE PLUTONIUM STORAGE VAULT FROM THE REMOTE CONTROL STATION. THE STACKER-RETRIEVER, A REMOTELY-OPERATED, MECHANIZED TRANSPORT SYSTEM, RETRIEVES CONTAINERS OF PLUTONIUM FROM SAFE GEOMETRY PALLETS STORED ALONG THE LENGTH OF THE VAULT. THE STACKER-RETRIEVER RUNS ALONG THE AISLE BETWEEN THE PALLETS OF THE STORAGE CHAMBER. (3/2/86) - Rocky Flats Plant, Plutonium Recovery Facility, Northwest portion of Rocky Flats Plant, Golden, Jefferson County, CO
Methane storage in metal-organic frameworks.
He, Yabing; Zhou, Wei; Qian, Guodong; Chen, Banglin
2014-08-21
Natural gas (NG), whose main component is methane, is an attractive fuel for vehicular applications. Realization of safe, cheap and convenient means and materials for high-capacity methane storage can significantly facilitate the implementation of natural gas fuelled vehicles. The physisorption based process involving porous materials offers an efficient storage methodology and the emerging porous metal-organic frameworks have been explored as potential candidates because of their extraordinarily high porosities, tunable pore/cage sizes and easily immobilized functional sites. In this view, we provide an overview of the current status of metal-organic frameworks for methane storage.
Keys to a Safe, Secure School.
ERIC Educational Resources Information Center
Kennedy, Mike
2002-01-01
Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…
ERIC Educational Resources Information Center
Flanigan, Robin L.
2000-01-01
Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
..., ``Security Performance (Adversary) Characteristics for Physical Security Programs for 10 CFR [Title 10 of the..., ``Physical Protection of Plants and Materials,'' that would apply during the storage of SNF at an ISFSI and... facilities licensed to store SNF through a combination of these existing security regulations and the...
7 CFR 318.13-21 - Avocados from Hawaii to Alaska.
Code of Federal Regulations, 2014 CFR
2014-01-01
... sealable containers; (ii) The transloading is carried out within the secure area of the airport (i.e., that area of the airport that is open only to personnel authorized by the airport security authorities); (iii) The area used for any storage of the consignment is within the secure area of the airport, and is...
7 CFR 318.13-21 - Avocados from Hawaii to Alaska.
Code of Federal Regulations, 2012 CFR
2012-01-01
... sealable containers; (ii) The transloading is carried out within the secure area of the airport (i.e., that area of the airport that is open only to personnel authorized by the airport security authorities); (iii) The area used for any storage of the consignment is within the secure area of the airport, and is...
7 CFR 318.13-21 - Avocados from Hawaii to Alaska.
Code of Federal Regulations, 2013 CFR
2013-01-01
... sealable containers; (ii) The transloading is carried out within the secure area of the airport (i.e., that area of the airport that is open only to personnel authorized by the airport security authorities); (iii) The area used for any storage of the consignment is within the secure area of the airport, and is...
Determination of influence factors and accident rates for the Armored Tractor/Safe Secure Trailer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.S.; Clauss, D.B.; Blower, D.F.
1994-04-01
Operating environments, such as road type, road location, and time of day, play an important role in the observed accident rates of heavy trucks used in general commerce. These same factors influence the accident rate of the Armored Tractor/Safe Secure Trailer (AT/SST) used by the Department of Energy to transport hazardous cargos within the continental United States. This report discusses the development of accident rate influence factors. These factors, based on heavy trucks used in general commerce, are used to modify the observed overall AT/SST accident rate to account for the different operating environments.
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
75 FR 19990 - Lake Casitas Resource Management Plan, Ventura County, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-16
... RMP would: (1) Ensure safe storage and timely delivery of high-quality water to users while enhancing..., California. The dam, which stores water for irrigation, municipal and industrial use within the Casitas Municipal Water District (CMWD), was completed in November 1958. Lake Casitas has a storage capacity of 254...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chou, P
This work establishes the criticality safety technical basis to increase the fissile mass limit from 120 grams to 200 grams for Type A 55-gallon drums and their equivalents. Current RHWM fissile mass limit is 120 grams Pu for Type A 55-gallon containers and their equivalent. In order to increase the Type A 55-gallon drum limit to 200 grams, a few additional criticality safety control requirements are needed on moderators, reflectors, and array controls to ensure that the 200-gram Pu drums remain criticality safe with inadvertent criticality remains incredible. The purpose of this work is to analyze the use of 200-grammore » Pu drum mass limit for waste storage operations in Radioactive and Hazardous Waste Management (RHWM) Facilities. In this evaluation, the criticality safety controls associated with the 200-gram Pu drums are established for the RHWM waste storage operations. With the implementation of these criticality safety controls, the 200-gram Pu waste drum storage operations are demonstrated to be criticality safe and meet the double-contingency-principle requirement per DOE O 420.1.« less
Storing Water in California's Hidden Reservoirs
NASA Astrophysics Data System (ADS)
Perrone, D.; Rohde, M. M.; Szeptycki, L.; Freyberg, D. L.
2014-12-01
California is experiencing one of its worst droughts in history; in early 2014, the Governor released the Water Action Plan outlining opportunities to secure reliable water supplies. Groundwater recharge and storage is suggested as an alternative to surface storage, but little research has been conducted to see if groundwater recharge is a competitive alternative to other water-supply infrastructure projects. Although groundwater recharge and storage data are not readily available, several voter-approved bonds have helped finance groundwater recharge and storage projects and can be used as a proxy for costs, geographic distribution, and interest in such projects. We mined and analyzed available grant applications submitted to the Department of Water Resources that include groundwater recharge and storage elements. We found that artificial recharge can be cheaper than other water-supply infrastructure, but the cost was dependent on the source of water, the availability and accessibility of infrastructure used to capture and convey water, and the method of recharge. Bond applications and funding awards were concentrated in the Central Valley and southern California - both are regions of high water demand. With less than 60% of proposals funded, there are opportunities for groundwater recharge and storage to play a bigger role in securing California's water supplies.
Innovations for Grid Security from Trusted Computing
NASA Astrophysics Data System (ADS)
Mao, Wenbo
Bruno Crispo: But why do you need to chain the certificates, I don’t understand. Usually I look for, for example, storage, and then I go find somewhere that can provide the storage I need, but why do I need a chain?
Safely Enabling UAS Operations in Low-Altitude Airspace
NASA Technical Reports Server (NTRS)
Kopardekar, Parimal H.
2016-01-01
Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.
Crisis Prevention and Response: Is Your School Prepared?
ERIC Educational Resources Information Center
Paine, Cathy; Sprague, Jeffrey
1999-01-01
This bulletin outlines the major components of a crisis-preparedness and response plan for schools. It lists the critical components of a safe-school plan, such as community coordination, curriculum, proactive student discipline policies and procedures, safe physical environment, school security, staff and student training, evaluation and…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marschman, Steven C.; Warmann, Stephan A.; Rusch, Chris
The U.S. Department of Energy Office of Nuclear Energy (DOE-NE), Office of Fuel Cycle Technology, has established the Used Fuel Disposition Campaign (UFDC) to conduct the research and development activities related to storage, transportation, and disposal of used nuclear fuel and high-level radioactive waste. The mission of the UFDC is to identify alternatives and conduct scientific research and technology development to enable storage, transportation and disposal of used nuclear fuel (UNF) and wastes generated by existing and future nuclear fuel cycles. The UFDC Storage and Transportation staffs are responsible for addressing issues regarding the extended or long-term storage of UNFmore » and its subsequent transportation. The near-term objectives of the Storage and Transportation task are to use a science-based approach to develop the technical bases to support the continued safe and secure storage of UNF for extended periods, subsequent retrieval, and transportation. While low burnup fuel [that characterized as having a burnup of less than 45 gigawatt days per metric tonne uranium (GWD/MTU)] has been stored for nearly three decades, the storage of high burnup used fuels is more recent. The DOE has funded a demonstration project to confirm the behavior of used high burnup fuel under prototypic conditions. The Electric Power Research Institute (EPRI) is leading a project team to develop and implement the Test Plan to collect this data from a UNF dry storage system containing high burnup fuel. The Draft Test Plan for the demonstration outlines the data to be collected; the high burnup fuel to be included; the technical data gaps the data will address; and the storage system design, procedures, and licensing necessary to implement the Test Plan. To provide data that is most relevant to high burnup fuel in dry storage, the design of the test storage system must closely mimic real conditions high burnup SNF experiences during all stages of dry storage: loading, cask drying, inert gas backfilling, and transfer to an Independent Spent Fuel Storage Installation (ISFSI) for multi-year storage. To document the initial condition of the used fuel prior to emplacement in a storage system, “sister ” fuel rods will be harvested and sent to a national laboratory for characterization and archival purposes. This report supports the demonstration by describing how sister rods will be shipped and received at a national laboratory, and recommending basic nondestructive and destructive analyses to assure the fuel rods are adequately characterized for UFDC work. For this report, a hub-and-spoke model is proposed, with one location serving as the hub for fuel rod receipt and characterization. In this model, fuel and/or clad would be sent to other locations when capabilities at the hub were inadequate or nonexistent. This model has been proposed to reduce DOE-NE’s obligation for waste cleanup and decontamination of equipment.« less
ERIC Educational Resources Information Center
National Educational Service, Bloomington, IN.
This workshop and planning guide is designed to help stakeholders create safe schools for students. The guide is intended to be used with three 20-minute videotape programs that feature an inside look at two schools that actively involved their communities in improving school safety. The three videos--"Building the Team,""The Safe School…
Research and realization of info-net security controlling system
NASA Astrophysics Data System (ADS)
Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-03-01
The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.
Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun
2016-01-01
In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme. PMID:27136550
Extended outlook: description, utilization, and daily applications of cloud technology in radiology.
Gerard, Perry; Kapadia, Neil; Chang, Patricia T; Acharya, Jay; Seiler, Michael; Lefkovitz, Zvi
2013-12-01
The purpose of this article is to discuss the concept of cloud technology, its role in medical applications and radiology, the role of the radiologist in using and accessing these vast resources of information, and privacy concerns and HIPAA compliance strategies. Cloud computing is the delivery of shared resources, software, and information to computers and other devices as a metered service. This technology has a promising role in the sharing of patient medical information and appears to be particularly suited for application in radiology, given the field's inherent need for storage and access to large amounts of data. The radiology cloud has significant strengths, such as providing centralized storage and access, reducing unnecessary repeat radiologic studies, and potentially allowing radiologic second opinions more easily. There are significant cost advantages to cloud computing because of a decreased need for infrastructure and equipment by the institution. Private clouds may be used to ensure secure storage of data and compliance with HIPAA. In choosing a cloud service, there are important aspects, such as disaster recovery plans, uptime, and security audits, that must be considered. Given that the field of radiology has become almost exclusively digital in recent years, the future of secure storage and easy access to imaging studies lies within cloud computing technology.
Rep. Barrow, John [D-GA-12
2013-06-28
House - 07/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Implementing AORN recommended practices for a safe environment of care, part II.
Kennedy, Lynne
2014-09-01
Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.
Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A
2014-08-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.
Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.
2014-01-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148
Cooperative high-performance storage in the accelerated strategic computing initiative
NASA Technical Reports Server (NTRS)
Gary, Mark; Howard, Barry; Louis, Steve; Minuzzo, Kim; Seager, Mark
1996-01-01
The use and acceptance of new high-performance, parallel computing platforms will be impeded by the absence of an infrastructure capable of supporting orders-of-magnitude improvement in hierarchical storage and high-speed I/O (Input/Output). The distribution of these high-performance platforms and supporting infrastructures across a wide-area network further compounds this problem. We describe an architectural design and phased implementation plan for a distributed, Cooperative Storage Environment (CSE) to achieve the necessary performance, user transparency, site autonomy, communication, and security features needed to support the Accelerated Strategic Computing Initiative (ASCI). ASCI is a Department of Energy (DOE) program attempting to apply terascale platforms and Problem-Solving Environments (PSEs) toward real-world computational modeling and simulation problems. The ASCI mission must be carried out through a unified, multilaboratory effort, and will require highly secure, efficient access to vast amounts of data. The CSE provides a logically simple, geographically distributed, storage infrastructure of semi-autonomous cooperating sites to meet the strategic ASCI PSE goal of highperformance data storage and access at the user desktop.
ERIC Educational Resources Information Center
Brown, Ben
2005-01-01
This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…
Evans, Ellen W; Redmond, Elizabeth C
2015-04-01
Increased listeriosis incidence among older adults (≥ 60 years) has been reported internationally, with many cases reported to be sporadic and associated with ready-to-eat (RTE) food products with extended refrigerated shelf life. Given that the home kitchen is recognized as a significant location where foodborne illnesses are acquired, it is important that consumers implement safe food practices to minimize risks. This is crucial for vulnerable consumers, such as older adults. Consumer food safety recommendations in the United Kingdom to reduce the risk of listeriosis at home include (i) following "use-by" dates on unopened prepacked RTE food products, (ii) consuming RTE food products within 2 days of opening, and (iii) ensuring the safe operating temperatures of domestic refrigerators (≤ 5 °C). This study utilized observation, self-reporting, and microbiological analysis to determine actual food storage practices to identify behavioral risk factors. A domestic kitchen survey was conducted in older adult (≥ 60 years) consumers' domestic kitchens (n = 100) in South Wales, United Kingdom. Forty-one percent of foods in home refrigerators were beyond the use-by date, of which 11% were unopened RTE food products commonly associated with listeriosis. Sixty-six percent of opened RTE foods had been or were intended to be stored beyond the recommended 2 days after opening. Older adults failed to ensure safe refrigeration temperatures, with 50% of central storage and 85% of door storage areas operating at temperatures >5 °C. Older refrigerators operated at significantly (P < 0.05) higher temperatures. Given that Listeria monocytogenes was isolated in 2% of kitchens, these findings suggest that storage malpractices may have a greater effect on the potential risk of listeriosis than its presence alone. The study has determined that many older adults fail to adhere to recommendations and subject RTE foods associated with L. monocytogenes to prolonged storage at unsafe temperatures which may render food unsafe for consumption.
Safety criteria for organic watch list tanks at the Hanford Site
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meacham, J.E., Westinghouse Hanford
1996-08-01
This document reviews the hazards associated with the storage of organic complexant salts in Hanford Site high-level waste single- shell tanks. The results of this analysis were used to categorize tank wastes as safe, unconditionally safe, or unsafe. Sufficient data were available to categorize 67 tanks; 63 tanks were categorized as safe, and four tanks were categorized as conditionally safe. No tanks were categorized as unsafe. The remaining 82 SSTs lack sufficient data to be categorized.Historic tank data and an analysis of variance model were used to prioritize the remaining tanks for characterization.
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos
NASA Astrophysics Data System (ADS)
Long, Min; Li, You; Peng, Fei
Aiming to strike for a balance between the security, efficiency and availability of the data verification in cloud storage, a novel integrity verification scheme based on spatiotemporal chaos is proposed for multiple data copies. Spatiotemporal chaos is implemented for node calculation of the binary tree, and the location of the data in the cloud is verified. Meanwhile, dynamic operation can be made to the data. Furthermore, blind information is used to prevent a third-party auditor (TPA) leakage of the users’ data privacy in a public auditing process. Performance analysis and discussion indicate that it is secure and efficient, and it supports dynamic operation and the integrity verification of multiple copies of data. It has a great potential to be implemented in cloud storage services.
Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A
2017-11-01
Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.
Widespread applications of citrus cryopreservation
USDA-ARS?s Scientific Manuscript database
Citrus genetic resources can now be successfully cryopreserved, which means that they can be placed into long-term storage at liquid nitrogen temperatures. This cryopreservation technology was specifically developed to address the immediate need to have secure long-term back-up storage for citrus co...
77 FR 29619 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
... system: Name, Social Security Number (SSN), gender, race/ethnicity, birth date, place of birth, home..., spouse information, marital status, dependent child information (citizenship, gender, date of birth..., accessing, retaining, and disposing of records in the system: Storage: Electronic storage media...
ERIC Educational Resources Information Center
Kennedy, Mike
2006-01-01
Education administrators have many tools available to them as they strive to establish a safe climate for learning, but no one strategy or piece of equipment is a magic solution that keeps potential trouble beyond the campus boundaries. Creating and maintaining a safe and secure school environment requires a balance of many strategies: (1)…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chochoms, Michael
2017-02-23
This course presents information for working safely with portable ladders: specifically, stepladders, extensions ladders, and their derivations. Additionally, this course provides limited information on the safe use of stepstools and fixed ladders. The skills, techniques, and good practices needed for selecting, inspecting, setting up and securing, and using ladders are presented in this course.
SAFETY GUIDES FOR YOU--IN THE PRIMARY GRADES.
ERIC Educational Resources Information Center
WALKER, LUVERNE CRABTREE
THIS SAFETY INSTRUCTIONAL GUIDE FOR PRIMARY-GRADE TEACHERS PRESENTS NINE DIFFERENT SAFETY UNITS, INCLUDING TRAFFIC SAFETY, PLAYTIME SAFETY, SAFE EATING AND DRINKING HABITS, SAFE CLOTHING, HOME SAFETY, ANIMAL SAFETY, CIVIL DEFENSE SECURITY, AND TESTING SAFETY PRACTICES. EACH UNIT STRESSES THE REASONS FOR ACCENTING SAFETY, WHAT TO KNOW AND DO, AND…
ERIC Educational Resources Information Center
Kennedy, Mike
2008-01-01
After violent episodes too numerous to list and too terrible to forget, schools and universities have been focused for several years on enhancing security in their facilities. Doors are among the most critical points of concern for school personnel responsible for keeping buildings safe. Education institutions want doors that let the right people…
75 FR 71519 - National Family Week, 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
..., which aims to protect working families' economic security and raise their standard of living. And the... brave service members and their families who keep our loved ones safe here at home and abroad. This... dreams. As we confront our challenges as a Nation, let us support our families in creating safe...
76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-27
.... Minimum safe speed means the speed at which a vessel proceeds when it is fully off plane, completely... minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off a plane...
Bi-fuel System - Gasoline/LPG in A Used 4-Stroke Motorcycle - Fuel Injection Type
NASA Astrophysics Data System (ADS)
Suthisripok, Tongchit; Phusakol, Nachaphat; Sawetkittirut, Nuttapol
2017-10-01
Bi-fuel-Gasoline/LPG system has been effectively and efficiently used in gasoline vehicles with less pollutants emission. The motorcycle tested was a used Honda AirBlade i110 - fuel injection type. A 3-litre LPG storage tank, an electronic fuel control unit, a 1-mm LPG injector and a regulator were securely installed. The converted motorcycle can be started with either gasoline or LPG. The safety relief valve was set below 48 kPa and over 110 kPa. The motorcycle was tuned at the relative rich air-fuel ratio (λ) of 0.85-0.90 to attain the best power output. From dynamometer tests over the speed range of 65-100 km/h, the average power output when fuelling LPG was 5.16 hp; dropped 3.9% from the use of gasoline91. The average LPG consumption rate from the city road test at the average speed of 60 km/h was 40.1 km/l, about 17.7% more. This corresponded to lower LPG’s energy density of about 16.2%. In emission, the CO and HC concentrations were 44.4% and 26.5% lower. Once a standard gas equipment set with ECU and LPG injector were securely installed and the engine was properly tuned up to suit LPG’s characteristics, the converted bi-fuel motorcycle offers efficiently, safely and economically performance with environmental friendly emission.
Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kovacic, Donald N
2015-01-01
This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture
A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs
Liu, Anfeng; Liu, Xiao; Long, Jun
2016-01-01
Security is a pivotal issue for wireless sensor networks (WSNs), which are emerging as a promising platform that enables a wide range of military, scientific, industrial and commercial applications. Traceback, a key cyber-forensics technology, can play an important role in tracing and locating a malicious source to guarantee cybersecurity. In this work a trust-based adaptive probability marking and storage (TAPMS) traceback scheme is proposed to enhance security for WSNs. In a TAPMS scheme, the marking probability is adaptively adjusted according to the security requirements of the network and can substantially reduce the number of marking tuples and improve network lifetime. More importantly, a high trust node is selected to store marking tuples, which can avoid the problem of marking information being lost. Experimental results show that the total number of marking tuples can be reduced in a TAPMS scheme, thus improving network lifetime. At the same time, since the marking tuples are stored in high trust nodes, storage reliability can be guaranteed, and the traceback time can be reduced by more than 80%. PMID:27043566
A symmetrical image encryption scheme in wavelet and time domain
NASA Astrophysics Data System (ADS)
Luo, Yuling; Du, Minghui; Liu, Junxiu
2015-02-01
There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.
77 FR 66351 - Establishing the White House Homeland Security Partnership Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... resources more efficiently, build on one another's expertise, drive innovation, engage in collective action... utilizing diverse perspectives, skills, tools, and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring that to keep our Nation safe ``we must tap the ingenuity outside...
77 FR 73464 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
..., grantees, volunteers, interns, and others performing or working on a contract, service, grant, cooperative... tape records are stored in locked file rooms, locked file cabinets, or locked safes. RETRIEVABILITY... safeguarded in a secured environment. Buildings where records are stored have security cameras and 24-hour...
3 CFR - Blue Ribbon Commission on America's Nuclear Future
Code of Federal Regulations, 2011 CFR
2011-01-01
... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...
Constraints on the magnitude and rate of CO 2 dissolution at Bravo Dome natural gas field
Sathaye, Kiran J.; Hesse, Marc A.; Cassidy, M.; ...
2014-10-13
The injection of carbon dioxide (CO 2) captured at large point sources into deep saline aquifers can significantly reduce anthropogenic CO 2 emissions from fossil fuels. Dissolution of the injected CO 2 into the formation brine is a trapping mechanism that helps to ensure the long-term security of geological CO 2 storage. We use thermochronology to estimate the timing of CO 2 emplacement at Bravo Dome, a large natural CO 2 field at a depth of 700 m in New Mexico. Together with estimates of the total mass loss from the field we present, to our knowledge, the first constraintsmore » on the magnitude, mechanisms, and rates of CO 2 dissolution on millennial timescales. Apatite (U-Th)/He thermochronology records heating of the Bravo Dome reservoir due to the emplacement of hot volcanic gases 1.2–1.5 Ma. The CO 2 accumulation is therefore significantly older than previous estimates of 10 ka, which demonstrates that safe long-term geological CO 2 storage is possible. Here, integrating geophysical and geochemical data, we estimate that 1.3 Gt CO 2 are currently stored at Bravo Dome, but that only 22% of the emplaced CO 2 has dissolved into the brine over 1.2 My. Roughly 40% of the dissolution occurred during the emplacement. The CO 2 dissolved after emplacement exceeds the amount expected from diffusion and provides field evidence for convective dissolution with a rate of 0.1 g/(m 2y). Finally, the similarity between Bravo Dome and major US saline aquifers suggests that significant amounts of CO 2 are likely to dissolve during injection at US storage sites, but that convective dissolution is unlikely to trap all injected CO 2 on the 10-ky timescale typically considered for storage projects.« less
2013-02-01
supplement the main power supply. Here we report on the use of flexible carbon nanotube (CNT)-based composites for multifunctional structural energy storage...TERMS Micro vehicle, Supercapacitor, Carbon Nanotubes , CNTs, Energy Storage, Multifunctional Materials 16. SECURITY CLASSIFICATION OF: 17...consists of a current collector, a porous electrode layer ( carbon nanotubes [CNTs], in this case) infiltrated with an electrolyte (i.e., a liquid
Long-term viability of carbon sequestration in deep-sea sediments
NASA Astrophysics Data System (ADS)
Teng, Y.; Zhang, D.
2017-12-01
Sequestration of carbon dioxide in deep-sea sediments has been proposed for the long-term storage of anthropogenic CO2, due to the negative buoyancy effect and hydrate formation under conditions of high pressure and low temperature. However, the multi-physics process of injection and post-injection fate of CO2 and the feasibility of sub-seabed disposal of CO2 under different geological and operational conditions have not been well studied. On the basis of a detailed study of the coupled processes, we investigate whether storing CO2 into deep-sea sediments is viable, efficient, and secure over the long term. Also studied are the evolution of the multiphase and multicomponent flow and the impact of hydrate formation on storage efficiency during the upward migration of the injected CO2. It is shown that low buoyancy and high viscosity slow down the ascending plume and the forming of the hydrate cap effectively reduces the permeability and finally becomes an impermeable seal, thus limiting the movement of CO2 towards the seafloor. Different flow patterns at varied time scales are identified through analyzing the mass distribution of CO2 in different phases over time. Observed is the formation of a fluid inclusion, which mainly consists of liquid CO2 and is encapsulated by an impermeable hydrate film in the diffusion-dominated stage. The trapped liquid CO2 and CO2 hydrate finally dissolve into the pore water through diffusion of the CO2 component. Sensitivity analyses are performed on storage efficiency under variable geological and operational conditions. It is found that under a deep-sea setting, CO2 sequestration in intact marine sediments is generally safe and permanent.
Ulrici, Luisa; Algoet, Yvon; Bruno, Luca; Magistris, Matteo
2015-04-01
The European Laboratory for Particle Physics (CERN) has operated high-energy accelerators for fundamental physics research for nearly 60 y. The side-product of this activity is the radioactive waste, which is mainly generated as a result of preventive and corrective maintenance, upgrading activities and the dismantling of experiments or accelerator facilities. Prior to treatment and disposal, it is common practice to temporarily store radioactive waste on CERN's premises and it is a legal requirement that these storage facilities are safe and secure. Waste treatment typically includes sorting, segregation, volume and size reduction and packaging, which will depend on the type of component, its chemical composition, residual activity and possible surface contamination. At CERN, these activities are performed in a dedicated waste treatment centre under the supervision of the Radiation Protection Group. This paper gives an overview of the radiation protection challenges in the conception of a temporary storage and treatment centre for radioactive waste in an accelerator facility, based on the experience gained at CERN. The CERN approach consists of the classification of waste items into 'families' with similar radiological and physical-chemical properties. This classification allows the use of specific, family-dependent techniques for radiological characterisation and treatment, which are simultaneously efficient and compliant with best practices in radiation protection. The storage was planned on the basis of radiological and other possible hazards such as toxicity, pollution and fire load. Examples are given of technical choices for the treatment and radiological characterisation of selected waste families, which could be of interest to other accelerator facilities. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
75 FR 71081 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... effective without further notice on December 22, 2010 unless comments are received which result in a... birth, gender, current status (actively employed or retired), Social Security Numbers (SSN), ethnicity...: Storage: Electronic storage media. Retrievability: Retrieved by the employee using a unique username and...
75 FR 13094 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-18
... effective on April 19, 2010 unless comments are received that would result in a contrary determination... Reserve Component personnel. Categories of records in the system: Name, Social Security Number (SSN..., accessing, retaining, and disposing of records in the system: Storage: Electronic storage media...
Code of Federal Regulations, 2014 CFR
2014-10-01
... HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Hazardous... cargoes. (a) This section applies to locations surrounding the storage and handling of combustible liquid... hazardous locations in § 111.106-9 of this subpart apply. ...
State gun safe storage laws and child mortality due to firearms.
Cummings, P; Grossman, D C; Rivara, F P; Koepsell, T D
1997-10-01
Since 1989, several states have passed laws that make gun owners criminally liable if someone is injured because a child gains unsupervised access to a gun. These laws are controversial, and their effect on firearm-related injuries is unknown. To determine if state laws that require safe storage of firearms are associated with a reduction in child mortality due to firearms. An ecological study of firearm mortality from 1979 through 1994. All 50 states and the District of Columbia. All children younger than 15 years. Unintentional deaths, suicides, and homicides due to firearms. Laws that make gun owners responsible for storing firearms in a manner that makes them inaccessible to children were in effect for at least 1 year in 12 states from 1990 through 1994. Among children younger than 15 years, unintentional shooting deaths were reduced by 23% (95% confidence interval, 6%-37%) during the years covered by these laws. This estimate was based on within-state comparisons adjusted for national trends in unintentional firearm-related mortality. Gun-related homicide and suicide showed modest declines, but these were not statistically significant. State safe storage laws intended to make firearms less accessible to children appear to prevent unintentional shooting deaths among children younger than 15 years.
The Design of Data Disaster Recovery of National Fundamental Geographic Information System
NASA Astrophysics Data System (ADS)
Zhai, Y.; Chen, J.; Liu, L.; Liu, J.
2014-04-01
With the development of information technology, data security of information system is facing more and more challenges. The geographic information of surveying and mapping is fundamental and strategic resource, which is applied in all areas of national economic, defence and social development. It is especially vital to national and social interests when such classified geographic information is directly concerning Chinese sovereignty. Several urgent problems that needs to be resolved for surveying and mapping are how to do well in mass data storage and backup, establishing and improving the disaster backup system especially after sudden natural calamity accident, and ensuring all sectors rapidly restored on information system will operate correctly. For overcoming various disaster risks, protect the security of data and reduce the impact of the disaster, it's no doubt the effective way is to analysis and research on the features of storage and management and security requirements, as well as to ensure that the design of data disaster recovery system suitable for the surveying and mapping. This article analyses the features of fundamental geographic information data and the requirements of storage management, three site disaster recovery system of DBMS plan based on the popular network, storage and backup, data replication and remote switch of application technologies. In LAN that synchronous replication between database management servers and the local storage of backup management systems, simultaneously, remote asynchronous data replication between local storage backup management systems and remote database management servers. The core of the system is resolving local disaster in the remote site, ensuring data security and business continuity of local site. This article focuses on the following points: background, the necessity of disaster recovery system, the analysis of the data achievements and data disaster recovery plan. Features of this program is to use a hardware-based data hot backup, and remote online disaster recovery support for Oracle database system. The achievement of this paper is in summarizing and analysing the common characteristics of disaster of surveying and mapping business system requirements, while based on the actual situation of the industry, designed the basic GIS disaster recovery solutions, and we also give the conclusions about key technologies of RTO and RPO.
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Secure public cloud platform for medical images sharing.
Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas
2015-01-01
Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Safe at Any Speed: Securing Your Wi-Fi Network Is Easier and More Important than You Might Think
ERIC Educational Resources Information Center
Branzburg, Jeffrey
2007-01-01
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009
Code of Federal Regulations, 2010 CFR
2010-01-01
... the United States of America A Proclamation Critical infrastructure protection is an essential element... have a debilitating effect on security, national economic security, public health or safety. From water... country's essential resources are safe and capable of recovering from disruptive incidents. The Department...
ERIC Educational Resources Information Center
Kennedy, Mike
2010-01-01
The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…