Sample records for safe secure storage

  1. Used fuel extended storage security and safeguards by design roadmap

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durbin, Samuel G.; Lindgren, Eric Richard; Jones, Robert

    2016-05-01

    In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. Amore » set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.« less

  2. Review of evaluations of educational approaches to promote safe storage of firearms

    PubMed Central

    McGee, K; Coyne-Beasley, T; Johnson, R

    2003-01-01

    Objective: To systematically review evaluation studies of educational interventions promoting safe firearm storage. Methods: Medline, ERIC, PsycINFO, Criminal Justice Periodicals Index, Cumulative Index of Nursing and Allied Health Literature, and Sociofile were searched. The references from each potentially eligible study were checked, and experts in the field were contacted for additional reports. In addition, an internet search was performed to identify programs not published in the conventional literature. Sources relevant to safe firearm storage promotion were selected and evaluated. Results: Seven studies met inclusion criteria: adult subjects, program description was included, and firearm storage outcomes were measured. One was a randomized controlled trial and the other six were one group pre-test and/or post-test. The studies were classified into the following categories based on the intervention strategies used: (1) counseling and firearm safety materials (n=3); (2) counseling/educational message (n=3); and (3) firearm safety materials distribution (n=1).The outcomes were safe firearms storage (firearms locked up and unloaded or removal from home) after intervention. Four studies, three using counseling and materials distribution, reported improved storage after the interventions. Conclusions: It is not yet clear what types of interventions, or which specific intervention components, prompt gun owners to securely store their weapons. Increased understanding of gun storage behaviors and stronger evaluation designs will aid further understanding of this important issue. PMID:12810734

  3. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  4. Safe and Secure Services Based on NGN

    NASA Astrophysics Data System (ADS)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  5. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  6. High-Level Radioactive Waste: Safe Storage and Ultimate Disposal.

    ERIC Educational Resources Information Center

    Dukert, Joseph M.

    Described are problems and techniques for safe disposal of radioactive waste. Degrees of radioactivity, temporary storage, and long-term permanent storage are discussed. Included are diagrams of estimated waste volumes to the year 2000 and of an artist's conception of a permanent underground disposal facility. (SL)

  7. Air Quality Inside Police Drug Safes and Drug Storage Areas.

    PubMed

    Doran, Gregory S; Deans, Ralph; De Filippis, Carlo; Kostakis, Chris; Howitt, Julia A

    2018-06-01

    Storage of drug-based evidence inside sealed safes may allow chemical vapors to accumulate, creating concerns of drug exposure by inhalation, or the possibility of cross-contamination of drug evidence. Air samples were taken from inside eight drug safes and one small storage room at nine city and country police stations, as well as a large centralized drug evidence storage vault, in New South Wales (NSW), Australia. Sorbent tubes containing charcoal were used to determine whether any drug residues could be detected in the air, and to identify the types of chemicals present. Carbon traps were extracted and analyzed by LC-MS-MS for a suite of 22 licit and illicit drug residues and 2 metabolites. Carbon traps and SPME fibers were also analyzed by GC-MS for general volatile organic compound (VOC) residues. No detectable drug residues, either as airborne dust or vapor, were found in the safes, the storage room or the large central repository vault. No drugs were detected in any of the 34 urine samples collected at 8 of the 10 sampling locations, while only one of the five hair samples was positive for cocaine (9 pg/mg) provided by police exhibit officers at 3 of the 10 sampling locations. VOC analysis identified a variety of solvents associated with drug manufacture, plasticisers, personal care products and volatiles associated with plants such as cannabis. The results indicate that strong chemical odours emanating from drug safes are unlikely to be drug residues due to low volatility of drugs, and are more likely VOCs associated with their manufacture or from plant growing operations. Consideration should be given to the quality of air flow in rooms in which safes are housed and the use of air filtering inside safes to reduce the likelihood of VOC accumulation, and therefore the risk of human exposure.

  8. Using RFID to Enhance Security in Off-Site Data Storage

    PubMed Central

    Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638

  9. Using RFID to enhance security in off-site data storage.

    PubMed

    Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.

  10. Changes in Suicide Methods in Quebec between 1987 and 2000: The Possible Impact of Bill C-17 Requiring Safe Storage of Firearms

    ERIC Educational Resources Information Center

    Caron, Jean; Julien, Marie; Huang, Jean Hua

    2008-01-01

    This study presents the changes in the overall and firearm suicide rates for Quebec (Canada) before and after Bill C-17, which was implemented to secure safe storage of firearms. It covers 20,009 suicide cases reported to the coroner's office. Interrupted time series analysis is used to compare suicide rates in the two periods. Firearm suicide…

  11. Economic performance of water storage capacity expansion for food security

    NASA Astrophysics Data System (ADS)

    Gohar, Abdelaziz A.; Ward, Frank A.; Amer, Saud A.

    2013-03-01

    SummaryContinued climate variability, population growth, and rising food prices present ongoing challenges for achieving food and water security in poor countries that lack adequate water infrastructure. Undeveloped storage infrastructure presents a special challenge in northern Afghanistan, where food security is undermined by highly variable water supplies, inefficient water allocation rules, and a damaged irrigation system due three decades of war and conflict. Little peer-reviewed research to date has analyzed the economic benefits of water storage capacity expansions as a mechanism to sustain food security over long periods of variable climate and growing food demands needed to feed growing populations. This paper develops and applies an integrated water resources management framework that analyzes impacts of storage capacity expansions for sustaining farm income and food security in the face of highly fluctuating water supplies. Findings illustrate that in Afghanistan's Balkh Basin, total farm income and food security from crop irrigation increase, but at a declining rate as water storage capacity increases from zero to an amount equal to six times the basin's long term water supply. Total farm income increases by 21%, 41%, and 42% for small, medium, and large reservoir capacity, respectively, compared to the existing irrigation system unassisted by reservoir storage capacity. Results provide a framework to target water infrastructure investments that improve food security for river basins in the world's dry regions with low existing storage capacity that face ongoing climate variability and increased demands for food security for growing populations.

  12. Unconditional security from noisy quantum storage

    NASA Astrophysics Data System (ADS)

    Wehner, Stephanie

    2010-03-01

    We consider the implementation of two-party cryptographic primitives based on the sole physical assumption that no large-scale reliable quantum storage is available to the cheating party. An important example of such a task is secure identification. Here, Alice wants to identify herself to Bob (possibly an ATM machine) without revealing her password. More generally, Alice and Bob wish to solve problems where Alice holds an input x (e.g. her password), and Bob holds an input y (e.g. the password an honest Alice should possess), and they want to obtain the value of some function f(x,y) (e.g. the equality function). Security means that the legitimate users should not learn anything beyond this specification. That is, Alice should not learn anything about y and Bob should not learn anything about x, other than what they may be able to infer from the value of f(x,y). We show that any such problem can be solved securely in the noisy-storage model by constructing protocols for bit commitment and oblivious transfer, where we prove security against the most general attack. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties. Our work raises a large number of immediate theoretical as well as experimental questions related to many aspects of quantum information science, such as for example understanding the information carrying properties of quantum channels and memories, randomness extraction, min-entropy sampling, as well as constructing small handheld devices which are suitable for the task of secure identification. [4pt] Full version available at arXiv:0906.1030 (theoretical) and arXiv:0911.2302 (practically oriented).

  13. SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, STORAGE BUILDING (BUILDING 3584), CONVENTIONAL MUNITIONS SHOP (BUILDING 3580), AND SECURITY POLICE ENTRY CONTROL BUILDING (BUILDING 3582). VIEW TO SOUTHWEST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY

  14. A&M. Radioactive parts security storage area, heat removal storage casks. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    A&M. Radioactive parts security storage area, heat removal storage casks. Plan, section, and details. Ralph M. Parsons 1480-7 ANP/GE-3-720-S-1. Date: November 1958. Approved by INEEL Classification Office for public release. INEEL index no. 034-0720-60-693-107459 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID

  15. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badwan, Faris M.; Demuth, Scott F

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design

  16. A protect solution for data security in mobile cloud storage

    NASA Astrophysics Data System (ADS)

    Yu, Xiaojun; Wen, Qiaoyan

    2013-03-01

    It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.

  17. Safe operating conditions for NSLS-II Storage Ring Frontends commissioning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seletskiy, S.; Amundsen, C.; Ha, K.

    2015-04-02

    The NSLS-II Storage Ring Frontends are designed to safely accept the synchrotron radiation fan produced by respective insertion device when the electron beam orbit through the ID is locked inside the predefined Active Interlock Envelope. The Active Interlock is getting enabled at a particular beam current known as AI safe current limit. Below such current the beam orbit can be anywhere within the limits of the SR beam acceptance. During the FE commissioning the beam orbit is getting intentionally disturbed in the particular ID. In this paper we explore safe operating conditions for the Frontends commissioning.

  18. Evaluation of a community-based safe firearm and ammunition storage intervention.

    PubMed

    Simonetti, Joseph A; Rowhani-Rahbar, Ali; King, Cassie; Bennett, Elizabeth; Rivara, Frederick P

    2018-06-01

    Safe firearm storage practices are associated with a lower risk of unintentional and self-inflicted firearm injuries among household members, though many firearms remain unlocked and/or loaded. Conduct a preliminary evaluation of a community-based firearm safety intervention and assess participants' preferences for firearm locking devices and their comfort with potential firearm safety counsellors. Baseline event and follow-up surveys among adult participants to assess changes in firearm storage practices, including whether all household firearms were stored locked, all were unloaded, all ammunition was locked, and a composite measure assessing whether all firearms were locked and unloaded and all ammunition was stored locked. A total of 206 out of 415 participants completed both surveys and were included. Nearly 9 in 10 respondents preferred the firearm lock box rather than a trigger lock. At follow-up, a significantly greater proportion reported that all household firearms were locked (+13.7%) and unloaded (+8.5%) and a non-significantly greater proportion reported that all ammunition was locked (+6.3%). A significantly greater proportion reported practising all three safe firearm and ammunition storage practices at follow-up (+12.6%). A majority reported they would be comfortable or very comfortable discussing firearm safety with various safety counsellors, though women were less likely to do so than men. This intervention that included distribution of a free, participant-selected locking device improved safe firearm storage practices among participants. Differences in participant preferences for devices and safety counsellors suggest that a 'one size fits all' approach may be inadequate in affecting population-level storage practices. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Fail-safe storage rack for irradiated fuel rod assemblies

    DOEpatents

    Lewis, D.R.

    1993-03-23

    A fail-safe storage rack is provided for interim storage of spent but radioactive nuclear fuel rod assemblies. The rack consists of a checkerboard array of substantially square, elongate receiving tubes fully enclosed by a double walled container, the outer wall of which is imperforate for liquid containment and the inner wall of which is provided with perforations for admitting moderator liquid flow to the elongate receiving tubes, the liquid serving to take up waste heat from the stored nuclear assemblies and dissipate same to the ambient liquid reservoir. A perforated cover sealing the rack facilitates cooling liquid entry and dissipation.

  20. Fail-safe storage rack for irradiated fuel rod assemblies

    DOEpatents

    Lewis, Donald R.

    1993-01-01

    A fail-safe storage rack is provided for interim storage of spent but radioactive nuclear fuel rod assemblies. The rack consists of a checkerboard array of substantially square, elongate receiving tubes fully enclosed by a double walled container, the outer wall of which is imperforate for liquid containment and the inner wall of which is provided with perforations for admitting moderator liquid flow to the elongate receiving tubes, the liquid serving to take up waste heat from the stored nuclear assemblies and dissipate same to the ambient liquid reservoir. A perforated cover sealing the rack facilitates cooling liquid entry and dissipation.

  1. Estimating geological CO2 storage security to deliver on climate mitigation.

    PubMed

    Alcalde, Juan; Flude, Stephanie; Wilkinson, Mark; Johnson, Gareth; Edlmann, Katriona; Bond, Clare E; Scott, Vivian; Gilfillan, Stuart M V; Ogaya, Xènia; Haszeldine, R Stuart

    2018-06-12

    Carbon capture and storage (CCS) can help nations meet their Paris CO 2 reduction commitments cost-effectively. However, lack of confidence in geologic CO 2 storage security remains a barrier to CCS implementation. Here we present a numerical program that calculates CO 2 storage security and leakage to the atmosphere over 10,000 years. This combines quantitative estimates of geological subsurface CO 2 retention, and of surface CO 2 leakage. We calculate that realistically well-regulated storage in regions with moderate well densities has a 50% probability that leakage remains below 0.0008% per year, with over 98% of the injected CO 2 retained in the subsurface over 10,000 years. An unrealistic scenario, where CO 2 storage is inadequately regulated, estimates that more than 78% will be retained over 10,000 years. Our modelling results suggest that geological storage of CO 2 can be a secure climate change mitigation option, but we note that long-term behaviour of CO 2 in the subsurface remains a key uncertainty.

  2. Ultra Safe And Secure Blasting System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tappingmore » into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.« less

  3. Utilization of Integrated Assessment Modeling for determining geologic CO2 storage security

    NASA Astrophysics Data System (ADS)

    Pawar, R.

    2017-12-01

    Geologic storage of carbon dioxide (CO2) has been extensively studied as a potential technology to mitigate atmospheric concentration of CO2. Multiple international research & development efforts, large-scale demonstration and commercial projects are helping advance the technology. One of the critical areas of active investigation is prediction of long-term CO2 storage security and risks. A quantitative methodology for predicting a storage site's long-term performance is critical for making key decisions necessary for successful deployment of commercial scale projects where projects will require quantitative assessments of potential long-term liabilities. These predictions are challenging given that they require simulating CO2 and in-situ fluid movements as well as interactions through the primary storage reservoir, potential leakage pathways (such as wellbores, faults, etc.) and shallow resources such as groundwater aquifers. They need to take into account the inherent variability and uncertainties at geologic sites. This talk will provide an overview of an approach based on integrated assessment modeling (IAM) to predict long-term performance of a geologic storage site including, storage reservoir, potential leakage pathways and shallow groundwater aquifers. The approach utilizes reduced order models (ROMs) to capture the complex physical/chemical interactions resulting due to CO2 movement and interactions but are computationally extremely efficient. Applicability of the approach will be demonstrated through examples that are focused on key storage security questions such as what is the probability of leakage of CO2 from a storage reservoir? how does storage security vary for different geologic environments and operational conditions? how site parameter variability and uncertainties affect storage security, etc.

  4. A&M. Radioactive parts security storage area. camera facing northwest. Outdoor ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    A&M. Radioactive parts security storage area. camera facing northwest. Outdoor storage of concrete storage casks. Photographer: M. Holmes. Date: November 21, 1959. INEEL negative no. 59-6081 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID

  5. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    PubMed Central

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  6. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    PubMed

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  7. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less

  8. The challenge of improving boiling: lessons learned from a randomized controlled trial of water pasteurization and safe storage in Peru.

    PubMed

    Heitzinger, K; Rocha, C A; Quick, R E; Montano, S M; Tilley, D H; Mock, C N; Carrasco, A J; Cabrera, R M; Hawes, S E

    2016-07-01

    Boiling is the most common method of household water treatment in developing countries; however, it is not always effectively practised. We conducted a randomized controlled trial among 210 households to assess the effectiveness of water pasteurization and safe-storage interventions in reducing Escherichia coli contamination of household drinking water in a water-boiling population in rural Peru. Households were randomized to receive either a safe-storage container or a safe-storage container plus water pasteurization indicator or to a control group. During a 13-week follow-up period, households that received a safe-storage container and water pasteurization indicator did not have a significantly different prevalence of stored drinking-water contamination relative to the control group [prevalence ratio (PR) 1·18, 95% confidence interval (CI) 0·92-1·52]. Similarly, receipt of a safe-storage container alone had no effect on prevalence of contamination (PR 1·02, 95% CI 0·79-1·31). Although use of water pasteurization indicators and locally available storage containers did not increase the safety of household drinking water in this study, future research could illuminate factors that facilitate the effective use of these interventions to improve water quality and reduce the risk of waterborne disease in populations that boil drinking water.

  9. Interim Safe Storage of Plutonium Production Reactors at the US DOE Hanford Site - 13438

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schilperoort, Daryl L.; Faulk, Darrin

    2013-07-01

    Nine plutonium production reactors located on DOE's Hanford Site are being placed into an Interim Safe Storage (ISS) period that extends to 2068. The Environmental Impact Statement (EIS) for ISS [1] was completed in 1993 and proposed a 75-year storage period that began when the EIS was finalized. Remote electronic monitoring of the temperature and water level alarms inside the safe storage enclosure (SSE) with visual inspection inside the SSE every 5 years are the only planned operational activities during this ISS period. At the end of the ISS period, the reactor cores will be removed intact and buried inmore » a landfill on the Hanford Site. The ISS period allows for radioactive decay of isotopes, primarily Co-60 and Cs-137, to reduce the dose exposure during disposal of the reactor cores. Six of the nine reactors have been placed into ISS by having an SSE constructed around the reactor core. (authors)« less

  10. Efficient proof of ownership for cloud storage systems

    NASA Astrophysics Data System (ADS)

    Zhong, Weiwei; Liu, Zhusong

    2017-08-01

    Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.

  11. Geological conditions of safe long-term storage and disposal of depleted uranium hexafluoride

    NASA Astrophysics Data System (ADS)

    Laverov, N. P.; Velichkin, V. I.; Omel'Yanenko, B. I.; Yudintsev, S. V.; Tagirov, B. R.

    2010-08-01

    The production of enriched uranium used in nuclear weapons and fuel for atomic power plants is accompanied by the formation of depleted uranium (DU), the amount of which annually increases by 35-40 kt. To date, more than 1.6 Mt DU has accumulated in the world. The main DU mass is stored as environ-mentally hazardous uranium hexafluoride (UF6), which is highly volatile and soluble in water with the formation of hydrofluoric acid. To ensure safe UF6 storage, it is necessary to convert this compound in chemically stable phases. The industrial reprocessing of UF6 into U3O8 and HF implemented in France is highly expensive. We substantiate the expediency of long-term storage of depleted uranium hexafluoride in underground repositories localized in limestone. On the basis of geochemical data and thermodynamic calculations, we show that interaction in the steel container-UF6-limestone-groundwater system gives rise to the development of a slightly alkaline reductive medium favorable for chemical reaction with formation of uraninite (UO2) and fluorite (CaF2). The proposed engineering solution not only ensures safe DU storage but also makes it possible to produce uraninite, which can be utilized, if necessary, in fast-neutron reactors. In the course of further investigations aimed at safe maintenance of DU, it is necessary to study the kinetics of conversion of UF6 into stable phases, involving laboratory and field experiments.

  12. Safe and Secure Schools Assessment. Public School Information. Legislative Report, 2008

    ERIC Educational Resources Information Center

    Idaho State Department of Education, 2008

    2008-01-01

    As a result of high profile shootings and critical incidents in schools on a national level, combined with the lack of a cohesive, standardized approach to safety and security in Idaho Schools, Superintendent Tom Luna requested an appropriation to address this issue and the Legislature allocated 5150.000 in FY 2008 for the Safe and Secure…

  13. Managing security and privacy concerns over data storage in healthcare research.

    PubMed

    Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M

    2011-08-01

    Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.

  14. A&M. Radioactive parts security storage warehouses: TAN648 on left, and ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    A&M. Radioactive parts security storage warehouses: TAN-648 on left, and dolly storage building, TAN-647, on right. Camera facing south. This was the front entry for the warehouse and the rear of the dolly storage building. Date: August 6, 2003. INEEL negative no. HD-36-2-2 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID

  15. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    PubMed

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to

  16. A compressive sensing based secure watermark detection and privacy preserving storage framework.

    PubMed

    Qia Wang; Wenjun Zeng; Jun Tian

    2014-03-01

    Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service, such as the cloud. In this paper, we identify a cloud computing application scenario that requires simultaneously performing secure watermark detection and privacy preserving multimedia data storage. We then propose a compressive sensing (CS)-based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a CS domain to protect the privacy. During CS transformation, the privacy of the CS matrix and the watermark pattern is protected by the MPC protocols under the semi-honest security model. We derive the expected watermark detection performance in the CS domain, given the target image, watermark pattern, and the size of the CS matrix (but without the CS matrix itself). The correctness of the derived performance has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the CS domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.

  17. German Support Program for Retrieval and Safe Storage of Disused Radioactive Sealed Sources in Ukraine - 13194

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pretzsch, Gunter; Salewski, Peter; Sogalla, Martin

    2013-07-01

    The German Federal Ministry for the Environment, Nature Conservation and Nuclear Safety (BMU) on behalf of the Government of the Federal Republic of Germany supports the State Nuclear Regulatory Inspectorate of Ukraine (SNRIU) in enhancement of nuclear safety and radiation protection and strengthening of the physical protection. One of the main objectives of the agreement concluded by these parties in 2008 was the retrieval and safe interim storage of disused orphan high radioactive sealed sources in Ukraine. At present, the Ukrainian National Registry does not account all high active radiation sources but only for about 70 - 80 %. GRSmore » in charge of BMU to execute the program since 2008 concluded subcontracts with the waste management and interim storage facilities RADON at different regions in Ukraine as well with the waste management and interim storage facility IZOTOP at Kiev. Below selected examples of removal of high active Co-60 and Cs-137 sources from irradiation facilities at research institutes are described. By end of 2012 removal and safe interim storage of 12.000 disused radioactive sealed sources with a total activity of more than 5,7.10{sup 14} Bq was achieved within the frame of this program. The German support program will be continued up to the end of 2013 with the aim to remove and safely store almost all disused radioactive sealed sources in Ukraine. (authors)« less

  18. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    PubMed

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  19. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    NASA Astrophysics Data System (ADS)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  20. State gun safe storage laws and child mortality due to firearms.

    PubMed

    Cummings, P; Grossman, D C; Rivara, F P; Koepsell, T D

    1997-10-01

    Since 1989, several states have passed laws that make gun owners criminally liable if someone is injured because a child gains unsupervised access to a gun. These laws are controversial, and their effect on firearm-related injuries is unknown. To determine if state laws that require safe storage of firearms are associated with a reduction in child mortality due to firearms. An ecological study of firearm mortality from 1979 through 1994. All 50 states and the District of Columbia. All children younger than 15 years. Unintentional deaths, suicides, and homicides due to firearms. Laws that make gun owners responsible for storing firearms in a manner that makes them inaccessible to children were in effect for at least 1 year in 12 states from 1990 through 1994. Among children younger than 15 years, unintentional shooting deaths were reduced by 23% (95% confidence interval, 6%-37%) during the years covered by these laws. This estimate was based on within-state comparisons adjusted for national trends in unintentional firearm-related mortality. Gun-related homicide and suicide showed modest declines, but these were not statistically significant. State safe storage laws intended to make firearms less accessible to children appear to prevent unintentional shooting deaths among children younger than 15 years.

  1. Safe Grid

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  2. Safe and Secure Virtualization: Answers for IMA next Generation and Beyond

    NASA Astrophysics Data System (ADS)

    Almeida, Jose; Vatrinet, Francis

    2010-08-01

    This paper presents some of the challenges the aerospace industry is facing for the future and explains why and how a safe and secured virtualization technology can help solving these challenges Efforts around the next generation of IMA have already started, like the European FP7 funded project SCARLETT or the IDEE5 project and many avionics players and working groupware focused on how the new technologies like SMP capabilities introduced in latest CPU architectures, can help increasing system performances in future avionics system. We present PikeOS, a separation micro-kernel, which applies the state-of-the-art techniques and widely recognized standards such as ARINC 653 and MILS in order to guarantee safety and security properties, and still improve overall performance.

  3. 29 CFR 1926.250 - General requirements for storage.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in tiers shall be stacked, racked, blocked, interlocked, or otherwise secured to prevent sliding, falling or collapse. (2) Maximum safe load limits of floors within buildings and structures, in pounds per..., tanks, and similar storage areas shall be equipped with personal fall arrest equipment meeting the...

  4. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  5. [Storage of plant protection products in farms: minimum safety requirements].

    PubMed

    Dutto, Moreno; Alfonzo, Santo; Rubbiani, Maristella

    2012-01-01

    Failure to comply with requirements for proper storage and use of pesticides in farms can be extremely hazardous and the risk of accidents involving farm workers, other persons and even animals is high. There are still wide differences in the interpretation of the concept of "securing or making safe", by workers in this sector. One of the critical points detected, particularly in the fruit sector, is the establishment of an adequate storage site for plant protection products. The definition of "safe storage of pesticides" is still unclear despite the recent enactment of Legislative Decree 81/2008 regulating health and work safety in Italy. In addition, there are no national guidelines setting clear minimum criteria for storage of plant protection products in farms. The authors, on the basis of their professional experience and through analysis of recent legislation, establish certain minimum safety standards for storage of pesticides in farms.

  6. Saying goodbye to optical storage technology.

    PubMed

    McLendon, Kelly; Babbitt, Cliff

    2002-08-01

    The days of using optical disk based mass storage devices for high volume applications like health care document imaging are coming to an end. The price/performance curve for redundant magnetic disks, known as RAID, is now more positive than for optical disks. All types of application systems, across many sectors of the marketplace are using these newer magnetic technologies, including insurance, banking, aerospace, as well as health care. The main components of these new storage technologies are RAID and SAN. SAN refers to storage area network, which is a complex mechanism of switches and connections that allow multiple systems to store huge amounts of data securely and safely.

  7. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    PubMed

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  8. Reinventing Batteries for Grid Storage

    ScienceCinema

    Banerjee, Sanjoy

    2017-12-09

    The City University of New York's Energy Institute, with the help of ARPA-E funding, is creating safe, low cost, rechargeable, long lifecycle batteries that could be used as modular distributed storage for the electrical grid. The batteries could be used at the building level or the utility level to offer benefits such as capture of renewable energy, peak shaving and microgridding, for a safer, cheaper, and more secure electrical grid.

  9. Graphene oxide/metal nanocrystal multilaminates as the atomic limit for safe and selective hydrogen storage.

    PubMed

    Cho, Eun Seon; Ruminski, Anne M; Aloni, Shaul; Liu, Yi-Sheng; Guo, Jinghua; Urban, Jeffrey J

    2016-02-23

    Interest in hydrogen fuel is growing for automotive applications; however, safe, dense, solid-state hydrogen storage remains a formidable scientific challenge. Metal hydrides offer ample storage capacity and do not require cryogens or exceedingly high pressures for operation. However, hydrides have largely been abandoned because of oxidative instability and sluggish kinetics. We report a new, environmentally stable hydrogen storage material constructed of Mg nanocrystals encapsulated by atomically thin and gas-selective reduced graphene oxide (rGO) sheets. This material, protected from oxygen and moisture by the rGO layers, exhibits exceptionally dense hydrogen storage (6.5 wt% and 0.105 kg H2 per litre in the total composite). As rGO is atomically thin, this approach minimizes inactive mass in the composite, while also providing a kinetic enhancement to hydrogen sorption performance. These multilaminates of rGO-Mg are able to deliver exceptionally dense hydrogen storage and provide a material platform for harnessing the attributes of sensitive nanomaterials in demanding environments.

  10. Safe Hazmat Storage Tips.

    ERIC Educational Resources Information Center

    Neville, Angela

    1996-01-01

    Provides a list of recommendations for safely managing hazardous waste containers. Encourages training of employees on the hazards of the wastes they handle and the correct procedures for managing containers. (DDR)

  11. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  12. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  13. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  14. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  15. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  16. Safe and Secure

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2010-01-01

    The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…

  17. Safe and Secure

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2004-01-01

    Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…

  18. Select Generic Dry-Storage Pilot Plant Design for Safeguards and Security by Design (SSBD) per Used Fuel Campaign

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demuth, Scott Francis; Sprinkle, James K.

    As preparation to the year-end deliverable (Provide SSBD Best Practices for Generic Dry-Storage Pilot Scale Plant) for the Work Package (FT-15LA040501–Safeguards and Security by Design for Extended Dry Storage), the initial step was to select a generic dry-storage pilot plant design for SSBD. To be consistent with other DOE-NE Fuel Cycle Research and Development (FCR&D) activities, the Used Fuel Campaign was engaged for the selection of a design for this deliverable. For the work Package FT-15LA040501–“Safeguards and Security by Design for Extended Dry Storage”, SSBD will be initiated for the Generic Dry-Storage Pilot Scale Plant described by the layout ofmore » Reference 2. SSBD will consider aspects of the design that are impacted by domestic material control and accounting (MC&A), domestic security, and international safeguards.« less

  19. Graphene oxide/metal nanocrystal multilaminates as the atomic limit for safe and selective hydrogen storage

    DOE PAGES

    Cho, Eun Seon; Ruminski, Anne M.; Aloni, Shaul; ...

    2016-02-23

    Interest in hydrogen fuel is growing for automotive applications; however, safe, dense, solid-state hydrogen storage remains a formidable scientific challenge. Metal hydrides offer ample storage capacity and do not require cryogens or exceedingly high pressures for operation. However, hydrides have largely been abandoned because of oxidative instability and sluggish kinetics. We report a new, environmentally stable hydrogen storage material constructed of Mg nanocrystals encapsulated by atomically thin and gas-selective reduced graphene oxide (rGO) sheets. This material, protected from oxygen and moisture by the rGO layers, exhibits exceptionally dense hydrogen storage (6.5 wt% and 0.105 kg H 2 per litre inmore » the total composite). As rGO is atomically thin, this approach minimizes inactive mass in the composite, while also providing a kinetic enhancement to hydrogen sorption performance. In conclusion, these multilaminates of rGO-Mg are able to deliver exceptionally dense hydrogen storage and provide a material platform for harnessing the attributes of sensitive nanomaterials in demanding environments.« less

  20. Effective Use of Household Water Treatment and Safe Storage in Response to the 2010 Haiti Earthquake

    PubMed Central

    Lantagne, Daniele; Clasen, Thomas

    2013-01-01

    When water supplies are compromised during an emergency, responders often recommend household water treatment and safe storage (HWTS) methods, such as boiling or chlorination. We evaluated the near- and longer-term impact of chlorine and filter products distributed shortly after the 2010 earthquake in Haiti. HWTS products were deemed as effective to use if they actually improved unsafe household drinking water to internationally accepted microbiological water quality standards. The acute emergency survey (442 households) was conducted within 8 weeks of emergency onset; the recovery survey (218 households) was conducted 10 months after onset. Effective use varied by HWTS product (from 8% to 63% of recipients in the acute phase and from 0% to 46% of recipients in the recovery phase). Higher rates of effective use were associated with programs that were underway in Haiti before the emergency, had a plan at initial distribution for program continuation, and distributed products with community health worker support and a safe storage container. PMID:23836571

  1. Secure, safe, and sensitive solutions.

    PubMed

    Hughan, Tina

    2012-04-01

    Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend.

  2. Prevention of firearm injuries with gun safety devices and safe storage: an Eastern Association for the Surgery of Trauma systematic review.

    PubMed

    Violano, Pina; Bonne, Stephanie; Duncan, Thomas; Pappas, Peter; Christmas, A Britton; Dennis, Andrew; Goldberg, Stephanie; Greene, Wendy; Hirsh, Michael; Shillinglaw, William; Robinson, Bryce; Crandall, Marie

    2018-03-08

    Over 50,000 homicides and suicides occur each year. An estimated half of all U.S. households are believed to have a firearm present, making them one of the most ubiquitous consumer products. Our goal was to determine if the manner of storage of a firearm in a home could potentially make a difference in the outcomes of intentional and unintentional injuries involving a firearm; specifically addressing the use of gun safes and devices that block/disable firearm function (trigger locks, cable locks, etc.). A comprehensive review of the literature was performed. We used GRADE (Grading of Recommendations Assessment, Development, and Evaluation) methodology to assess the breadth and quality of the data specific to our PICO (Population, Intervention, Comparator, Outcomes) questions. A total of 176 studies were initially identified, then 120 more added after a subsequent, literature review with 97 removed as duplicates. One hundred and ninety-one case reports, case series, and reviews were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of two studies which merited inclusion for PICO #1, should gun locks be used to prevent firearm injuries and six studies which merited inclusion for PICO #2, should safe storage for guns be used to prevent firearm injuries. PICO 1: We conditionally recommend that gun locks be used to prevent unintentional firearm injury.PICO 2: Because of the large effect size and the reasonable quality of available evidence with safe storage of firearms, we recommend safe storage prevent firearm-related injuries. Systematic review, level III.

  3. Digital Photograph Security: What Plastic Surgeons Need to Know.

    PubMed

    Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H

    2015-11-01

    Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.

  4. Strategies for Countering Terrorist Safe Havens

    DTIC Science & Technology

    2014-02-20

    within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to...leadership targeting within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case ...surrogate forces and pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case

  5. Progress and future direction for the interim safe storage and disposal of Hanford high-level waste

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kinzer, J.E.; Wodrich, D.D.; Bacon, R.F.

    This paper describes the progress made at the largest environmental cleanup program in the United States. Substantial advances in methods to start interim safe storage of Hanford Site high-level wastes, waste characterization to support both safety- and disposal-related information needs, and proceeding with cost-effective disposal by the U.S. Department of Energy (DOE) and its Hanford Site contractors, have been realized. Challenges facing the Tank Waste Remediation System (TWRS) Program, which is charged with the dual and parallel missions of interim safe storage and disposal of the high-level tank waste stored at the Hanford Site, are described. In these times ofmore » budget austerity, implementing an ongoing program that combines technical excellence and cost effectiveness is the near-term challenge. The technical initiatives and progress described in this paper are made more cost effective by DOE`s focus on work force productivity improvement, reduction of overhead costs, and reduction, integration and simplification of DOE regulations and operations requirements to more closely model those used in the private sector.« less

  6. Anatase TiO2 ultrathin nanobelts derived from room-temperature-synthesized titanates for fast and safe lithium storage

    PubMed Central

    Wen, Wei; Wu, Jin-ming; Jiang, Yin-zhu; Yu, Sheng-lan; Bai, Jun-qiang; Cao, Min-hua; Cui, Jie

    2015-01-01

    Lithium-ion batteries (LIBs) are promising energy storage devices for portable electronics, electric vehicles, and power-grid applications. It is highly desirable yet challenging to develop a simple and scalable method for constructions of sustainable materials for fast and safe LIBs. Herein, we exploit a novel and scalable route to synthesize ultrathin nanobelts of anatase TiO2, which is resource abundant and is eligible for safe anodes in LIBs. The achieved ultrathin nanobelts demonstrate outstanding performances for lithium storage because of the unique nanoarchitecture and appropriate composition. Unlike conventional alkali-hydrothermal approaches to hydrogen titanates, the present room temperature alkaline-free wet chemistry strategy guarantees the ultrathin thickness for the resultant titanate nanobelts. The anatase TiO2 ultrathin nanobelts were achieved simply by a subsequent calcination in air. The synthesis route is convenient for metal decoration and also for fabricating thin films of one/three dimensional arrays on various substrates at low temperatures, in absence of any seed layers. PMID:26133276

  7. A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications.

    PubMed

    Bao, Shu-Di; Chen, Meng; Yang, Guang-Zhong

    2017-11-01

    A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet-based applications and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally and the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks.

  8. [Anniversary of the medical department of the Federal Office for Safe Storage and Destruction of Chemical Weapons].

    PubMed

    Kuz'menko, I E

    2013-01-01

    The article is devoted to the process of formation and development of CW destruction management system and medical support of professional activities of personnel. Founders of Medical department of the Federal Directorate for Safe Storage and Destruction of Chemical Weapons are presented. Main principles and ways of working of medical department in specific conditions are covered.

  9. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    PubMed

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Ensuring Data Storage Security in Tree cast Routing Architecture for Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kumar, K. E. Naresh; Sagar, U. Vidya; Waheed, Mohd. Abdul

    2010-10-01

    In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, this routing architecture moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this paper, we focus on data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in this architecture, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server

  11. Strategies for Countering Terrorist Safe Havens

    DTIC Science & Technology

    2013-12-01

    tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine these strategies...safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine...pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case studies will demonstrate

  12. How Safe Are Our Libraries?

    ERIC Educational Resources Information Center

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  13. Efficient and secure outsourcing of genomic data storage.

    PubMed

    Sousa, João Sá; Lefebvre, Cédric; Huang, Zhicong; Raisaro, Jean Louis; Aguilar-Melchor, Carlos; Killijian, Marc-Olivier; Hubaux, Jean-Pierre

    2017-07-26

    Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related to privacy and security. This calls for new sophisticated techniques that ensure data protection from untrusted cloud providers and that still enable researchers to obtain useful information. We present a novel privacy-preserving algorithm for fully outsourcing the storage of large genomic data files to a public cloud and enabling researchers to efficiently search for variants of interest. In order to protect data and query confidentiality from possible leakage, our solution exploits optimal encoding for genomic variants and combines it with homomorphic encryption and private information retrieval. Our proposed algorithm is implemented in C++ and was evaluated on real data as part of the 2016 iDash Genome Privacy-Protection Challenge. Results show that our solution outperforms the state-of-the-art solutions and enables researchers to search over millions of encrypted variants in a few seconds. As opposed to prior beliefs that sophisticated privacy-enhancing technologies (PETs) are unpractical for real operational settings, our solution demonstrates that, in the case of genomic data, PETs are very efficient enablers.

  14. Field efficacy evaluation and post-treatment contamination risk assessment of an ultraviolet disinfection and safe storage system.

    PubMed

    Reygadas, Fermin; Gruber, Joshua S; Ray, Isha; Nelson, Kara L

    2015-11-15

    Inconsistent use of household water treatment and safe storage (HWTS) systems reduces their potential health benefits. Ultraviolet (UV) disinfection is more convenient than some existing HWTS systems, but it does not provide post-treatment residual disinfectant, which could leave drinking water vulnerable to recontamination. In this paper, using as-treated analyses, we report on the field efficacy of a UV disinfection system at improving household drinking water quality in rural Mexico. We further assess the risk of post-treatment contamination from the UV system, and develop a process-based model to better understand household risk factors for recontamination. This study was part of a larger cluster-randomized stepped wedge trial, and the results complement previously published population-level results of the intervention on diarrheal prevalence and water quality. Based on the presence of Escherichia coli (proportion of households with ≥ 1 E. coli/100 mL), we estimated a risk difference of -28.0% (95% confidence interval (CI): -33.9%, -22.1%) when comparing intervention to control households; -38.6% (CI: -48.9%, -28.2%) when comparing post- and pre-intervention results; and -37.1% (CI: -45.2%, -28.9%) when comparing UV disinfected water to alternatives within the household. We found substantial increases in post-treatment E. coli contamination when comparing samples from the UV system effluent (5.0%) to samples taken from the storage container (21.1%) and drinking glasses (26.0%). We found that improved household infrastructure, additional extractions from the storage container, additional time from when the storage container was filled, and increased experience of the UV system operator were associated with reductions in post-treatment contamination. Our results suggest that the UV system is efficacious at improving household water quality when used as intended. Promoting safe storage habits is essential for an effective UV system dissemination. The drinking

  15. Improvement of a Chemical Storage Room Ventilation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yousif, Emad; Al-Dahhan, Wedad; Abed, Rashed Nema

    Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. This manuscript is the third in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. We summarize an improvement to the chemical storage room ventilation system at Al-Nahrain University to create and maintain a safe working atmosphere in an area where chemicals are stored and handled, using US andmore » European design practices, standards, and regulations.« less

  16. Perceptions of firearms and suicide: The role of misinformation in storage practices and openness to means safety measures.

    PubMed

    Anestis, Michael D; Butterworth, Sarah E; Houtsma, Claire

    2018-02-01

    Firearm ownership and unsafe storage increase risk for suicide. Little is known regarding factors that influence storage practices and willingness to engage in means safety. Utilizing Amazon's Mechanical Turk program, we recruited an online sample of 300 adults living in the US who own at least one firearm. Firearm storage practices and openness to means safety measures were assessed using items designed for this study. Data were collected and analyzed in 2017. Firearms stored in non-secure locations and without a locking device were associated with lower beliefs in the relationship between firearm storage and suicide risk. Fearlessness about death moderated the association between current secure versus non-secure storage and beliefs regarding firearm storage and suicide risk, in that storage practices and beliefs were more strongly related at higher levels of fearlessness about death. For both secure and locked storage of a firearm, there was a significant indirect effect of current storage practices on willingness to engage in means safety in the future through current beliefs regarding the relationship between firearm storage and suicide risk. Unsafe storage practices were largely associated with an unwillingness to store firearms more safely or to allow a trusted peer to temporarily store the firearm outside the home in order to prevent their own or someone else's suicide. Self-report and cross-sectional data were used. Results may not generalize to non-firearm owners. Firearm owners are prone to inaccurate beliefs about the relationship between firearms and suicide. These beliefs may influence both current firearm storage practices and the willingness to engage in means safety. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. A&M. Radioactive parts security storage area, TAN647 and TAN648. Plot ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    A&M. Radioactive parts security storage area, TAN-647 and TAN-648. Plot plan, fencing details. Relationship to hot shop and railroad turntable. Ralph M. Parsons 1480-7-ANP/GE-3-102. Date: November 19958. Approved by INEEL Classification Office for public release. INEEL index no. 034-0100-00-693-107447 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID

  18. Safe-haven locking device

    DOEpatents

    Williams, J.V.

    1984-04-26

    Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.

  19. Determination of influence factors and accident rates for the Armored Tractor/Safe Secure Trailer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.S.; Clauss, D.B.; Blower, D.F.

    1994-04-01

    Operating environments, such as road type, road location, and time of day, play an important role in the observed accident rates of heavy trucks used in general commerce. These same factors influence the accident rate of the Armored Tractor/Safe Secure Trailer (AT/SST) used by the Department of Energy to transport hazardous cargos within the continental United States. This report discusses the development of accident rate influence factors. These factors, based on heavy trucks used in general commerce, are used to modify the observed overall AT/SST accident rate to account for the different operating environments.

  20. Time and Space Partition Platform for Safe and Secure Flight Software

    NASA Astrophysics Data System (ADS)

    Esquinas, Angel; Zamorano, Juan; de la Puente, Juan A.; Masmano, Miguel; Crespo, Alfons

    2012-08-01

    There are a number of research and development activities that are exploring Time and Space Partition (TSP) to implement safe and secure flight software. This approach allows to execute different real-time applications with different levels of criticality in the same computer board. In order to do that, flight applications must be isolated from each other in the temporal and spatial domains. This paper presents the first results of a partitioning platform based on the Open Ravenscar Kernel (ORK+) and the XtratuM hypervisor. ORK+ is a small, reliable realtime kernel supporting the Ada Ravenscar Computational model that is central to the ASSERT development process. XtratuM supports multiple virtual machines, i.e. partitions, on a single computer and is being used in the Integrated Modular Avionics for Space study. ORK+ executes in an XtratuM partition enabling Ada applications to share the computer board with other applications.

  1. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging doesmore » not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4« less

  2. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  3. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  4. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  5. Ethylene oxide sterilisation--is it safe?

    PubMed Central

    Gillespie, E H; Jackson, J M; Owen, G R

    1979-01-01

    Tests show that ethylene oxide penetrates and can sterilise long narrow tubes in a hospital ethylene oxide steriliser. Residual ethylene oxide levels in plastic tubing after sterilisation have been estimated. Although initially the levels were very high, storage for four days at room temperature reduced them to a safe level. If adequate controls of the sterilising process and storage are carried out, sterilisation by ethylene oxide is considered to be safe for new plastics and clean equipment. Images Figure PMID:512032

  6. Information storage for health-care providers: it's not as simple as it seems.

    PubMed

    Hanauer, David

    2004-01-01

    As medical practices migrate from paper to computers for record keeping, new issues surrounding the safe storage of such data are arising. These range from choosing an electronic storage format to ensuring that any electronic information stored today will be available and readable years into the future. Privacy and security issues also continue to be important, especially since the HIPAA regulations were instituted. With the rapid advances in technology, finding the right solution may be like trying to hit a moving target, yet some basic principles, outlined in this article, should make this difficult task easier.

  7. Thermally responsive polymer electrolytes for inherently safe electrochemical energy storage

    NASA Astrophysics Data System (ADS)

    Kelly, Jesse C.

    -off" ratio in electrochemical activity at elevated temperatures. Overall, solution pH and conductivity were altered by an order of magnitude and device performance (ability to store charge) decreased by over 70%. After demonstration of a model responsive electrolyte in an aqueous system, ionic liquid (IL) based electrolytes were developed as a means of controlling the electrochemical performance in the non-aqueous environments that batteries, specifically Li-ion, require. Here, two systems were developed: (1) an electrolyte comprising poly(ethylene oxide) (PEO), the IL, [EMIM][BF4], and a lithium salt and (2) an electrolyte comprising poly(benzyl methacrylate) (PBzMA), the IL, [EMIM][TFSI], and a lithium salt. In each system, the polymer-IL phase separation inhibited device operation at elevated temperatures. For the PEO/IL electrolyte, the thermally induced liquid-liquid phase separation was shown to decrease the ionic conductivity, thereby affecting the concentration of ions at the electrode. Additionally, an increasing charge transfer resistance associated with the phase separated polymer coating the porous electrode was shown to limit electrochemical activity significantly. For the PBzMA/IL electrolyte, the solid-liquid phase separation did not show a change in conductivity, but did cause a drastic increase in charge transfer resistance, effectively shutting off Li-ion battery operation at high temperatures. Such responsive mixtures provide a transformative approach to regulating electrochemical processes, which is necessary to achieve inherently safe operation in large format energy storage with EDLCs, supercapacitors and Li-ion batteries.

  8. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  9. Information security : is your information safe?

    DOT National Transportation Integrated Search

    1999-01-01

    This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...

  10. Inventory of Safety-related Codes and Standards for Energy Storage Systems with some Experiences related to Approval and Acceptance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.

    The purpose of this document is to identify laws, rules, model codes, codes, standards, regulations, specifications (CSR) related to safety that could apply to stationary energy storage systems (ESS) and experiences to date securing approval of ESS in relation to CSR. This information is intended to assist in securing approval of ESS under current CSR and to identification of new CRS or revisions to existing CRS and necessary supporting research and documentation that can foster the deployment of safe ESS.

  11. Safe teleradiology: information assurance as project planning methodology

    NASA Astrophysics Data System (ADS)

    Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2003-05-01

    This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the

  12. Cryptography from noisy storage.

    PubMed

    Wehner, Stephanie; Schaffner, Christian; Terhal, Barbara M

    2008-06-06

    We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; i.e., the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage; however, we consider an explicit noise model inspired by present-day technology. To illustrate the power of this new model, we show that a protocol for oblivious transfer is secure for any amount of quantum-storage noise, as long as honest players can perform perfect quantum operations. Our model also allows us to show the security of protocols that cope with noise in the operations of the honest players and achieve more advanced tasks such as secure identification.

  13. How To Keep Your Schools Safe and Secure.

    ERIC Educational Resources Information Center

    Gilbert, Christopher B.

    1996-01-01

    Discusses unforeseen costs (including potential litigation expenses), benefits, and consequences of adopting security measures (such as metal detectors, drug dogs, security cameras, campus police, dress codes, crime watch programs, and communication devices) to counter on-campus violence and gang activity. High-tech gadgetry alone is insufficient.…

  14. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe...

  15. Chlorination and safe storage of household drinking water in developing countries to reduce waterborne disease.

    PubMed

    Sobsey, M D; Handzel, T; Venczel, L

    2003-01-01

    Simple, effective and affordable methods are needed to treat and safely store non-piped, gathered household water. This study evaluated point-of-use chlorination and storage in special plastic containers of gathered household water for improving microbial quality and reducing diarrhoeal illness of consumers living under conditions of poor sanitation and hygiene. Community families were recruited and randomly divided into intervention (household water chlorination and storage in a special container) and control (no intervention) households. Microbes in stored household water were extensively inactivated by 1-5-mg/L doses of hypochlorite. Escherichia coli levels in stored household waters were < 1/100 mL in most intervention households but readily detectable at high levels in control households. Stored water of intervention households was also lower in Clostridium perfringens and heterotrophic plate count bacteria than in control households. The intervention reduced household diarrhoeal illness. In Bolivia, monthly episodes of household diarrhoeal illness were 1.25 and 2.2 in intervention and control families, respectively (P = < 0.002) indicating that 43% of community diarrhoea was preventable by using the intervention. In Bangladesh, mean episodes of child diarrhoea/1,000 d were 19.6 and 24.8 in intervention and control groups respectively (P = < 0.03) indicating that about 24% of observed diarrhoea was preventable by using the intervention. Chlorine disinfection and storage in an appropriate container significantly improved the microbiological quality of non-piped household drinking water and reduced community diarrhoeal disease. Widespread use of this simple treatment and storage system for non-piped domestic water has the potential to dramatically reduce the global burden of waterborne diarrhoeal disease.

  16. Keys to a Safe, Secure School.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…

  17. 7 CFR 400.408 - Safeguards and storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...

  18. 7 CFR 400.408 - Safeguards and storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...

  19. 7 CFR 400.408 - Safeguards and storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Safeguards and storage. 400.408 Section 400.408... and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.408 Safeguards and storage. Records must be maintained in secured storage with proper safeguards sufficient to...

  20. 32 CFR 2001.53 - Open storage areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... storage. Doors other than those secured with the aforementioned locks shall be secured from the inside...

  1. 32 CFR 2001.53 - Open storage areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Open storage areas. 2001.53 Section 2001.53....53 Open storage areas. This section describes the minimum construction standards for open storage... storage. Doors other than those secured with the aforementioned locks shall be secured from the inside...

  2. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is...

  3. Sensors-network and its application in the intelligent storage security

    NASA Astrophysics Data System (ADS)

    Zhang, Qingying; Nicolescu, Mihai; Jiang, Xia; Zhang, Ying; Yue, Weihong; Xiao, Weihong

    2004-11-01

    Intelligent storage systems run on different advanced technologies, such as linear layout, business intelligence and data mining. Security, the basic desire of the storage system, has been focused on with the indraught of multimedia communication technology and sensors" network. Along with the developing of science and the social demands, multifarious alarming system has been designed and improved to be intelligentized, modularized and have network connections. It is of great moment to make the storage, and further more, the logistics system more and more efficient and perfect with modern science and technology. Diversified information on the spot should be caught by different kinds of sensors. Those signals are treated and communicated to the control center to give the further actions. For fire-proofing, broad-spectrum gas sensors, fume sensors, flame sensors and temperature sensors are used to catch the information in their own ways. Once the fire is taken somewhere, the sensors work by the fume, temperature, and flame as well as gas immediately. Meanwhile the intelligent control system starts. It passes the tidings to the center unit. At the same time, it sets those movable walls on to work quickly to obstruct the fire"s spreading. While for guarding the warehouse against theft, cut-off sensors, body sensors, photoelectric sensors, microwave sensors and closed-circuit television as well as electronic clocks are available to monitor the warehouse reasonably. All of those sensors work in a net way. The intelligent control system is made with a digital circuit instead of traditional switch one. This system can work in a better way in many cases. Its reliability is high and the cost is low.

  4. Plutonium storage criteria

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chung, D.; Ascanio, X.

    1996-05-01

    The Department of Energy has issued a technical standard for long-term (>50 years) storage and will soon issue a criteria document for interim (<20 years) storage of plutonium materials. The long-term technical standard, {open_quotes}Criteria for Safe Storage of Plutonium Metals and Oxides,{close_quotes} addresses the requirements for storing metals and oxides with greater than 50 wt % plutonium. It calls for a standardized package that meets both off-site transportation requirements, as well as remote handling requirements from future storage facilities. The interim criteria document, {open_quotes}Criteria for Interim Safe Storage of Plutonium-Bearing Solid Materials{close_quotes}, addresses requirements for storing materials with less thanmore » 50 wt% plutonium. The interim criteria document assumes the materials will be stored on existing sites, and existing facilities and equipment will be used for repackaging to improve the margin of safety.« less

  5. Protection of therapeutic antibodies from visible light induced degradation: Use safe light in manufacturing and storage.

    PubMed

    Du, Cheng; Barnett, Gregory; Borwankar, Ameya; Lewandowski, Angela; Singh, Nripen; Ghose, Sanchayita; Borys, Michael; Li, Zheng Jian

    2018-06-01

    As macromolecules, biologics are susceptible to light exposure, which induces oxidation of multiple amino acid residues including tryptophan, tyrosine, phenylalanine, cysteine and methionine. Pertaining to safety, efficacy and potency, light-induced oxidation of biologics has been widely studied and necessary precautions need to be taken during biologics manufacturing process, drug substance and products handling and storage. Proteins will degrade to varying extents depending on the protein properties, degradation pathways, formulation compositions and type of light source. In addition to UV light, which has been widely known to degrade proteins, visible light from indoor fluorescent lighting also can mediate protein degradation. In this report, we examine and identify wavelengths in the visual spectrum (400-700 nm) that can cause monoclonal antibody and histidine buffer degradation. Installation of safe lights which exclude the identified damaging wavelengths from visible spectra in manufacturing and storage areas can provide a balance between lighting requirement for human operators and their safety and conservation of product quality. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. Comprehensive security framework for the communication and storage of medical images

    NASA Astrophysics Data System (ADS)

    Slik, David; Montour, Mike; Altman, Tym

    2003-05-01

    Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.

  7. Practical School Security: Basic Guidelines for Safe and Secure Schools.

    ERIC Educational Resources Information Center

    Trump, Kenneth S.

    This book is written primarily for elementary and secondary school administrators and teachers, but college faculty involved in providing teacher or administrator education would also benefit from the practical approach to issues of school security. Chapters 1 through 3 establish a framework for dealing with the myths and realities of school…

  8. Keeping Campuses Safe.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    1999-01-01

    Describes how colleges and universities are using technology, as well as traditional methods, to keep campuses safe and reduce crime. Topics include using free pizza in a successful contest to teach students about campus safety, installing security cameras, using access-control cards, providing adequate lighting, and creating a bicycle patrol…

  9. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    EPA Pesticide Factsheets

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  10. The safe home project.

    PubMed

    Arphorn, Sara; Jiraniratisai, Sopaphan; Rungtakul, Rungsri; Phutta, Nikom

    2011-12-01

    The Thai Health Promotion Foundation supported the Improvement of Quality of Life of Informal Workers project in Ban Luang District, Amphur Photaram, Ratchaburi Province. There were many informal workers in Ban Luang District. Sweet-crispy fish producers in Ban Luang were the largest group among the sweet-crispy fish producers in Thailand. This project was aimed at improving living and working conditions of informal workers, with a focus on the sweet-crispy fish group. Good practices of improved living and working conditions were used to help informal workers build safe, healthy and productive work environments. These informal workers often worked in substandard conditions and were exposed to various hazards in the working area. These hazards included risk of exposure to hot work environment, ergonomics-related injuries, chemical hazards, electrical hazards etc. Ergonomics problems were commonly in the sweet-crispy fish group. Unnatural postures such as prolonged sitting were performed dominantly. One hundred and fifty informal workers participated in this project. Occupational health volunteers were selected to encourage occupational health and safety in four groups of informal workers in 2009. The occupational health volunteers trained in 2008 were farmers, beauty salon workers and doll makers. The occupational health and safety knowledge is extended to a new informal worker group: sweet-crispy fish producer, in 2009. The occupational health and safety training for sweet-crispy fish group is conducted by occupational health volunteers. The occupational health volunteers increased their skills and knowledge assist in to make safe home and safe community through participatory oriented training. The improvement of living and working condition is conducted by using a modified WISH, Work Improvement for Safe Home, checklist. The plans of improvement were recorded. The informal workers showed improvement mostly on material handling and storage. The safe uses and safe

  11. SSeCloud: Using secret sharing scheme to secure keys

    NASA Astrophysics Data System (ADS)

    Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang

    2017-08-01

    With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.

  12. How to Be Safe and Secure against School Vandalism.

    ERIC Educational Resources Information Center

    Stover, Del

    1990-01-01

    During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…

  13. Flywheel Rotor Safe-Life Technology

    NASA Technical Reports Server (NTRS)

    Ratner, J. K. H.; Chang, J. B.; Christopher, D. A.; McLallin, Kerry L. (Technical Monitor)

    2002-01-01

    Since the 1960s, research has been conducted into the use of flywheels as energy storage systems. The-proposed applications include energy storage for hybrid and electric automobiles, attitude control and energy storage for satellites, and uninterruptible power supplies for hospitals and computer centers. For many years, however, the use of flywheels for space applications was restricted by the total weight of a system employing a metal rotor. With recent technological advances in the manufacturing of composite materials, however, lightweight composite rotors have begun to be proposed for such applications. Flywheels with composite rotors provide much higher power and energy storage capabilities than conventional chemical batteries. However, the failure of a high speed flywheel rotor could be a catastrophic event. For this reason, flywheel rotors are classified by the NASA Fracture Control Requirements Standard as fracture critical parts. Currently, there is no industry standard to certify a composite rotor for safe and reliable operation forth( required lifetime of the flywheel. Technical problems hindering the development of this standard include composite manufacturing inconsistencies, insufficient nondestructive evaluation (NDE) techniques for detecting defects and/or impact damage, lack of standard material test methods for characterizing composite rotor design allowables, and no unified proof (over-spin) test for flight rotors. As part of a flywheel rotor safe-life certification pro-ram funded b the government, a review of the state of the art in composite rotors is in progress. The goal of the review is to provide a clear picture of composite flywheel rotor technologies. The literature review has concentrated on the following topics concerning composites and composite rotors: durability (fatigue) and damage tolerance (safe-life) analysis/test methods, in-service NDE and health monitoring techniques, spin test methods/ procedures, and containment options

  14. Conceptual design report: Nuclear materials storage facility renovation. Part 6, Alternatives study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-07-14

    The Nuclear Materials Storage Facility (NMSF) at the Los Alamos National Laboratory (LANL) was a Fiscal Year (FY) 1984 line-item project completed in 1987 that has never been operated because of major design and construction deficiencies. This renovation project, which will correct those deficiencies and allow operation of the facility, is proposed as an FY 97 line item. The mission of the project is to provide centralized intermediate and long-term storage of special nuclear materials (SNM) associated with defined LANL programmatic missions and to establish a centralized SNM shipping and receiving location for Technical Area (TA)-55 at LANL. Based onmore » current projections, existing storage space for SNM at other locations at LANL will be loaded to capacity by approximately 2002. This will adversely affect LANUs ability to meet its mission requirements in the future. The affected missions include LANL`s weapons research, development, and testing (WRD&T) program; special materials recovery; stockpile survelliance/evaluation; advanced fuels and heat sources development and production; and safe, secure storage of existing nuclear materials inventories. The problem is further exacerbated by LANL`s inability to ship any materials offsite because of the lack of receiver sites for material and regulatory issues. Correction of the current deficiencies and enhancement of the facility will provide centralized storage close to a nuclear materials processing facility. The project will enable long-term, cost-effective storage in a secure environment with reduced radiation exposure to workers, and eliminate potential exposures to the public. This report is organized according to the sections and subsections outlined by Attachment 111-2 of DOE Document AL 4700.1, Project Management System. It is organized into seven parts. This document, Part VI - Alternatives Study, presents a study of the different storage/containment options considered for NMSF.« less

  15. 7 CFR 1421.103 - Authorized storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...

  16. 7 CFR 1421.103 - Authorized storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...

  17. 7 CFR 1421.103 - Authorized storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...

  18. 7 CFR 1421.103 - Authorized storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...

  19. 7 CFR 1421.103 - Authorized storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Authorized storage. 1421.103 Section 1421.103... § 1421.103 Authorized storage. (a) Authorized farm storage is: (1) A storage structure located on or off... determines to be controlled by the producer which affords safe storage of collateral pledged for a marketing...

  20. Safe and Secure America Act of 2009

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2009-03-12

    House - 04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.3961, which became Public Law 111-141 on 2/27/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. How the University of Texas system responded to the need for interim storage of low-level radioactive waste materials.

    PubMed

    Emery, Robert J

    2012-11-01

    Faced with the prospect of being unable to permanently dispose of low-level radioactive wastes (LLRW) generated from teaching, research, and patient care activities, component institutions of the University of Texas System worked collaboratively to create a dedicated interim storage facility to be used until a permanent disposal facility became available. Located in a remote section of West Texas, the University of Texas System Interim Storage Facility (UTSISF) was licensed and put into operation in 1993, and since then has provided safe and secure interim storage for up to 350 drums of dry solid LLRW at any given time. Interim storage capability provided needed relief to component institutions, whose on-site waste facilities could have possibly become overburdened. Experiences gained from the licensing and operation of the site are described, and as a new permanent LLRW disposal facility emerges in Texas, a potential new role for the storage facility as a surge capacity storage site in times of natural disasters and emergencies is also discussed.

  2. Geomechanical Modeling for Improved CO2 Storage Security

    NASA Astrophysics Data System (ADS)

    Rutqvist, J.; Rinaldi, A. P.; Cappa, F.; Jeanne, P.; Mazzoldi, A.; Urpi, L.; Vilarrasa, V.; Guglielmi, Y.

    2017-12-01

    This presentation summarizes recent modeling studies on geomechanical aspects related to Geologic Carbon Sequestration (GCS,) including modeling potential fault reactivation, seismicity and CO2 leakage. The model simulations demonstrates that the potential for fault reactivation and the resulting seismic magnitude as well as the potential for creating a leakage path through overburden sealing layers (caprock) depends on a number of parameters such as fault orientation, stress field, and rock properties. The model simulations further demonstrate that seismic events large enough to be felt by humans requires brittle fault properties as well as continuous fault permeability allowing for the pressure to be distributed over a large fault patch to be ruptured at once. Heterogeneous fault properties, which are commonly encountered in faults intersecting multilayered shale/sandstone sequences, effectively reduce the likelihood of inducing felt seismicity and also effectively impede upward CO2 leakage. Site specific model simulations of the In Salah CO2 storage site showed that deep fractured zone responses and associated seismicity occurred in the brittle fractured sandstone reservoir, but at a very substantial reservoir overpressure close to the magnitude of the least principal stress. It is suggested that coupled geomechanical modeling be used to guide the site selection and assisting in identification of locations most prone to unwanted and damaging geomechanical changes, and to evaluate potential consequence of such unwanted geomechanical changes. The geomechanical modeling can be used to better estimate the maximum sustainable injection rate or reservoir pressure and thereby provide for improved CO2 storage security. Whether damaging geomechanical changes could actually occur very much depends on the local stress field and local reservoir properties such the presence of ductile rock and faults (which can aseismically accommodate for the stress and strain induced by

  3. Safe Entry, Easy Exit

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2008-01-01

    After violent episodes too numerous to list and too terrible to forget, schools and universities have been focused for several years on enhancing security in their facilities. Doors are among the most critical points of concern for school personnel responsible for keeping buildings safe. Education institutions want doors that let the right people…

  4. Trust Model to Enhance Security and Interoperability of Cloud Environment

    NASA Astrophysics Data System (ADS)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  5. Data Safe Havens and Trust: Toward a Common Understanding of Trusted Research Platforms for Governing Secure and Ethical Health Research

    PubMed Central

    Nicholls, Jacqueline; Dobbs, Christine; Sethi, Nayha; Cunningham, James; Ainsworth, John; Heaven, Martin; Peacock, Trevor; Peacock, Anthony; Jones, Kerina; Laurie, Graeme; Kalra, Dipak

    2016-01-01

    In parallel with the advances in big data-driven clinical research, the data safe haven concept has evolved over the last decade. It has led to the development of a framework to support the secure handling of health care information used for clinical research that balances compliance with legal and regulatory controls and ethical requirements while engaging with the public as a partner in its governance. We describe the evolution of 4 separately developed clinical research platforms into services throughout the United Kingdom-wide Farr Institute and their common deployment features in practice. The Farr Institute is a case study from which we propose a common definition of data safe havens as trusted platforms for clinical academic research. We use this common definition to discuss the challenges and dilemmas faced by the clinical academic research community, to help promote a consistent understanding of them and how they might best be handled in practice. We conclude by questioning whether the common definition represents a safe and trustworthy model for conducting clinical research that can stand the test of time and ongoing technical advances while paying heed to evolving public and professional concerns. PMID:27329087

  6. A review on grain and nut deterioration and design of the dryers for safe storage with special reference to Turkish hazelnuts.

    PubMed

    Ozilgen, M; Ozdemir, M

    2001-01-01

    Turkey produces about 80% of the total hazelnut crop of the world. About 75% of the production are exported. In Turkey hazelnuts are traditionally sun dried, and may be subject to mold growth and subsequent mycotoxin formation due to prolonged drying time under humid and rainy weather conditions. Drying hazelnuts in a reasonable time after harvest is necessary for mycotoxin-free, high-quality products. In general, nuts and cereals contaminated by the toxins pose a potential hazard not only to the people of the producer countries, but also to people of the importing countries, if they should be regarded as safe by inefficient sampling plans, therefore preventing toxin formation actually benefits very large populations. Deterioration and health hazards associated with toxin contaminated hazelnuts and other nuts and cereals have similar causes and consequences; therefore, deterioration of the nuts and cereals in storage has been reviewed by considering as many grains and nuts as possible, then special reference was made to hazelnuts. Proper preharvest practices followed by proper drying and safe storage reduces the hazards associated with contamination by the toxins. This article reviews the pre- and post-harvest practices, and the grain- and nut-drying systems required for toxin-free products. Because drying is the major unit operation involving this process, the drying systems and the mathematical models required for their design is also discussed.

  7. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  8. The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm

    DTIC Science & Technology

    2017-03-01

    and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201

  9. Achieving the physical limits of the bounded-storage model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mandayam, Prabha; Wehner, Stephanie; Centre for Quantum Technologies, National University of Singapore, 2 Science Drive 3, 117543 Singapore

    2011-02-15

    Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security canmore » be extended to a larger class of noisy quantum memories.« less

  10. Optical Storage Technology Subgroup (FIMUG)

    DTIC Science & Technology

    1990-04-01

    SECURITY CLASSICATON O NGRS PAG E NPAGE OMNo. 0704- 01 " I a REPORT SECUR - ,. ASSF o RiSTRICTIVE MARKINGS Unclasified oJU IS M’ 2a SECURITY C,.ASS...USERS 22a. NAME OF RESPONSIBLE INDIVIDUAL i22o TELEPHONE (include Area Code) 22c OFFICE SYMBOL (I 00 Form 1473, JUN 06 Previous e1t3onJ art obSo1te...Mdium May Change Shape of Optical Storage." PC Week. 1988 (21 Jun). "More Volume Buyers Turning Eyes Toward Optical-Storage Market." PC Week. 1988 (25 Jul

  11. CarbonSAFE Illinois - Macon County

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whittaker, Steve

    CarbonSAFE Illinois is a a Feasibility study to develop an established geologic storage complex in Macon County, Illinois, for commercial-scale storage of industrially sourced CO2. Feasibility activities are focused on the Mt. Simon Storage Complex; a step-out well will be drilled near existing storage sites (i.e., the Midwest Geological Sequestration Consortium’s Illinois Basin – Decatur Project and the Illinois Industrial Carbon Capture and Storage Project) to further establish commercial viability of this complex and to evaluate EOR potential in a co-located oil-field trend. The Archer Daniels Midland facility (ethanol plant), City Water, Light, and Power in Springfield, Illinois (coal-fired powermore » station), and other regional industries are potential sources of anthropogenic CO2 for storage at this complex. Site feasibility will be evaluated through drilling results, static and dynamic modeling, and quantitative risk assessment. Both studies will entail stakeholder engagement, consideration of infrastructure requirements, existing policy, and business models. Project data will help calibrate the National Risk Assessment Partnership (NRAP) Toolkit to better understand the risks of commercial-scale carbon storage.« less

  12. Cryptonite: A Secure and Performant Data Repository on Public Clouds

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2012-06-29

    Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using amore » StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.« less

  13. 303-K Storage Facility closure plan. Revision 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1993-12-15

    Recyclable scrap uranium with zircaloy-2 and copper silicon alloy, uranium-titanium alloy, beryllium/zircaloy-2 alloy, and zircaloy-2 chips and fines were secured in concrete billets (7.5-gallon containers) in the 303-K Storage Facility, located in the 300 Area. The beryllium/zircaloy-2 alloy and zircaloy-2 chips and fines are designated as mixed waste with the characteristic of ignitability. The concretion process reduced the ignitability of the fines and chips for safe storage and shipment. This process has been discontinued and the 303-K Storage Facility is now undergoing closure as defined in the Resource Conservation and Recovery Act (RCRA) of 1976 and the Washington Administrative Codemore » (WAC) Dangerous Waste Regulations, WAC 173-303-040. This closure plan presents a description of the 303-K Storage Facility, the history of materials and waste managed, and the procedures that will be followed to close the 303-K Storage Facility. The 303-K Storage Facility is located within the 300-FF-3 (source) and 300-FF-5 (groundwater) operable units, as designated in the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement) (Ecology et al. 1992). Contamination in the operable units 300-FF-3 and 300-FF-5 is scheduled to be addressed through the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) of 1980 remedial action process. Therefore, all soil remedial action at the 304 Facility will be conducted as part of the CERCLA remedial action of operable units 300-FF-3 and 300-FF-5.« less

  14. Safe arming system for two-explosive munitions

    DOEpatents

    Jaroska, Miles F.; Niven, William A.; Morrison, Jasper J.

    1978-01-01

    A system for safely and positively detonating high-explosive munitions, including a source of electrical signals, a split-phase square-loop transformer responsive solely to a unique series of signals from the source for charging an energy storage circuit through a voltage doubling circuit, and a spark-gap trigger for initiating discharge of the energy in the storage circuit to actuate a detonator and thereby fire the munitions.

  15. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  16. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  17. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  18. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  19. Cryptography for Big Data Security

    DTIC Science & Technology

    2015-07-13

    Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S) Distribution A: Public Release Ariel Hamlin1 Nabil...Email: arkady@ll.mit.edu ii Contents 1 Cryptography for Big Data Security 1 1.1 Introduction...48 Chapter 1 Cryptography for Big Data Security 1.1 Introduction With the amount

  20. Supporting Safe, Secure and Caring Schools in Alberta.

    ERIC Educational Resources Information Center

    McMullen, Dean

    Alberta Learning expects all schools to have a safe and caring teaching and learning environment to ensure students have the opportunity to meet the standards of education set by the Minister of Learning. The primary objectives of this manual are to facilitate action that is legally, professionally, and educationally sound; identify and support…

  1. Aviation security : terrorist acts demonstrate urgent need to improve security at the nation's airports

    DOT National Transportation Integrated Search

    2001-09-20

    A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...

  2. Safe and Secure Federal Websites Act of 2014

    THOMAS, 113th Congress

    Rep. Bentivolio, Kerry L. [R-MI-11

    2013-12-03

    Senate - 07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  3. 78 FR 34335 - Foreign-Trade Zone (FTZ) 141-Monroe County, New York; Notification of Proposed Production...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-07

    ... steel, fire and water resistant storage chests, gun safes, security safes, portable security safes, cash..., touchpads, plastic gun racks, keypad assemblies, panel lock assemblies, door backs, plastic trays, drawers..., wood gun shelf racks, cable assemblies, communication cables, gasket kits, door springs, metal handles...

  4. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  5. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  6. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  7. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  8. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  9. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  10. The safe removal of frozen air from the annulus of an LH2 storage tank

    NASA Astrophysics Data System (ADS)

    Krenn, A.; Starr, S.; Youngquist, R.; Nurge, M.; Sass, J.; Fesmire, J.; Cariker, C.; Bhattacharya, A.

    2015-12-01

    Large Liquid Hydrogen (LH2) storage tanks are vital infrastructure for NASA. Eventually, air may leak into the evacuated and perlite filled annular region of these tanks. Although the vacuum level is monitored in this region, the extremely cold temperature causes all but the helium and neon constituents of air to freeze. A small, often unnoticeable pressure rise is the result. As the leak persists, the quantity of frozen air increases, as does the thermal conductivity of the insulation system. Consequently, a notable increase in commodity boil-off is often the first indicator of an air leak. Severe damage can result from normal draining of the tank. The warming air will sublimate which will cause a pressure rise in the annulus. When the pressure increases above the triple point, the frozen air will begin to melt and migrate downward. Collection of liquid air on the carbon steel outer shell may chill it below its ductility range, resulting in fracture. In order to avoid a structural failure, as described above, a method for the safe removal of frozen air is needed. A thermal model of the storage tank has been created using SINDA/FLUINT modelling software. Experimental work is progressing in an attempt to characterize the thermal conductivity of a perlite/frozen nitrogen mixture. A statistical mechanics model is being developed in parallel for comparison to experimental work. The thermal model will be updated using the experimental/statistical mechanical data, and used to simulate potential removal scenarios. This paper will address methodologies and analysis techniques for evaluation of two proposed air removal methods.

  11. The Safe Removal of Frozen Air from the Annulus of an LH2 Storage Tank

    NASA Technical Reports Server (NTRS)

    Krenn, A.; Starr, S.; Youngquist, R.; Nurge, M.; Sass, J.; Fesmire, J.; Cariker, C.; Bhattacharya, A.

    2015-01-01

    Large Liquid Hydrogen (LH2) storage tanks are vital infrastructure for NASA. Eventually, air may leak into the evacuated and perlite filled annular region of these tanks. Although the vacuum level is monitored in this region, the extremely cold temperature causes all but the helium and neon constituents of air to freeze. A small, often unnoticeable pressure rise is the result. As the leak persists, the quantity of frozen air increases, as does the thermal conductivity of the insulation system. Consequently, a notable increase in commodity boil-off is often the first indicator of an air leak. Severe damage can result from normal draining of the tank. The warming air will sublimate which will cause a pressure rise in the annulus. When the pressure increases above the triple point, the frozen air will begin to melt and migrate downward. Collection of liquid air on the carbon steel outer shell may chill it below its ductility range, resulting in fracture. In order to avoid a structural failure, as described above, a method for the safe removal of frozen air is needed. A thermal model of the storage tank has been created using SINDA/FLUINT modeling software. Experimental work is progressing in an attempt to characterize the thermal conductivity of a perlite/frozen nitrogen mixture. A statistical mechanics model is being developed in parallel for comparison to experimental work. The thermal model will be updated using the experimental/statistical mechanical data, and used to simulate potential removal scenarios. This paper will address methodologies and analysis techniques for evaluation of two proposed air removal methods.

  12. Safe and Durable High-Temperature Lithium-Sulfur Batteries via Molecular Layer Deposited Coating.

    PubMed

    Li, Xia; Lushington, Andrew; Sun, Qian; Xiao, Wei; Liu, Jian; Wang, Biqiong; Ye, Yifan; Nie, Kaiqi; Hu, Yongfeng; Xiao, Qunfeng; Li, Ruying; Guo, Jinghua; Sham, Tsun-Kong; Sun, Xueliang

    2016-06-08

    Lithium-sulfur (Li-S) battery is a promising high energy storage candidate in electric vehicles. However, the commonly employed ether based electrolyte does not enable to realize safe high-temperature Li-S batteries due to the low boiling and flash temperatures. Traditional carbonate based electrolyte obtains safe physical properties at high temperature but does not complete reversible electrochemical reaction for most Li-S batteries. Here we realize safe high temperature Li-S batteries on universal carbon-sulfur electrodes by molecular layer deposited (MLD) alucone coating. Sulfur cathodes with MLD coating complete the reversible electrochemical process in carbonate electrolyte and exhibit a safe and ultrastable cycle life at high temperature, which promise practicable Li-S batteries for electric vehicles and other large-scale energy storage systems.

  13. Bench vise adapter grips tubing securely and safely

    NASA Technical Reports Server (NTRS)

    Howland, B. T.; Jones, A. S., Jr.

    1966-01-01

    Plastic self-compressing adapter with grooves, attached to the jaws of a bench vise, secures thin-wall tubing vertically or horizontally during cutting and flaring operations without marring or damaging it. Magnets incorporated in both sections of the adapter prevent detachment from the jaws when the vise is opened.

  14. 42 CFR 3.106 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...

  15. 42 CFR 3.106 - Security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...

  16. 42 CFR 3.106 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...

  17. Recommended Practices for the Safe Design and Operation of Flywheels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bender, Donald Arthur

    2015-12-01

    Flywheel energy storage systems are in use globally in increasing numbers . No codes pertaining specifically to flywheel energy storage exist. A number of industrial incidents have occurred. This protocol recommends a technical basis for safe flywheel de sign and operation for consideration by flywheel developers, users of flywheel systems and standards setting organizations.

  18. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  19. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  20. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  1. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  2. 27 CFR 22.92 - Storage facilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Storage facilities. 22.92... Storage facilities. (a) Storerooms or compartments shall be so constructed and secured as to prevent unauthorized access and will be equipped for locking. These storage facilities shall be of sufficient capacity...

  3. Storage of household firearms: an examination of the attitudes and beliefs of married women with children

    PubMed Central

    Johnson, R. M.; Runyan, C. W.; Coyne-Beasley, T.; Lewis, M. A.; Bowling, J. M.

    2008-01-01

    Although safe firearm storage is a promising injury prevention strategy, many parents do not keep their firearms unloaded and locked up. Using the theory of planned behavior as a guiding conceptual framework, this study examines factors associated with safe storage among married women with children and who have firearms in their homes. Data come from a national telephone survey (n = 185). We examined beliefs about defensive firearm use, subjective norms, perceived behavioral control and firearm storage practices. A Wilcoxon–Mann–Whitney test was conducted to assess associations between psychosocial factors and firearm storage practices. Women were highly motivated to keep firearms stored safely. Those reporting safe storage practices had more favorable attitudes, more supportive subjective norms and higher perceptions of behavioral control than those without safe storage. One-fourth believed a firearm would prevent a family member from being hurt in case of a break-in, 58% believed a firearm could scare off a burglar. Some 63% said they leave decisions about firearm storage to their husbands. Women were highly motivated to store firearms safely as evidenced by favorable attitudes, supportive subjective norms and high perceptions of behavioral control. This was especially true for those reporting safer storage practices. PMID:17890758

  4. 76 FR 38463 - SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight Responsibilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... Parts 30 and 3400 SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight... No. FR-5271-F-03] RIN 2502-A170 SAFE Mortgage Licensing Act: Minimum Licensing Standards and... pursuant to the Secure and Fair Enforcement Mortgage Licensing Act of 2008 (SAFE Act or Act), to ensure...

  5. US Capitol Security - Our Nation's Capitol - A Safe Place for All?

    DOT National Transportation Integrated Search

    2000-08-01

    This article describes the Volpe Centrer's role in developing a new security system for the US Capitol. The US Capitol Police turned to the Center because of our proven capabilities as security experts. We brought to the project: our knowledge of sec...

  6. Architecture of security management unit for safe hosting of multiple agents

    NASA Astrophysics Data System (ADS)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  7. Long-term storage and safe retrieval of DNA from microorganisms for molecular analysis using FTA matrix cards.

    PubMed

    Rajendram, D; Ayenza, R; Holder, F M; Moran, B; Long, T; Shah, H N

    2006-12-01

    We assessed the potential use of Whatman FTA paper as a device for archiving and long-term storage of bacterial cell suspensions of over 400 bacterial strains representing 61 genera, the molecular applications of immobilised DNA on FTA paper, and tested its microbial inactivation properties. The FTA paper extracted bacterial DNA is of sufficiently high quality to successfully carryout the molecular detection of several key genes including 16S rRNA, esp (Enterococcus surface protein), Bft (Bacteroides fragilis enterotoxin) and por (porin protein) by PCR and for DNA fingerprinting by random amplified polymorphic DNA-PCR (RAPD-PCR). To test the long-term stability of the FTA immobilised DNA, 100 of the 400 archived bacterial samples were randomly selected following 3 years of storage at ambient temperature and PCR amplification was used to monitor its success. All of the 100 samples were successfully amplified using the 16S rDNA gene as a target and confirmed by DNA sequencing. Furthermore, the DNA was eluted into solution from the FTA cards using a new alkaline elution procedure for evaluation by real-time PCR-based assays. The viability of cells retained on the FTA cards varied among broad groups of bacteria. For the more fragile gram-negative species, no viable cells were retained even at high cell densities of between 10(7) and 10(8) colony forming units (cfu) ml(-1), and for the most robust species such as spore-formers and acid-fast bacteria, complete inactivation was achieved at cell densities ranging between 10(1) and 10(4) cfu ml(-1). The inactivation of bacterial cells on FTA cards suggest that this is a safe medium for the storage and transport of bacterial nucleic acids.

  8. Marine data security based on blockchain technology

    NASA Astrophysics Data System (ADS)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  9. Energy Storage | Transportation Research | NREL

    Science.gov Websites

    , and safe energy storage systems to power the next generation of electric-drive vehicles (EDVs). While lasting, safe, and operate at maximum efficiency in a wide range of driving conditions and climates. The Consumers, Industry, and the Environment As manufacturers develop new electric-drive vehicles, NREL acts as

  10. 30 CFR 57.4401 - Storage tank foundations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Storage tank foundations. 57.4401 Section 57... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations...

  11. 30 CFR 57.4401 - Storage tank foundations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Storage tank foundations. 57.4401 Section 57... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations...

  12. A community-based cluster randomised trial of safe storage to reduce pesticide self-poisoning in rural Sri Lanka: study protocol

    PubMed Central

    2011-01-01

    Background The WHO recognises pesticide poisoning to be the single most important means of suicide globally. Pesticide self-poisoning is a major public health and clinical problem in rural Asia, where it has led to case fatality ratios 20-30 times higher than self-poisoning in the developed world. One approach to reducing access to pesticides is for households to store pesticides in lockable "safe-storage" containers. However, before this approach can be promoted, evidence is required on its effectiveness and safety. Methods/Design A community-based cluster randomised controlled trial has been set up in 44,000 households in the North Central Province, Sri Lanka. A census is being performed, collecting baseline demographic data, socio-economic status, pesticide usage, self-harm and alcohol. Participating villages are then randomised and eligible households in the intervention arm given a lockable safe storage container for agrochemicals. The primary outcome will be incidence of pesticide self-poisoning over three years amongst individuals aged 14 years and over. 217,944 person years of follow-up are required in each arm to detect a 33% reduction in pesticide self-poisoning with 80% power at the 5% significance level. Secondary outcomes will include the incidence of all pesticide poisoning and total self-harm. Discussion This paper describes a large effectiveness study of a community intervention to reduce the burden of intentional poisoning in rural Sri Lanka. The study builds on a strong partnership between provincial health services, local and international researchers, and local communities. We discuss issues in relation to randomisation and contamination, engaging control villages, the intervention, and strategies to improve adherence. Trial Registritation The trial is registered on ClinicalTrials.gov ref: NCT1146496 (http://clinicaltrialsfeeds.org/clinical-trials/show/NCT01146496). PMID:22104027

  13. Characterization of Representative Materials in Support of Safe, Long Term Storage of Surplus Plutonium in DOE-STD-3013 Containers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Narlesky, Joshua E.; Stroud, Mary Ann; Smith, Paul Herrick

    2013-02-15

    The Surveillance and Monitoring Program is a joint Los Alamos National Laboratory/Savannah River Site effort funded by the Department of Energy-Environmental Management to provide the technical basis for the safe, long-term storage (up to 50 years) of over 6 metric tons of plutonium stored in over 5,000 DOE-STD-3013 containers at various facilities around the DOE complex. The majority of this material is plutonium that is surplus to the nuclear weapons program, and much of it is destined for conversion to mixed oxide fuel for use in US nuclear power plants. The form of the plutonium ranges from relatively pure metalmore » and oxide to very impure oxide. The performance of the 3013 containers has been shown to depend on moisture content and on the levels, types and chemical forms of the impurities. The oxide materials that present the greatest challenge to the storage container are those that contain chloride salts. Other common impurities include oxides and other compounds of calcium, magnesium, iron, and nickel. Over the past 15 years the program has collected a large body of experimental data on 54 samples of plutonium, with 53 chosen to represent the broader population of materials in storage. This paper summarizes the characterization data, moisture analysis, particle size, surface area, density, wattage, actinide composition, trace element impurity analysis, and shelf life surveillance data and includes origin and process history information. Limited characterization data on fourteen nonrepresentative samples is also presented.« less

  14. Characterization of representative materials in support of safe, long term storage of surplus plutonium in DOE-STD-3013 containers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Paul H; Narlesky, Joshua E; Worl, Laura A

    2010-01-01

    The Surveillance and Monitoring Program (SMP) is a joint LANL/SRS effort funded by DOE/EM to provide the technical basis for the safe, long-term storage (up to 50 years) of over 6 metric tons of plutonium stored in over 5000 DOE-STD-3013 containers at various facilities around the DOE complex. The majority of this material is plutonium that is surplus to the nuclear weapons program, and much of it is destined for conversion to mixed oxide fuel for use in US nuclear power plants. The form of the plutonium ranges from relatively pure metal and oxide to very impure oxide. The performancemore » of the 3013 containers has been shown to depend on moisture content and on the levels, types and chemical forms of the impurities. The oxide materials that present the greatest challenge to the storage container are those that contain chloride salts. The chlorides (NaCl, KCl, CaCl{sub 2}, and MgCl{sub 2}) range from less than half of the impurities present to nearly all the impurities. Other common impurities include oxides and other compounds of calcium, magnesium, iron, and nickel. Over the past 15 years the program has collected a large body of experimental data on over 60 samples of plutonium chosen to represent the broader population of materials in storage. This paper will summarize the characterization data, including the origin and process history, particle size, surface area, density, calorimetry, chemical analysis, moisture analysis, prompt gamma, gas generation and corrosion behavior.« less

  15. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  16. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    security measures to in- crease the survivability of these assets. However, sabotage, terrorism and vandalism continue to be serious threats to DCS and its...Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures

  17. Why Do Parents with Toddlers Store Poisonous Products Safely?

    PubMed Central

    Beirens, Tinneke M. J.; van Beeck, Eduard F.; Brug, Johannes; den Hertog, Paul; Raat, Hein

    2010-01-01

    Unintentional poisoning is a major cause of nonfatal injuries in children aged 0–24 months. Associations between self-reported habits on the child safe storage of medication and cleaning products and family, and psychosocial factors were assessed, using a model based on the Protection Motivation Theory. By identifying correlates of safety behavior in this manner, more insight in factors which influence this behavior is obtained. Health promotion activities in order to promote safety behavior should address these factors in order to increase the effectiveness of the health message. Data were gathered from a cross-sectional survey using self-administered questionnaires, mailed to a population sample of 2470 parents with toddlers. The results indicate that the promotion of safe storage of medication and cleaning products should address the family situation, personal cognitive factors as well as social factors. Interventions should particularly focus on parents' self-efficacy of storing poisonous products in a child safe manner and on the vulnerability of their child in their home concerning an unintentional poisoning incident. PMID:20671943

  18. 30 CFR 56.4401 - Storage tank foundations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Storage tank foundations. 56.4401 Section 56... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be...

  19. 30 CFR 56.4401 - Storage tank foundations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Storage tank foundations. 56.4401 Section 56... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be...

  20. A Safe School's Top 10 Needs

    ERIC Educational Resources Information Center

    Brunner, Judy; Lewis, Dennis

    2005-01-01

    An environment of safety in the school seldom comes down to any one particular component or plan; it is a combination of strategies and ideas that makes a school safe and secure for everyone. In this article, the authors provide practical information to educators who are already working to capacity in terms of time allocation and monetary…

  1. Inherently safe passive gas monitoring system

    DOEpatents

    Cordaro, Joseph V.; Bellamy, John Stephen; Shuler, James M.; Shull, Davis J.; Leduc, Daniel R.

    2016-09-06

    Generally, the present disclosure is directed to gas monitoring systems that use inductive power transfer to safely power an electrically passive device included within a nuclear material storage container. In particular, the electrically passive device can include an inductive power receiver for receiving inductive power transfer through a wall of the nuclear material storage container. The power received by the inductive power receiver can be used to power one or more sensors included in the device. Thus, the device is not required to include active power generation components such as, for example, a battery, that increase the risk of a spark igniting flammable gases within the container.

  2. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing

    PubMed Central

    Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.

    2016-01-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566

  3. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.

    PubMed

    Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M

    2016-07-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).

  4. Diarrhoea prevention in Bolivia through point-of-use water treatment and safe storage: a promising new strategy.

    PubMed Central

    Quick, R. E.; Venczel, L. V.; Mintz, E. D.; Soleto, L.; Aparicio, J.; Gironaz, M.; Hutwagner, L.; Greene, K.; Bopp, C.; Maloney, K.; Chavez, D.; Sobsey, M.; Tauxe, R. V.

    1999-01-01

    A novel water quality intervention that consists of point-of-use water disinfection, safe storage and community education was field tested in Bolivia. A total of 127 households in two periurban communities were randomized into intervention and control groups, surveyed and the intervention was distributed. Monthly water quality testing and weekly diarrhoea surveillance were conducted. Over a 5-month period, intervention households had 44% fewer diarrhoea episodes than control households (P = 0.002). Infants < 1 year old (P = 0.05) and children 5-14 years old (P = 0.01) in intervention households had significantly less diarrhoea than control children. Campylobacter was less commonly isolated from intervention than control patients (P = 0.02). Stored water in intervention households was less contaminated with Escherichia coli than stored water in control households (P < 0.0001). Intervention households exhibited less E. coli contamination of stored water and less diarrhoea than control households. This promising new strategy may have broad applicability for waterborne disease prevention. PMID:10098789

  5. Energy Storage for the Power Grid

    ScienceCinema

    Imhoff, Carl; Vaishnav, Dave; Wang, Wei

    2018-05-30

    The iron vanadium redox flow battery was developed by researchers at Pacific Northwest National Laboratory as a solution to large-scale energy storage for the power grid. This technology provides the energy industry and the nation with a reliable, stable, safe, and low-cost storage alternative for a cleaner, efficient energy future.

  6. An object-based storage model for distributed remote sensing images

    NASA Astrophysics Data System (ADS)

    Yu, Zhanwu; Li, Zhongmin; Zheng, Sheng

    2006-10-01

    It is very difficult to design an integrated storage solution for distributed remote sensing images to offer high performance network storage services and secure data sharing across platforms using current network storage models such as direct attached storage, network attached storage and storage area network. Object-based storage, as new generation network storage technology emerged recently, separates the data path, the control path and the management path, which solves the bottleneck problem of metadata existed in traditional storage models, and has the characteristics of parallel data access, data sharing across platforms, intelligence of storage devices and security of data access. We use the object-based storage in the storage management of remote sensing images to construct an object-based storage model for distributed remote sensing images. In the storage model, remote sensing images are organized as remote sensing objects stored in the object-based storage devices. According to the storage model, we present the architecture of a distributed remote sensing images application system based on object-based storage, and give some test results about the write performance comparison of traditional network storage model and object-based storage model.

  7. 12 CFR 978.5 - Storage of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Storage of confidential information. 978.5... OPERATIONS AND AUTHORITIES BANK REQUESTS FOR INFORMATION § 978.5 Storage of confidential information. Each Bank shall: (a) Store all identified confidential information in secure storage areas or filing...

  8. Water Storage: Quo Vadis?

    NASA Astrophysics Data System (ADS)

    Smakhtin, V.

    2017-12-01

    Humans stored water - in various forms - for ages, coping with water resources variability, and its extremes - floods and droughts. Storage per capita, and other storage-related indicators, have essentially become one way of reflecting the progress of economic development. Massive investments went into large surface water reservoirs that have become the characteristic feature of the earth's landscapes, bringing both benefits and controversy. As water variability progressively increases with changing climate, globally, on one hand, and the idea of sustainable development receives strong traction, on another - it may be worth the while to comprehensively examine current trends and future prospects for water storage development. The task is surely big, to say the least. The presentation will aim to initiate a structured discussion on this multi-facet issue and identify which aspects and trends of water storage development may be most important in the context of Sustainable Development Goals, Sendai Framework for Disaster Risk Reduction, Paris Agreement on Climate Change, and examine how, where and to what extent water storage planning can be improved. It will cover questions like i) aging of large water storage infrastructure, the current extent of this trend in various geographical regions, and possible impacts on water security and security of nations; ii) improved water storage development planning overall in the context of various water development alternatives and storage options themselves and well as their combinations iii) prospects for another "storage revolution" - speed increase in dam numbers, and where, if at all this is most likely iv) recent events in storage development, e.g. is dam decommissioning a trend that picks pace, or whether some developing economies in Asia can do without going through the period of water storage construction, with alternatives, or suggestions for alleviation of negative impacts v) the role of subsurface storage as an

  9. 33 CFR 127.313 - Bulk storage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...

  10. 33 CFR 127.313 - Bulk storage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...

  11. 33 CFR 127.313 - Bulk storage.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...

  12. 33 CFR 127.313 - Bulk storage.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...

  13. 33 CFR 127.313 - Bulk storage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Bulk storage. 127.313 Section 127.313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Operations § 127.313 Bulk storage. (a) The operator...

  14. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  15. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-28

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  16. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  17. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  18. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  19. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  20. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  1. Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  2. 46 CFR 194.15-9 - Storage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...

  3. 46 CFR 194.15-9 - Storage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...

  4. 46 CFR 194.15-9 - Storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...

  5. 46 CFR 194.15-9 - Storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...

  6. 46 CFR 194.15-9 - Storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Storage. 194.15-9 Section 194.15-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemistry Laboratory and Scientific Laboratory § 194.15-9 Storage...

  7. Disabled Children: The Right to Feel Safe

    ERIC Educational Resources Information Center

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  8. Pumped storage system model and experimental investigations on S-induced issues during transients

    NASA Astrophysics Data System (ADS)

    Zeng, Wei; Yang, Jiandong; Hu, Jinhong

    2017-06-01

    Because of the important role of pumped storage stations in the peak regulation and frequency control of a power grid, pump turbines must rapidly switch between different operating modes, such as fast startup and load rejection. However, pump turbines go through the unstable S region in these transition processes, threatening the security and stability of the pumped storage station. This issue has mainly been investigated through numerical simulations, while field experiments generally involve high risks and are difficult to perform. Therefore, in this work, the model test method was employed to study S-induced security and stability issues for a pumped storage station in transition processes. First, a pumped storage system model was set up, including the piping system, model units, electrical control systems and measurement system. In this model, two pump turbines with different S-shaped characteristics were installed to determine the influence of S-shaped characteristics on transition processes. The model platform can be applied to simulate any hydraulic transition process that occurs in real power stations, such as load rejection, startup, and grid connection. On the experimental platform, the S-shaped characteristic curves were measured to be the basis of other experiments. Runaway experiments were performed to verify the impact of the S-shaped characteristics on the pump turbine runaway stability. Full load rejection tests were performed to validate the effect of the S-shaped characteristics on the water-hammer pressure. The condition of one pump turbine rejecting its load after another defined as one-after-another (OAA) load rejection was performed to validate the possibility of S-induced extreme draft tube pressure. Load rejection experiments with different guide vane closing schemes were performed to determine a suitable scheme to adapt the S-shaped characteristics. Through these experiments, the threats existing in the station were verified, the

  9. 10 CFR 34.35 - Labeling, storage, and transportation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Labeling, storage, and transportation. 34.35 Section 34.35... REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Equipment § 34.35 Labeling, storage, and transportation. (a... changer or the storage container has securely attached to it a durable, legible, and clearly visible label...

  10. 10 CFR 34.35 - Labeling, storage, and transportation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Labeling, storage, and transportation. 34.35 Section 34.35... REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Equipment § 34.35 Labeling, storage, and transportation. (a... changer or the storage container has securely attached to it a durable, legible, and clearly visible label...

  11. Gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of malaysia.

    PubMed

    Bin Nordin, R; Araki, S; Sato, H; Yokoyama, K; Bin Wan Muda, W A; Win Kyi, D

    2001-01-01

    To identify gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of Malaysia, we conducted a 20-item questionnaire interview on storage of pesticide (4 questions), mixing of pesticide (3 questions), use of personal protective equipment and clothing while spraying pesticide (7 questions), activities during and after spraying of pesticide (5 questions), and maintenance of pesticide sprayer (1 question) in 496 tobacco farmers (395 males and 101 females) in Bachok District, Kelantan, Malaysia. Duration of employment was significantly longer in females than those in males (p<0.001). In addition, proportion with no formal education in females was significantly higher than those in males (p<0.05). The following eight common factors were extracted from the 20 questionnaires by principal components factor analysis after varimax rotation in all farmers: (1) use of personal protective equipment, (2) unsafe work habit, (3) reading and following instructions on pesticide label, (4) security, storage and disposal of pesticide container, (5) safe work habit, (6) proper handling of pesticide and maintenance of pesticide sprayer, (7) use of personal protective clothing, and (8) safe handling of pesticide. Results of analysis of covariance for the eight factor scores of all male and female farmers, controlling for educational level and duration of employment, showed that: (1) factor scores for use of personal protective equipment (p<0.001), use of personal protective clothing (p<0.001) and safe work habit (p<0.001) in females were significantly lower than those in males; (2) conversely, factor scores for reading and following instruction on pesticide label (p<0.001) and proper handling of pesticide and maintenance of pesticide sprayer (p<0.01) in males were significantly lower than those in females; and (3) there were no significant differences in other three factor scores (p>0.05). We therefore conclude that: (1) for female tobacco farmers, choice

  12. Gender Difference in Safe and Unsafe Practice of Pesticide Handling in Tobacco Farmers of Malaysia

    PubMed Central

    BIN NORDIN, Rusli; ARAKI, Shunichi; SATO, Hajime; YOKOYAMA, Kazuhito; BIN WAN MUDA, Wan Abdul Manan; WIN KYI, Daw

    2001-01-01

    To identify gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of Malaysia, we conducted a 20-item questionnaire interview on storage of pesticide (4 questions), mixing of pesticide (3 questions), use of personal protective equipment and clothing while spraying pesticide (7 questions), activities during and after spraying of pesticide (5 questions), and maintenance of pesticide sprayer (1 question) in 496 tobacco farmers (395 males and 101 females) in Bachok District, Kelantan, Malaysia. Duration of employment was significantly longer in females than those in males (p<0.001). In addition, proportion with no formal education in females was significantly higher than those in males (p<0.05). The following eight common factors were extracted from the 20 questionnaires by principal components factor analysis after varimax rotation in all farmers: (1) use of personal protective equipment, (2) unsafe work habit, (3) reading and following instructions on pesticide label, (4) security, storage and disposal of pesticide container, (5) safe work habit, (6) proper handling of pesticide and maintenance of pesticide sprayer, (7) use of personal protective clothing, and (8) safe handling of pesticide. Results of analysis of covariance for the eight factor scores of all male and female farmers, controlling for educational level and duration of employment, showed that: (1) factor scores for use of personal protective equipment (p<0.001), use of personal protective clothing (p<0.001) and safe work habit (p<0.001) in females were significantly lower than those in males; (2) conversely, factor scores for reading and following instruction on pesticide label (p<0.001) and proper handling of pesticide and maintenance of pesticide sprayer (p<0.01) in males were significantly lower than those in females; and (3) there were no significant differences in other three factor scores (p>0.05). We therefore conclude that: (1) for female tobacco farmers, choice

  13. Safe: a status update on information security and the hospital community.

    PubMed

    Fundner, Rita

    2003-01-01

    IT Security and Privacy are becoming increasingly visible "hot topics" across the full spectrum of industry and service sectors. Legislation and global "best practices" are working hard to defend organizations and individuals against escalating, rapidly evolving cyber-threats. Predictably, the threat landscape is having an impact on all levels to varying degrees: governmental, organizational and individual. This article introduces the basic context for information security and offers insight into how a number of hospitals are addressing the situation, what barriers they currently face and what opportunities they see unfolding.

  14. 30 CFR 57.4401 - Storage tank foundations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...

  15. 30 CFR 57.4401 - Storage tank foundations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and Control Flammable and Combustible Liquids and Gases § 57.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...

  16. 46 CFR 194.20-9 - Storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...

  17. 46 CFR 194.20-9 - Storage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...

  18. 46 CFR 194.20-9 - Storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...

  19. 46 CFR 194.20-9 - Storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...

  20. 46 CFR 194.20-9 - Storage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Storage. 194.20-9 Section 194.20-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS HANDLING, USE, AND CONTROL OF EXPLOSIVES AND OTHER HAZARDOUS MATERIALS Chemical Stores and/or Storerooms § 194.20-9 Storage. (a) Chemical...

  1. Changing Homeland Security: The Year in Review - 2008

    DTIC Science & Technology

    2009-01-01

    new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar

  2. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  3. 30 CFR 56.4401 - Storage tank foundations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...

  4. 30 CFR 56.4401 - Storage tank foundations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Control Flammable and Combustible Liquids and Gases § 56.4401 Storage tank foundations. Fixed, unburied, flammable or combustible liquid storage tanks shall be securely mounted on firm foundations. Piping shall be....4401 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL...

  5. 41 CFR 50-204.28 - Storage of radioactive materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Storage of radioactive... CONTRACTS Radiation Standards § 50-204.28 Storage of radioactive materials. Radioactive materials stored in a nonradiation area shall be secured against unauthorized removal from the place of storage. ...

  6. 41 CFR 50-204.28 - Storage of radioactive materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 1 2014-07-01 2014-07-01 false Storage of radioactive... CONTRACTS Radiation Standards § 50-204.28 Storage of radioactive materials. Radioactive materials stored in a nonradiation area shall be secured against unauthorized removal from the place of storage. ...

  7. 41 CFR 50-204.28 - Storage of radioactive materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Storage of radioactive... CONTRACTS Radiation Standards § 50-204.28 Storage of radioactive materials. Radioactive materials stored in a nonradiation area shall be secured against unauthorized removal from the place of storage. ...

  8. A new data collaboration service based on cloud computing security

    NASA Astrophysics Data System (ADS)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  9. 46 CFR 25.25-9 - Storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...

  10. 46 CFR 25.25-9 - Storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...

  11. 46 CFR 25.25-9 - Storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...

  12. 46 CFR 25.25-9 - Storage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Storage. 25.25-9 Section 25.25-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Life Preservers and Other Lifesaving Equipment § 25.25-9 Storage. (a) The lifesaving equipment designed to be worn required in § 25.25-5 (b), (c...

  13. Student Perceptions of High-Security School Environments

    ERIC Educational Resources Information Center

    Bracy, Nicole L.

    2011-01-01

    Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…

  14. 30 CFR 77.1103 - Flammable liquids; storage.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... storage tanks shall be mounted securely on firm foundations. Outlet piping shall be provided with flexible connections or other special fittings to prevent adverse effects from tank settling. (c) Fuel lines shall be... hazards. (d) Areas surrounding flammable-liquid storage tanks and electric substations and transformers...

  15. Aerial surveillance vehicles augment security at shipping ports

    NASA Astrophysics Data System (ADS)

    Huck, Robert C.; Al Akkoumi, Muhammad K.; Cheng, Samuel; Sluss, James J., Jr.; Landers, Thomas L.

    2008-10-01

    With the ever present threat to commerce, both politically and economically, technological innovations provide a means to secure the transportation infrastructure that will allow efficient and uninterrupted freight-flow operations for trade. Currently, freight coming into United States ports is "spot checked" upon arrival and stored in a container yard while awaiting the next mode of transportation. For the most part, only fences and security patrols protect these container storage yards. To augment these measures, the authors propose the use of aerial surveillance vehicles equipped with video cameras and wireless video downlinks to provide a birds-eye view of port facilities to security control centers and security patrols on the ground. The initial investigation described in this paper demonstrates the use of unmanned aerial surveillance vehicles as a viable method for providing video surveillance of container storage yards. This research provides the foundation for a follow-on project to use autonomous aerial surveillance vehicles coordinated with autonomous ground surveillance vehicles for enhanced port security applications.

  16. Geomechanical Framework for Secure CO 2 Storage in Fractured Reservoirs and Caprocks for Sedimentary Basins in theMidwest United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sminchak, Joel

    This report presents final technical results for the project Geomechanical Framework for Secure CO 2 Storage in Fractured Reservoirs and Caprocks for Sedimentary Basins in the Midwest United States (DE-FE0023330). The project was a three-year effort consisting of seven technical tasks focused on defining geomechanical factors for CO 2 storage applications in deep saline rock formations in Ohio and the Midwest United States, because geomechancial issues have been identified as a significant risk factor for large-scale CO 2 storage applications. A basin-scale stress-strain analysis was completed to describe the geomechanical setting for rock formations of Ordovician-Cambrian age in Ohio andmore » adjacent areas of the Midwest United States in relation to geologic CO 2 storage applications. The tectonic setting, stress orientation-magnitude, and geomechanical and petrophysical parameters for CO 2 storage zones and caprocks in the region were cataloged. Ten geophysical image logs were analyzed for natural fractures, borehole breakouts, and drilling-induced fractures. The logs indicated mostly less than 10 fractures per 100 vertical feet in the borehole, with mostly N65E principal stress orientation through the section. Geophysical image logs and other logs were obtained for three wells located near the sites where specific models were developed for geomechanical simulations: Arches site in Boone County, Kentucky; Northern Appalachian Basin site in Chautauqua County, New York; and E-Central Appalachian Basin site in Tuscarawas County, Ohio. For these three wells, 9,700 feet of image logs were processed and interpreted to provide a systematic review of the distribution within each well of natural fractures, wellbore breakouts, faults, and drilling induced fractures. There were many borehole breakouts and drilling-induced tensile fractures but few natural fractures. Concentrated fractures were present at the Rome-basal sandstone and basal sandstone-Precambrian contacts

  17. 49 CFR 1280.6 - Storage of classified documents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...

  18. 49 CFR 1280.6 - Storage of classified documents.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...

  19. 49 CFR 1280.6 - Storage of classified documents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...

  20. 49 CFR 1280.6 - Storage of classified documents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Storage of classified documents. 1280.6 Section 1280.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION... SECURITY INFORMATION AND CLASSIFIED MATERIAL § 1280.6 Storage of classified documents. All classified...

  1. System and method for key generation in security tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  2. Optical storage networking

    NASA Astrophysics Data System (ADS)

    Mohr, Ulrich

    2001-11-01

    For efficient business continuance and backup of mission- critical data an inter-site storage network is required. Where traditional telecommunications costs are prohibitive for all but the largest organizations, there is an opportunity for regional carries to deliver an innovative storage service. This session reveals how a combination of optical networking and protocol-aware SAN gateways can provide an extended storage networking platform with the lowest cost of ownership and the highest possible degree of reliability, security and availability. Companies of every size, with mainframe and open-systems environments, can afford to use this integrated service. Three mayor applications are explained; channel extension, Network Attached Storage (NAS), Storage Area Networks (SAN) and how optical networks address the specific requirements. One advantage of DWDM is the ability for protocols such as ESCON, Fibre Channel, ATM and Gigabit Ethernet, to be transported natively and simultaneously across a single fiber pair, and the ability to multiplex many individual fiber pairs over a single pair, thereby reducing fiber cost and recovering fiber pairs already in use. An optical storage network enables a new class of service providers, Storage Service Providers (SSP) aiming to deliver value to the enterprise by managing storage, backup, replication and restoration as an outsourced service.

  3. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  4. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  5. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  6. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  7. 46 CFR 108.451 - CO2 storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false CO2 storage. 108.451 Section 108.451 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems Fixed Carbon Dioxide Fire Extinguishing Systems § 108.451 CO2 storage. (a...

  8. Feeling safe during an inpatient hospitalization: a concept analysis.

    PubMed

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  9. Energy Storage Systems Are Coming: Are You Ready

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.

    2015-12-05

    Energy storage systems (batteries) are not a new concept, but the technology being developed and introduced today with an increasing emphasis on energy storage, is new. The increased focus on energy, environmental and economic issues in the built environment is spurring increased application of renewables as well as reduction in peak energy use - both of which create a need for energy storage. This article provides an overview of current and anticipated energy storage technology, focusing on ensuring the safe application and use of energy storage on both the grid and customer side of the utility meter.

  10. Safe transport of radioactive materials in Egypt

    NASA Astrophysics Data System (ADS)

    El-Shinawy, Rifaat M. K.

    1994-07-01

    In Egypt the national regulations for safe transport of radioactive materials (RAM) are based on the International Atomic Energy Agency (IAEA) regulations. In addition, regulations for the safe transport of these materials through the Suez Canal (SC) were laid down by the Egyptian Atomic Energy Authority (EAEA) and the Suez Canal Authority (SCA). They are continuously updated to meet the increased knowledge and the gained experience. The technical and protective measures taken during transport of RAM through SC are mentioned. Assessment of the impact of transporting radioactive materials through the Suez Canal using the INTERTRAN computer code was carried out in cooperation with IAEA. The transported activities and empty containers, the number of vessels carrying RAM through the canal from 1963 to 1991 and their nationalities are also discussed. The protective measures are mentioned.A review of the present situation of the radioactive wastes storage facilities at the Atomic Energy site at Inshas is given along with the regulation for safe transportation and disposal of radioactive wastes

  11. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  12. 76 FR 32867 - Hazardous Materials: Requirements for Storage of Explosives During Transportation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-07

    ... from release into the environment. This final rule does not prohibit or promote the development of safe... Association Standard (NFPA) 498--Standard for Safe Havens and Interchange Lots for Vehicles Transporting Explosives (2010 Edition) for the construction and maintenance of safe havens used for unattended storage of...

  13. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  14. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  15. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  16. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Security. 109-38.202-50 Section 109-38.202-50 Public Contracts and Property Management Federal Property Management Regulations....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area...

  17. High-Tech Security Help.

    ERIC Educational Resources Information Center

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  18. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  19. OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO EAST. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in Weapons Storage Area, Plattsburgh, Clinton County, NY

  20. 46 CFR 193.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 193.15-20 Carbon dioxide storage. (a...

  1. 33 CFR 127.1313 - Storage of hazardous materials.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...

  2. 33 CFR 127.1313 - Storage of hazardous materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...

  3. 33 CFR 127.1313 - Storage of hazardous materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...

  4. 33 CFR 127.1313 - Storage of hazardous materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...

  5. 33 CFR 127.1313 - Storage of hazardous materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Storage of hazardous materials. 127.1313 Section 127.1313 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... HAZARDOUS GAS Waterfront Facilities Handling Liquefied Hazardous Gas Operations § 127.1313 Storage of...

  6. 46 CFR 193.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 193.15-20 Carbon dioxide storage. (a...

  7. Implementation of Safe-by-Design for Nanomaterial Development and Safe Innovation: Why We Need a Comprehensive Approach

    PubMed Central

    Kraegeloh, Annette; Suarez-Merino, Blanca; Sluijters, Teun; Micheletti, Christian

    2018-01-01

    Manufactured nanomaterials (MNMs) are regarded as key components of innovations in various fields with high potential impact (e.g., energy generation and storage, electronics, photonics, diagnostics, theranostics, or drug delivery agents). Widespread use of MNMs raises concerns about their safety for humans and the environment, possibly limiting the impact of the nanotechnology-based innovation. The development of safe MNMs and nanoproducts has to result in a safe as well as functional material or product. Its safe use, and disposal at the end of its life cycle must be taken into account too. However, not all MNMs are similarly useful for all applications, some might bear a higher hazard potential than others, and use scenarios could lead to different exposure probabilities. To improve both safety and efficacy of nanotechnology, we think that a new proactive approach is necessary, based on pre-regulatory safety assessment and dialogue between stakeholders. On the basis of the work carried out in different European Union (EU) initiatives, developing and integrating MNMs Safe-by-Design and Trusted Environments (NANoREG, ProSafe, and NanoReg2), we present our point of view here. This concept, when fully developed, will allow for cost effective industrial innovation, and an exchange of key information between regulators and innovators. Regulators are thus informed about incoming innovations in good time, supporting a proactive regulatory action. The final goal is to contribute to the nanotechnology governance, having faster, cheaper, effective, and safer nano-products on the market. PMID:29661997

  8. Implementation of Safe-by-Design for Nanomaterial Development and Safe Innovation: Why We Need a Comprehensive Approach.

    PubMed

    Kraegeloh, Annette; Suarez-Merino, Blanca; Sluijters, Teun; Micheletti, Christian

    2018-04-14

    Manufactured nanomaterials (MNMs) are regarded as key components of innovations in various fields with high potential impact (e.g., energy generation and storage, electronics, photonics, diagnostics, theranostics, or drug delivery agents). Widespread use of MNMs raises concerns about their safety for humans and the environment, possibly limiting the impact of the nanotechnology-based innovation. The development of safe MNMs and nanoproducts has to result in a safe as well as functional material or product. Its safe use, and disposal at the end of its life cycle must be taken into account too. However, not all MNMs are similarly useful for all applications, some might bear a higher hazard potential than others, and use scenarios could lead to different exposure probabilities. To improve both safety and efficacy of nanotechnology, we think that a new proactive approach is necessary, based on pre-regulatory safety assessment and dialogue between stakeholders. On the basis of the work carried out in different European Union (EU) initiatives, developing and integrating MNMs Safe-by-Design and Trusted Environments (NANoREG, ProSafe, and NanoReg2), we present our point of view here. This concept, when fully developed, will allow for cost effective industrial innovation, and an exchange of key information between regulators and innovators. Regulators are thus informed about incoming innovations in good time, supporting a proactive regulatory action. The final goal is to contribute to the nanotechnology governance, having faster, cheaper, effective, and safer nano-products on the market.

  9. Safe and secure at work?: findings from the 2002 Workplace Risk Supplement.

    PubMed

    Jenkins, E Lynn; Fisher, Bonnie S; Hartley, Dan

    2012-01-01

    To examine employee's perception of safety and related workplace safety and prevention issues, including their use of self-protection measures and victimization experience. The Workplace Risk Supplement (WRS) to the National Crime Victimization Survey (NCVS) was administered to 55,158 employed respondents who were 16 years or older. Trained U.S. Census Bureau interviewers administered the WRS in all households selected for the NCVS during the 6-month reference period from January through June 2002. Responses from the 55,158 WRS respondents were weighted to obtain national estimates, resulting in 142,410,858 cases. The demographic distribution of WRS respondents is very similar to that of the U.S. labor force. Seven percent of respondents reported that they worried about someone in their workplace attacking them, while nearly 4% experienced victimization. The majority indicated that they felt that their workplace, the neighborhood around their workplace, and places they traveled to as part of their job were either "Very Safe" or "Somewhat Safe" from crime. Six percent carried some type of self protection while at work although this varied by occupation. Employees largely feel safe from violence while working. Differences in victimization by occupation bolster efforts to focus workplace violence prevention in high-risk occupations.

  10. 41 CFR 109-38.202-50 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Security. 109-38.202-50....202-50 Security. Unissued license tags shall be stored in a locked drawer, cabinet, or storage area with restricted access to prevent possible fraud or misuse. Tags which are damaged or unusable will be...

  11. Learning with Security

    ERIC Educational Resources Information Center

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  12. A study of the security technology and a new security model for WiFi network

    NASA Astrophysics Data System (ADS)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  13. Methane storage in metal-organic frameworks.

    PubMed

    He, Yabing; Zhou, Wei; Qian, Guodong; Chen, Banglin

    2014-08-21

    Natural gas (NG), whose main component is methane, is an attractive fuel for vehicular applications. Realization of safe, cheap and convenient means and materials for high-capacity methane storage can significantly facilitate the implementation of natural gas fuelled vehicles. The physisorption based process involving porous materials offers an efficient storage methodology and the emerging porous metal-organic frameworks have been explored as potential candidates because of their extraordinarily high porosities, tunable pore/cage sizes and easily immobilized functional sites. In this view, we provide an overview of the current status of metal-organic frameworks for methane storage.

  14. Securing the appendiceal stump with the Gea extracorporeal sliding knot during laparoscopic appendectomy is safe and economical.

    PubMed

    Arcovedo, R; Barrera, H; Reyes, H S

    2007-10-01

    Laparoscopic appendectomy (LA) has become very popular. One criticism of this approach is the high cost of the disposable equipment such as the linear stapler. An alternative would be suture ligation of the appendiceal base. To prove the safety of the Gea extracorporeal sliding knot (GESK) for closure of the stump after LA, a retrospective study was conducted. For this study, 63 LA procedures performed by one surgeon using the Gea knot (group A) were reviewed and compared with 63 LA procedures performed by two other surgeons (group B) using the linear stapler. The GESK is created with 0-prolene in the manner already described. The main variable was the presence or absence of blowout, leak, or fistula from the appendiceal stump. The secondary variables were abdominal abscess, wound infection, and need for readmission or reoperation. The results were analyzed using the appropriate statistical methods. Both groups were similar in terms of age, gender, and pathologic diagnosis. No patient in group A or B experienced a colonic fistula, stump blowout, or leak. In group A, one patient experienced interloop abscesses. There were two wound infections. In group B, one patient experienced a wound infection, and another patient had a wound dehiscence of the umbilical port, which required reoperation. No statistical differences were noted between the two groups. There are surgeons who routinely use sutures to secure the stump of the appendectomy. This study aimed to demonstrate that the GESK is as secure as the stapler for closure of the appendiceal stump. The GESK could be passed through a 5-mm trocar, potentially avoiding complications of a larger trocar site. The GESK seems to be an economic and safe alternative to the stapler.

  15. 46 CFR 193.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... storage. (a) Except as provided in paragraph (b) of this section, the cylinders shall be located outside...

  16. 46 CFR 76.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 3 2013-10-01 2013-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...

  17. 46 CFR 95.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a...

  18. 46 CFR 193.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE... storage. (a) Except as provided in paragraph (b) of this section, the cylinders shall be located outside...

  19. 46 CFR 76.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 3 2011-10-01 2011-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...

  20. 46 CFR 95.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a...

  1. 46 CFR 76.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 3 2012-10-01 2012-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...

  2. 46 CFR 95.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a...

  3. 46 CFR 76.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 3 2014-10-01 2014-10-01 false Carbon dioxide storage. 76.15-20 Section 76.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 76.15-20 Carbon dioxide storage. (a) Except as...

  4. Infectious disease protection for healthcare security officers.

    PubMed

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  5. Improved security monitoring method for network bordary

    NASA Astrophysics Data System (ADS)

    Gao, Liting; Wang, Lixia; Wang, Zhenyan; Qi, Aihua

    2013-03-01

    This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false alarm or missing alarm of the security incident effectively.

  6. Integrity and security in an Ada runtime environment

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  7. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less

  8. The effects of prompting and reinforcement on safe behavior of bicycle and motorcycle riders.

    PubMed

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was effective at increasing safe behavior exhibited by bicycle and motorcycle riders. No differences were observed between vehicle type or gender with regard to engagement in safe behavior.

  9. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  10. Safe and Secure Partitioning with Pikeos: Towards Integrated Modular Avionics in Space

    NASA Astrophysics Data System (ADS)

    Almeida, J.; Prochazka, M.

    2009-05-01

    This paper presents our approach to logical partitioning of spacecraft onboard software. We present PikeOS, a separation micro-kernel which applies the state-of-the- art techniques and widely recognised standards such as ARINC 653 and MILS in order to guarantee safety and security properties of partitions executing software with different criticality and confidentiality. We provide an overview of our approach, also used in the Securely Partitioning Spacecraft Computing Resources project, an ESA TRP contract, which shifts spacecraft onboard software development towards the Integrated Modular Avionics concept with relevance for dual-use military and civil missions.

  11. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  12. Discussion of the influence of CO and CH4 in CO2 transport, injection, and storage for CCS technology.

    PubMed

    Blanco, Sofía T; Rivas, Clara; Bravo, Ramón; Fernández, Javier; Artal, Manuela; Velasco, Inmaculada

    2014-09-16

    This paper discusses the influence of the noncondensable impurities CO and CH4 on Carbon Capture and Storage (CCS) technology. We calculated and drew conclusions about the impact of both impurities in the CO2 on selected transport, injection, and storage parameters (pipeline pressure drop, storage capacity, etc.), whose analysis is necessary for the safe construction and operation of CO2 pipelines and for the secure long-term geological storage of anthropogenic CO2. To calculate these parameters, it is necessary to acquire data on the volumetric properties and the vapor-liquid equilibrium of the fluid being subjected to CCS. In addition to literature data, we used new experimental data, which are presented here and were obtained for five mixtures of CO2+CO with compositions characteristic of the typical emissions of the E.U. and the U.S.A. Temperatures and pressures are based on relevant CO2 pipeline and geological storage site values. From our experimental results, Peng-Robinson, PC-SAFT, and GERG Equations of State for were validated CO2+CO under the conditions of CCS. We conclude that the concentration of both impurities strongly affects the studied parameters, with CO being the most influential and problematic. The overall result of these negative effects is an increase in the difficulties, risks, and overall costs of CCS.

  13. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  14. Be-safe travel, a web-based geographic application to explore safe-route in an area

    NASA Astrophysics Data System (ADS)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  15. Secure Transportation of HEU in Romania

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-07-06

    The National Nuclear Security Administration has announced the final shipments of Russian-origin highly enriched uranium (HEU) nuclear fuel from Romania. The material was removed and returned to Russia by air for storage at two secure nuclear facilities, making Romania the first country to remove all HEU since President Obama outlined his commitment to securing all vulnerable nuclear material around the world within four years. This was also the first time NNSA has shipped spent HEU by airplane, a development that will help accelerate efforts to meet the Presidents objective.

  16. WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING 3583), STORAGE BUILDING (BUILDING 3584)NIGHT AND SECURITY POLICE ENTRY CONTROL (BUILDING 3582)LEFT. VIEW TO NORTHEAST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY

  17. The Interface of Safety and Security in Transport: A Regional Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Welch, Tim; Duhamel, David A; Nandakumar, A. N.

    Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security

  18. Secure public cloud platform for medical images sharing.

    PubMed

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  19. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

    PubMed

    Wang, Shangping; Zhao, Duqiao; Zhang, Yaling

    2017-01-01

    Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.

  20. 46 CFR 193.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Carbon dioxide storage. 193.15-20 Section 193.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide and Clean Agent Extinguishing Systems, Details § 193.15-20 Carbon dioxide storage. (a) Except as provided in...

  1. CO2 Storage related Groundwater Impacts and Protection

    NASA Astrophysics Data System (ADS)

    Fischer, Sebastian; Knopf, Stefan; May, Franz; Rebscher, Dorothee

    2016-03-01

    Injection of CO2 into the deep subsurface will affect physical and chemical conditions in the storage environment. Hence, geological CO2 storage can have potential impacts on groundwater resources. Shallow freshwater can only be affected if leakage pathways facilitate the ascent of CO2 or saline formation water. Leakage associated with CO2 storage cannot be excluded, but potential environmental impacts could be reduced by selecting suitable storage locations. In the framework of risk assessment, testing of models and scenarios against operational data has to be performed repeatedly in order to predict the long-term fate of CO2. Monitoring of a storage site should reveal any deviations from expected storage performance, so that corrective measures can be taken. Comprehensive R & D activities and experience from several storage projects will enhance the state of knowledge on geological CO2 storage, thus enabling safe storage operations at well-characterised and carefully selected storage sites while meeting the requirements of groundwater protection.

  2. Implementing AORN recommended practices for a safe environment of care, part II.

    PubMed

    Kennedy, Lynne

    2014-09-01

    Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  3. Assessing Water Filtration and Safe Storage in Households with Young Children of HIV-Positive Mothers: A Randomized, Controlled Trial in Zambia

    PubMed Central

    Peletz, Rachel; Simunyama, Martin; Sarenje, Kelvin; Baisley, Kathy; Filteau, Suzanne; Kelly, Paul; Clasen, Thomas

    2012-01-01

    Background Unsafe drinking water presents a particular threat to people living with HIV/AIDS (PLHIV) due to the increased risk of opportunistic infections, diarrhea-associated malabsorption of essential nutrients, and increased exposure to untreated water for children of HIV-positive mothers who use replacement feeding to reduce the risk of HIV transmission. This population may particularly benefit from an intervention to improve water quality in the home. Methods and Findings We conducted a 12-month randomized, controlled field trial in Zambia among 120 households with children <2 years (100 with HIV-positive mothers and 20 with HIV-negative mothers to reduce stigma of participation) to assess a high-performance water filter and jerry cans for safe storage. Households were followed up monthly to assess use, drinking water quality (thermotolerant coliforms (TTC), an indicator of fecal contamination) and reported diarrhea (7-day recall) among children <2 years and all members of the household. Because previous attempts to blind the filter have been unsuccessful, we also assessed weight-for-age Z-scores (WAZ) as an objective measure of diarrhea impact. Filter use was high, with 96% (596/620) of household visits meeting the criteria for users. The quality of water stored in intervention households was significantly better than in control households (3 vs. 181 TTC/100 mL, respectively, p<0.001). The intervention was associated with reductions in the longitudinal prevalence of reported diarrhea of 53% among children <2 years (LPR = 0.47, 95% CI: 0.30–0.73, p = 0.001) and 54% among all household members (LPR = 0.46, 95% CI: 0.30–0.70, p<0.001). While reduced WAZ was associated with reported diarrhea (−0.26; 95% CI: −0.37 to −0.14, p<0.001), there was no difference in WAZ between intervention and control groups. Conclusion In this population living with HIV/AIDS, a water filter combined with safe storage was used correctly and consistently, was

  4. Privacy preservation and information security protection for patients' portable electronic health records.

    PubMed

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2009-09-01

    As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

  5. Custodians/Security Program Evaluation.

    ERIC Educational Resources Information Center

    Ennis, Bob

    The Custodians/Security Department is a support service of the Des Moines (Iowa) Independent Community School District. Responsibilities of the department do not stop with the care of the facility, but extend to providing a clean, safe environment for all who use school facilities. Program evaluation in the 1993-94 school year reveals a total…

  6. Terrestrial Energy Storage SPS Systems

    NASA Technical Reports Server (NTRS)

    Brandhorst, Henry W., Jr.

    1998-01-01

    Terrestrial energy storage systems for the SSP system were evaluated that could maintain the 1.2 GW power level during periods of brief outages from the solar powered satellite (SPS). Short-term outages of ten minutes and long-term outages up to four hours have been identified as "typical" cases where the ground-based energy storage system would be required to supply power to the grid. These brief interruptions in transmission could result from performing maintenance on the solar power satellite or from safety considerations necessitating the power beam be turned off. For example, one situation would be to allow for the safe passage of airplanes through the space occupied by the beam. Under these conditions, the energy storage system needs to be capable of storing 200 MW-hrs and 4.8 GW-hrs, respectively. The types of energy storage systems to be considered include compressed air energy storage, inertial energy storage, electrochemical energy storage, superconducting magnetic energy storage, and pumped hydro energy storage. For each of these technologies, the state-of-the-art in terms of energy and power densities were identified as well as the potential for scaling to the size systems required by the SSP system. Other issues addressed included the performance, life expectancy, cost, and necessary infrastructure and site locations for the various storage technologies.

  7. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    NASA Astrophysics Data System (ADS)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  8. 46 CFR 95.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a) Except as provided in paragraph (b) of this...

  9. 46 CFR 95.15-20 - Carbon dioxide storage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Carbon dioxide storage. 95.15-20 Section 95.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS FIRE PROTECTION EQUIPMENT Carbon Dioxide Extinguishing Systems, Details § 95.15-20 Carbon dioxide storage. (a) Except as provided in paragraph (b) of this...

  10. Research and realization of info-net security controlling system

    NASA Astrophysics Data System (ADS)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  11. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  12. Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.

    PubMed

    Guo, Yeting; Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming

    2018-04-13

    Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query.

  13. Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage

    PubMed Central

    Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming

    2018-01-01

    Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query. PMID:29652810

  14. Carbon Capture and Storage, 2008

    ScienceCinema

    None

    2017-12-09

    The U.S. Department of Energy is researching the safe implementation of a technology called carbon sequestration, also known as carbon capture and storage, or CCS. Based on an oilfield practice, this approach stores carbon dioxide, or CO2 generated from human activities for millennia as a means to mitigate global climate change. In 2003, the Department of Energys National Energy Technology Laboratory formed seven Regional Carbon Sequestration Partnerships to assess geologic formations suitable for storage and to determine the best approaches to implement carbon sequestration in each region. This video describes the work of these partnerships.

  15. Quantum-secured blockchain

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Pozhar, N. O.; Anufriev, M. N.; Trushechkin, A. S.; Yunusov, R. R.; Kurochkin, Y. V.; Lvovsky, A. I.; Fedorov, A. K.

    2018-07-01

    Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards. Here we propose a possible solution to the quantum era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication. These results address important questions about realizability and scalability of quantum-safe blockchains for commercial and governmental applications.

  16. Storage media for computers in radiology.

    PubMed

    Dandu, Ravi Varma

    2008-11-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits.

  17. Storage media for computers in radiology

    PubMed Central

    Dandu, Ravi Varma

    2008-01-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits. PMID:19774182

  18. Security Management and Safeguards Office

    NASA Technical Reports Server (NTRS)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  19. Technology, safety and costs of decommissioning reference independent spent fuel storage installations. [Contains glossary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ludwick, J D; Moore, E B

    1984-01-01

    Safety and cost information is developed for the conceptual decommissioning of five different types of reference independent spent fuel storage installations (ISFSIs), each of which is being given consideration for interim storage of spent nuclear fuel in the United States. These include one water basin-type ISFSI (wet) and four dry ISFSIs (drywell, silo, vault, and cask). The reference ISFSIs include all component parts necessary for the receipt, handling and storage of spent fuel in a safe and efficient manner. Three decommissioning alternatives are studied to obtain comparisons between costs (in 1981 dollars), occupational radiation doses, and potential radiation doses tomore » the public. The alternatives considered are: DECON (immediate decontamination), SAFSTOR (safe storage followed by deferred decontamination), and ENTOMB (entombment followed by long-term surveillance).« less

  20. 46 CFR 153.935a - Storage of cargo samples.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 5 2014-10-01 2014-10-01 false Storage of cargo samples. 153.935a Section 153.935a Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS... § 153.935a Storage of cargo samples. (a) The master shall make sure that any cargo samples are stored in...

  1. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    ERIC Educational Resources Information Center

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  2. Safety and security of radioactive sources in industrial radiography in Bangladesh

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mollah, A. S.; Nazrul, M. Abdullah

    2013-07-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less

  3. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  4. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  5. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  6. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  7. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  8. To ensure secure gun storage and gun safety devices.

    THOMAS, 113th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2013-07-11

    House - 09/13/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Development of an Automated Security Incident Reporting System (SIRS) for Bus Transit

    DOT National Transportation Integrated Search

    1986-12-01

    The security incident reporting system (sirs) is a microcomputer-based software program demonstrated at the metropolitan transit commission (mtc) in Minneapolis, mn. Sirs is designed to provide convenient storage, update and retrieval of security inc...

  10. Establishing a store baseline during interim storage of waste packages and a review of potential technologies for base-lining

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McTeer, Jennifer; Morris, Jenny; Wickham, Stephen

    Interim storage is an essential component of the waste management lifecycle, providing a safe, secure environment for waste packages awaiting final disposal. In order to be able to monitor and detect change or degradation of the waste packages, storage building or equipment, it is necessary to know the original condition of these components (the 'waste storage system'). This paper presents an approach to establishing the baseline for a waste-storage system, and provides guidance on the selection and implementation of potential base-lining technologies. The approach is made up of two sections; assessment of base-lining needs and definition of base-lining approach. Duringmore » the assessment of base-lining needs a review of available monitoring data and store/package records should be undertaken (if the store is operational). Evolutionary processes (affecting safety functions), and their corresponding indicators, that can be measured to provide a baseline for the waste-storage system should then be identified in order for the most suitable indicators to be selected for base-lining. In defining the approach, identification of opportunities to collect data and constraints is undertaken before selecting the techniques for base-lining and developing a base-lining plan. Base-lining data may be used to establish that the state of the packages is consistent with the waste acceptance criteria for the storage facility and to support the interpretation of monitoring and inspection data collected during store operations. Opportunities and constraints are identified for different store and package types. Technologies that could potentially be used to measure baseline indicators are also reviewed. (authors)« less

  11. Foundational Security Principles for Medical Application Platforms* (Extended Abstract)

    PubMed Central

    Vasserman, Eugene Y.; Hatcliff, John

    2014-01-01

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

  12. An updated look at document security: from initiation to storage or shredder.

    PubMed

    McConnell, Charles R

    2014-01-01

    In these days of close attention to security of information handled electronically, there is often a tendency to overlook the security of hard-copy documents. Document security can involve many areas of business, but the health care department manager's concerns are primarily for patient records and employee documentation. Document security is closely related to growing concerns for individual privacy; guidelines are furnished for protecting employee privacy by separating retention practices for business information from personal information. Sensitive documentation requires rules and procedures for processing, retaining, accessing, storing, and eventually destroying. Also, documents that are missing or incomplete at times present unique problems for the organization. The department manager is provided with some simple rules for safeguarding employee and patient documentation.

  13. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  14. Assurance: the power behind PCASSO security.

    PubMed Central

    Baker, D. B.; Masys, D. R.; Jones, R. L.; Barnhart, R. M.

    1999-01-01

    The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted. While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care. PMID:10566443

  15. Inherently Safe and Long-Life Fission Power System for Lunar Outposts

    NASA Astrophysics Data System (ADS)

    Schriener, T. M.; El-Genk, Mohamed S.

    Power requirements for future lunar outposts, of 10's to 100's kWe, can be fulfilled using nuclear reactor power systems. In addition to the long life and operation reliability, safety is paramount in all phases, including fabrication and assembly, launch, emplacement below grade on the lunar surface, operation, post-operation decay heat removal and long-term storage and eventual retrieval. This paper introduces the Solid Core-Sectored Compact Reactor (SC-SCoRe) and power system with static components and no single point failures. They ensure reliable continuous operation for ~21 years and fulfill the safety requirements. The SC-SCoRe nominally generates 1.0 MWth at liquid NaK-56 coolant inlet and exit temperatures of 850 K and 900 K and the power system provides 38 kWe at high DC voltage using SiGe thermoelectric (TE) conversion assemblies. In case of a loss of coolant or cooling in a reactor core sector, the power system continues to operate; generating ~4 kWe to the outpost for emergency life support needs. The post-operation storage of the reactor below grade on the lunar surface is a safe and practical choice. The total radioactivity in the reactor drops from ~1 million Ci, immediately at shutdown, to below 164 Ci after 300 years of storage. At such time, the reactor is retrieved safely with no contamination or environmental concerns.

  16. Encrypted holographic data storage based on orthogonal-phase-code multiplexing.

    PubMed

    Heanue, J F; Bashaw, M C; Hesselink, L

    1995-09-10

    We describe an encrypted holographic data-storage system that combines orthogonal-phase-code multiplexing with a random-phase key. The system offers the security advantages of random-phase coding but retains the low cross-talk performance and the minimum code storage requirements typical in an orthogonal-phase-code-multiplexing system.

  17. Points of Influence for Lethal Means Counseling and Safe Gun Storage Practices.

    PubMed

    Runyan, Carol W; Brooks-Russell, Ashley; Betz, Marian E

    2018-06-07

    Counseling about reducing access to lethal means of suicide, especially firearms, is a recommended practice in emergency departments (EDs) but does not occur routinely. Understanding influencers of decisions makers in health care (ED nurse leaders, mental health providers) and temporary firearm storage (law enforcement and gun retailers) could enhance practice. We surveyed these 4 groups in the 8-state region of the Mountain West. For ED nurse leaders (n = 190), hospital legal, risk management, and quality improvement representatives, and the ED nursing director were most often cited as influential, whereas mental health providers (n = 67) cited their own team. Law enforcement officials (n = 448) identified the overall community and leaders of mental health or general health organizations as influential. Firearm retailers (n = 95) cited local law enforcement and national firearm organizations. Advocacy from influential groups may encourage efforts to provide lethal means counseling and temporary off-site storage of firearms for suicide prevention.

  18. Water contamination in urban south India: household storage practices and their implications for water safety and enteric infections.

    PubMed

    Brick, Thomas; Primrose, Beryl; Chandrasekhar, R; Roy, Sheela; Muliyil, Jayaprakash; Kang, Gagandeep

    2004-10-01

    Water contamination, at source and during household storage, is a major cause of enterically transmitted infections in developing countries. This study assessed contamination of the municipal water in a south Indian town, which obtains its water intermittently from a surface lake and by pumping subsurface water from a dry river bed, and monitored microbial contamination during household storage. All samples of the 'treated' municipal water were contaminated when freshly pumped, and on household storage, 25/37 (67%) showed increased contamination during storage periods from 1 to 9 days. Household storage in brass, but not in containers of other materials significantly decreased contamination of water (p = 0.04). This was confirmed in the laboratory by testing water seeded with 10(3) to 10(5) Escherichia coli per 100 ml stored in containers of different materials (p < 0.01). Despite the requirements for provision of safe drinking water in municipal areas, in practice the water supplied in Vellore is contaminated and current household storage practices increase the level of contamination in at least two-thirds of households. The implementation of locally appropriate point-of-use disinfection and safe household storage practices in developing countries is an urgent need to ensure a safe, reliable year-round supply in areas where clean water is not available.

  19. Irrigation infrastructure and water appropriation rules for food security

    NASA Astrophysics Data System (ADS)

    Gohar, Abdelaziz A.; Amer, Saud A.; Ward, Frank A.

    2015-01-01

    In the developing world's irrigated areas, water management and planning is often motivated by the need for lasting food security. Two important policy measures to address this need are improving the flexibility of water appropriation rules and developing irrigation storage infrastructure. Little research to date has investigated the performance of these two policy measures in a single analysis while maintaining a basin wide water balance. This paper examines impacts of storage capacity and water appropriation rules on total economic welfare in irrigated agriculture, while maintaining a water balance. The application is to a river basin in northern Afghanistan. A constrained optimization framework is developed to examine economic consequences on food security and farm income resulting from each policy measure. Results show that significant improvements in both policy aims can be achieved through expanding existing storage capacity to capture up to 150 percent of long-term average annual water supplies when added capacity is combined with either a proportional sharing of water shortages or unrestricted water trading. An important contribution of the paper is to show how the benefits of storage and a changed water appropriation system operate under a variable climate. Results show that the hardship of droughts can be substantially lessened, with the largest rewards taking place in the most difficult periods. Findings provide a comprehensive framework for addressing future water scarcity, rural livelihoods, and food security in the developing world's irrigated regions.

  20. Data security in genomics: A review of Australian privacy requirements and their relation to cryptography in data storage.

    PubMed

    Schlosberg, Arran

    2016-01-01

    The advent of next-generation sequencing (NGS) brings with it a need to manage large volumes of patient data in a manner that is compliant with both privacy laws and long-term archival needs. Outside of the realm of genomics there is a need in the broader medical community to store data, and although radiology aside the volume may be less than that of NGS, the concepts discussed herein are similarly relevant. The relation of so-called "privacy principles" to data protection and cryptographic techniques is explored with regards to the archival and backup storage of health data in Australia, and an example implementation of secure management of genomic archives is proposed with regards to this relation. Readers are presented with sufficient detail to have informed discussions - when implementing laboratory data protocols - with experts in the fields.

  1. Data security in genomics: A review of Australian privacy requirements and their relation to cryptography in data storage

    PubMed Central

    Schlosberg, Arran

    2016-01-01

    The advent of next-generation sequencing (NGS) brings with it a need to manage large volumes of patient data in a manner that is compliant with both privacy laws and long-term archival needs. Outside of the realm of genomics there is a need in the broader medical community to store data, and although radiology aside the volume may be less than that of NGS, the concepts discussed herein are similarly relevant. The relation of so-called “privacy principles” to data protection and cryptographic techniques is explored with regards to the archival and backup storage of health data in Australia, and an example implementation of secure management of genomic archives is proposed with regards to this relation. Readers are presented with sufficient detail to have informed discussions – when implementing laboratory data protocols – with experts in the fields. PMID:26955504

  2. Mitigating Cyber Security Risk in Satellite Ground Systems

    DTIC Science & Technology

    2015-04-01

    because cyber security in government remains shrouded in secrecy. However, using the Defense Operational Test and Evaluation Office’s (DOT& E ) FY14...report on cybersecurity one grasps the seriousness of the problem. DOT& E reported only 85% of networks in DoD were compliant with the cyber...security regulations discussed later in this paper. Not until compliance is near 100% could DOT& E conceive with confidence that DoD networks were safe

  3. Mobile code security

    NASA Astrophysics Data System (ADS)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  4. Safe sex

    MedlinePlus

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  5. 18 CFR 3a.61 - Storage and custody of classified information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...

  6. 18 CFR 3a.61 - Storage and custody of classified information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...

  7. 18 CFR 3a.61 - Storage and custody of classified information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...

  8. 18 CFR 3a.61 - Storage and custody of classified information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Storage and custody of classified information. 3a.61 Section 3a.61 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Storage and Custody...

  9. Cooperative high-performance storage in the accelerated strategic computing initiative

    NASA Technical Reports Server (NTRS)

    Gary, Mark; Howard, Barry; Louis, Steve; Minuzzo, Kim; Seager, Mark

    1996-01-01

    The use and acceptance of new high-performance, parallel computing platforms will be impeded by the absence of an infrastructure capable of supporting orders-of-magnitude improvement in hierarchical storage and high-speed I/O (Input/Output). The distribution of these high-performance platforms and supporting infrastructures across a wide-area network further compounds this problem. We describe an architectural design and phased implementation plan for a distributed, Cooperative Storage Environment (CSE) to achieve the necessary performance, user transparency, site autonomy, communication, and security features needed to support the Accelerated Strategic Computing Initiative (ASCI). ASCI is a Department of Energy (DOE) program attempting to apply terascale platforms and Problem-Solving Environments (PSEs) toward real-world computational modeling and simulation problems. The ASCI mission must be carried out through a unified, multilaboratory effort, and will require highly secure, efficient access to vast amounts of data. The CSE provides a logically simple, geographically distributed, storage infrastructure of semi-autonomous cooperating sites to meet the strategic ASCI PSE goal of highperformance data storage and access at the user desktop.

  10. 24 CFR 3400.305 - Data security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Data security. 3400.305 Section... DEVELOPMENT SAFE MORTGAGE LICENSING ACT Minimum Requirements for Administration of the NMLSR § 3400.305 Data... registrants whose data may have been compromised, and the employer of the loan originator or registrant, if...

  11. Glacistore: Understanding Late Cenozoic Glaciation and Basin Processes for the Development of Secure Large Scale Offshore CO2 Storage (North Sea).

    NASA Astrophysics Data System (ADS)

    Stewart, H. A.; Barrio, M.; Akhurst, M.; Aagaard, P.; Alcalde, J.; Bauer, A.; Bradwell, T.; Cavanagh, A.; Faleide, J. I.; Furre, A. K.; Haszeldine, S.; Hjelstuen, B. O.; Holloway, S.; Johansen, H.; Johnson, G.; Kuerschner, W.; Mondol, N. H.; Querendez, E.; Ringrose, P. S.; Sejrup, H. P.; Stewart, M.; Stoddart, D.; Wilkinson, M.; Zalmstra, H.

    2014-12-01

    The sedimentary strata of the North Sea Basin (NSB) record the glacial and interglacial history of environmental change in the Northern Hemisphere, and are a proposed location for the engineered storage of carbon dioxide (CO2) captured from power plant and industrial sources to reduce greenhouse gas emissions. These aspects interact in the geomechanical and fluid flow domain, as ice sheet dynamics change the properties of potential seal and reservoir rocks that are the prospective geological storage strata for much of Europe's captured CO2. The intensification of the global glacial-interglacial cycle at the onset of the Pleistocene (2.5-2.7 Ma) was a critical tipping-point in Earth's recent climate history. The increased severity of glaciations at the Plio-Pleistocene boundary triggered the first development of large-scale continental ice sheets in the Northern Hemisphere. The central part of the NSB preserves a unique history of the depositional record spanning at least the last 3 Ma, which also forms the overburden and seal to the underlying CO2 reservoirs. There is good evidence that these ice sheets created strong feedback loops that subsequently affected the evolution of the Quaternary climate system through complex ocean-atmosphere-cryosphere linkages. Understanding NSB dynamics, including the role of fluids in controlling compaction, cementation, and diagenetic processes in shale-dominated basins, is essential for CO2 storage site characterisation to increase understanding and confidence in secure storage. An increased understanding of the overlying sequence will inform quantitative predictions of the performance of prospective CO2 storage sites in glaciated areas in Europe and worldwide; to include improved resolution of glacial cycles (depositional and chronological framework), characterise pore fluids, flow properties of glacial landforms within the sequence (e.g. tunnel valleys) and the geomechanical effects (quantify compaction, rock stiffness, strength

  12. Home-SAFE: A New Approach in Day Care for the Young Child.

    ERIC Educational Resources Information Center

    Kornfeld, Maurine

    The Los Angeles Section, National Council of Jewish Women, has developed an innovative pilot program in day care geared to the changing life style of child rearing by single parents. Home-SAFE provides children a warm, secure environment in supervised, subsidized, licensed day care homes, and includes enrichment activities by trained volunteers;…

  13. 75 FR 43906 - Hazardous Materials: Requirements for the Storage of Explosives During Transportation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ... program in emergency response procedures for all employees working at the safe haven. NFPA 498 section 4.5... safe havens used for unattended storage of Division 1.1, 1.2, and 1.3 explosives. DATES: Comments must... circumstances and operational environment. B. Federal Motor Carrier Safety Regulations (FMCSRs), 49 CFR Parts...

  14. RBC Storage Effect on Coagulation, Microparticles and Microchimerism in Critically Ill Patients

    DTIC Science & Technology

    2015-03-01

    Award Number: W81XWH-11-2-0028 TITLE: “RBC Storage Effect on Coagulation, Microparticles and Microchimerism in Critically Ill Patients...27 DEC 2010 - 26 DEC 2015 – 4. TITLE AND SUBTITLE "“RBC Storage Effect on Coagulation, Microparticles and 5a. CONTRACT NUMBER Microchimerism in...15. SUBJECT TERMS RBC storage age; microchimerism; critically ill patients; coagulation; microparticles 16. SECURITY CLASSIFICATION OF: U 17

  15. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    DTIC Science & Technology

    2012-01-01

    Martin B. Zimmerman, “Market Incentives for Safe Commercial Airline Operation,” American Economic Review, Vol. 78, No. 5, 1988, pp. 913–935. Bosch...Modeling,” in Stuart Johnson, Martin C. Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif...677–725. Persico, Nicola, and Petra E. Todd, “Passenger Profiling, Imperfect Screening, and Airport Security,” American Economic Review, Vol. 95

  16. Security Is Not an Option--Learning in a Safe Environment. FEDA Paper.

    ERIC Educational Resources Information Center

    Coe, Beatrice

    1997-01-01

    A study examined what further education colleges in Britain were doing about security and what they planned for the future. A literature search found that a PEST (Political/legal, Economic, Sociocultural, and Technological) analysis was one way to examine the differential impact of external influences. A PEST analysis offered a strategy for…

  17. Ensuring the security and availability of a hospital wireless LAN system.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-01-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  18. Long-Cycling Aqueous Organic Redox Flow Battery (AORFB) toward Sustainable and Safe Energy Storage.

    PubMed

    Hu, Bo; DeBruler, Camden; Rhodes, Zayn; Liu, T Leo

    2017-01-25

    Redox flow batteries (RFBs) are a viable technology to store renewable energy in the form of electricity that can be supplied to electricity grids. However, widespread implementation of traditional RFBs, such as vanadium and Zn-Br 2 RFBs, is limited due to a number of challenges related to materials, including low abundance and high costs of redox-active metals, expensive separators, active material crossover, and corrosive and hazardous electrolytes. To address these challenges, we demonstrate a neutral aqueous organic redox flow battery (AORFB) technology utilizing a newly designed cathode electrolyte containing a highly water-soluble ferrocene molecule. Specifically, water-soluble (ferrocenylmethyl)trimethylammonium chloride (FcNCl, 4.0 M in H 2 O, 107.2 Ah/L, and 3.0 M in 2.0 NaCl, 80.4 Ah/L) and N 1 -ferrocenylmethyl-N 1 ,N 1 ,N 2 ,N 2 ,N 2 -pentamethylpropane-1,2-diaminium dibromide, (FcN 2 Br 2 , 3.1 M in H 2 O, 83.1 Ah/L, and 2.0 M in 2.0 M NaCl, 53.5 Ah/L) were synthesized through structural decoration of hydrophobic ferrocene with synergetic hydrophilic functionalities including an ammonium cation group and a halide anion. When paired with methyl viologen (MV) as an anolyte, resulting FcNCl/MV and FcN 2 Br 2 /MV AORFBs were operated in noncorrosive neutral NaCl supporting electrolytes using a low-cost anion-exchange membrane. These ferrocene/MV AORFBs are characterized as having high theoretical energy density (45.5 Wh/L) and excellent cycling performance from 40 to 100 mA/cm 2 . Notably, the FcNCl/MV AORFBs (demonstrated at 7.0 and 9.9 Wh/L) exhibited unprecedented long cycling performance, 700 cycles at 60 mA/cm 2 with 99.99% capacity retention per cycle, and delivered power density up to 125 mW/cm 2 . These AORFBs are built from earth-abundant elements and are environmentally benign, thus representing a promising choice for sustainable and safe energy storage.

  19. 14. END VIEW OF THE PLUTONIUM STORAGE VAULT FROM THE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. END VIEW OF THE PLUTONIUM STORAGE VAULT FROM THE REMOTE CONTROL STATION. THE STACKER-RETRIEVER, A REMOTELY-OPERATED, MECHANIZED TRANSPORT SYSTEM, RETRIEVES CONTAINERS OF PLUTONIUM FROM SAFE GEOMETRY PALLETS STORED ALONG THE LENGTH OF THE VAULT. THE STACKER-RETRIEVER RUNS ALONG THE AISLE BETWEEN THE PALLETS OF THE STORAGE CHAMBER. (3/2/86) - Rocky Flats Plant, Plutonium Recovery Facility, Northwest portion of Rocky Flats Plant, Golden, Jefferson County, CO

  20. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    PubMed

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  1. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks

    PubMed Central

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  2. 75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...

  3. Re-designing the PhEDEx Security Model

    NASA Astrophysics Data System (ADS)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  4. 30 CFR 250.1205 - Site security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...

  5. 30 CFR 250.1205 - Site security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...

  6. 30 CFR 250.1205 - Site security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... site security? You must: (1) Protect Federal production against production loss or theft; (2) Post a... Regional Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft...) All valves on lines leaving a royalty or inventory storage tank, including load-out line valves, drain...

  7. 30 CFR 250.1205 - Site security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...

  8. Using the Method of Water Poverty Index (WPI) to Evaluate the Region Water Security

    NASA Astrophysics Data System (ADS)

    Fu, Q.; Kachanoski, G.

    2008-12-01

    Water security is a widely concerned issue in the world nowadays. A new method, water poverty index (WPI), has been used to evaluate the regional water security. Twelve state farms in Heilongjiang Province, Northeastern China were selected to evaluate water security status based on the data of 2006 by using WPI and mean deviation grading method. The method of WPI includes five key indexes, such as resources(R), access (A), capacity(C), utilization (U) and environment (E). Each key index includes several sub-indexes. According to the results of WPI, the grade of each farm has been calculated by using the method of mean deviation grading. Thus, the radar images can be protracted of each farm. From the radar images, the conclusions can be drawn that the WPI values of Farms 853 and Hongqiling were in very safe status, while that of Farm Raohe was in safe status, those of Farms Youyi, 597, 852, 291 and Jiangchuan were in moderate safe status, that of Farm Beixing was in low safe status and those of Farms Shuangyashan, Shuguang and Baoshan were in unsafe status. The results from this study can provide basic information for decision making on rational use of water resources and regulations for regional water safety guarantee system.

  9. Storage of nuclear materials by encapsulation in fullerenes

    DOEpatents

    Coppa, Nicholas V.

    1994-01-01

    A method of encapsulating radioactive materials inside fullerenes for stable long-term storage. Fullerenes provide a safe and efficient means of disposing of nuclear waste which is extremely stable with respect to the environment. After encapsulation, a radioactive ion is essentially chemically isolated from its external environment.

  10. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    DTIC Science & Technology

    2017-03-28

    connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in

  11. Interventions to Improve Safe Sleep Among Hospitalized Infants at Eight Children's Hospitals.

    PubMed

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Lukasiewicz, Gloria; Truong, Therese Macasiray

    2016-02-01

    Within hospital pediatric units, there is a lack of consistent application or modeling of the American Academy of Pediatrics recommendations for safe infant sleep. The purpose of this study was to improve safe sleep practices for infants in nonneonatal pediatric units with implementation of specific interventions. This multi-institutional study was conducted by using baseline observations collected for sleep location, position, and environment (collectively, "safe sleep") of infants admitted to pediatric units. Interventions consisted of: (1) staff education, including a commitment to promote safe sleep; (2) implementing site-generated safe sleep policies; (3) designating supply storage in patient rooms; and/or (4) caregiver education. Postintervention observations of safe sleep were collected. Eight hospitals participated from the Inpatient FOCUS Group of the Children's Hospital Association. Each site received institutional review board approval/exemption. Safe sleep was observed for 4.9% of 264 infants at baseline and 31.2% of 234 infants postintervention (P<.001). Extra blankets, the most common of unsafe items, were present in 77% of cribs at baseline and 44% postintervention. However, the mean number of unsafe items observed in each sleeping environment was reduced by >50% (P=.001). Implementation of site-specific interventions seems to improve overall safe sleep in inpatient pediatric units, although continued improvement is needed. Specifically, extra items are persistently left in the sleeping environment. Moving forward, hospitals should evaluate their compliance with American Academy of Pediatrics recommendations and embrace initiatives to improve modeling of safe sleep. Copyright © 2016 by the American Academy of Pediatrics.

  12. Gas Hydrate Storage of Natural Gas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rudy Rogers; John Etheridge

    2006-03-31

    Environmental and economic benefits could accrue from a safe, above-ground, natural-gas storage process allowing electric power plants to utilize natural gas for peak load demands; numerous other applications of a gas storage process exist. A laboratory study conducted in 1999 to determine the feasibility of a gas-hydrates storage process looked promising. The subsequent scale-up of the process was designed to preserve important features of the laboratory apparatus: (1) symmetry of hydrate accumulation, (2) favorable surface area to volume ratio, (3) heat exchanger surfaces serving as hydrate adsorption surfaces, (4) refrigeration system to remove heat liberated from bulk hydrate formation, (5)more » rapid hydrate formation in a non-stirred system, (6) hydrate self-packing, and (7) heat-exchanger/adsorption plates serving dual purposes to add or extract energy for hydrate formation or decomposition. The hydrate formation/storage/decomposition Proof-of-Concept (POC) pressure vessel and supporting equipment were designed, constructed, and tested. This final report details the design of the scaled POC gas-hydrate storage process, some comments on its fabrication and installation, checkout of the equipment, procedures for conducting the experimental tests, and the test results. The design, construction, and installation of the equipment were on budget target, as was the tests that were subsequently conducted. The budget proposed was met. The primary goal of storing 5000-scf of natural gas in the gas hydrates was exceeded in the final test, as 5289-scf of gas storage was achieved in 54.33 hours. After this 54.33-hour period, as pressure in the formation vessel declined, additional gas went into the hydrates until equilibrium pressure/temperature was reached, so that ultimately more than the 5289-scf storage was achieved. The time required to store the 5000-scf (48.1 hours of operating time) was longer than designed. The lower gas hydrate formation rate is attributed

  13. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2009-10-15

    and technical measures to prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage ...Talks On Nuclear Security,” The Boston Globe, May 5, 2009. 79 Abdul Mannan, “Preventing Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or...a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 80 Martellini, 2008. 81 For more information

  14. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  15. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.; Cavolowsky, John

    2015-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  16. Energy Storage: Batteries and Fuel Cells for Exploration

    NASA Technical Reports Server (NTRS)

    Manzo, Michelle A.; Miller, Thomas B.; Hoberecht, Mark A.; Baumann, Eric D.

    2007-01-01

    NASA's Vision for Exploration requires safe, human-rated, energy storage technologies with high energy density, high specific energy and the ability to perform in a variety of unique environments. The Exploration Technology Development Program is currently supporting the development of battery and fuel cell systems that address these critical technology areas. Specific technology efforts that advance these systems and optimize their operation in various space environments are addressed in this overview of the Energy Storage Technology Development Project. These technologies will support a new generation of more affordable, more reliable, and more effective space systems.

  17. Early Arrival or Trespassing? Leadership, School Security, and the Right to the School

    ERIC Educational Resources Information Center

    Irby, Decoteau J.; Thomas, Christopher

    2013-01-01

    School leaders are under constant pressure to ensure that schools are safe and to demonstrate that student safety and discipline are priorities. In many districts, schools rely on local law enforcement, school police, or security personnel to assist with promoting and maintaining safe schools. To encourage school leaders to think critically about…

  18. Mining Security Pipe(TSM)with Underground GPS Global(RSPG)Escape Security Device in Underground Mining

    NASA Astrophysics Data System (ADS)

    Giménez, Rafael Barrionuevo

    2016-06-01

    TSM is escape pipe in case of collapse of terrain. The TSM is a passive security tool placed underground to connect the work area with secure area (mining gallery mainly). TSM is light and hand able pipe made with aramid (Kevlar), carbon fibre, or other kind of new material. The TSM will be placed as a pipe line network with many in/out entrances/exits to rich and connect problem work areas with another parts in a safe mode. Different levels of instrumentation could be added inside such as micro-led escape way suggested, temperature, humidity, level of oxygen, etc.). The open hardware and software like Arduino will be the heart of control and automation system.

  19. Studies of Phase Change Materials and a Latent Heat Storage Unit Used for a Natural Circulation Cooling/Latent Heat Storage System

    NASA Astrophysics Data System (ADS)

    Sakitani, Katsumi; Honda, Hiroshi

    Experiments were performed to investigate feasibility of using organic materials as a PCM for a latent heat storage unit of a natural circulation cooling/latent heat storage system. This system was designed to cool a shelter accommodating telecommunication equipment located in subtropical deserts or similar regions without using a power source. Taking into account practical considerations and the results of various experiments regarding the thermodynamic properties, thermal degradation, and corrosiveness to metals, lauric acid and iron was selected for the PCM and the latent heat storage unit material, respectively. Cyclic heating and cooling of the latent heat storage unit undergoing solid-liquid phase change was repeated for more than 430 days. The results showed that the heating-cooling curve was almost unchanged between the early stage and the 1,870th cycle. It was concluded that the latent heat storage unit could be used safely for more than ten years as a component of the cooling system.

  20. Overview of Energy Storage Technologies for Space Applications

    NASA Technical Reports Server (NTRS)

    Surampudi, Subbarao

    2006-01-01

    This presentations gives an overview of the energy storage technologies that are being used in space applications. Energy storage systems have been used in 99% of the robotic and human space missions launched since 1960. Energy storage is used in space missions to provide primary electrical power to launch vehicles, crew exploration vehicles, planetary probes, and astronaut equipment; store electrical energy in solar powered orbital and surface missions and provide electrical energy during eclipse periods; and, to meet peak power demands in nuclear powered rovers, landers, and planetary orbiters. The power source service life (discharge hours) dictates the choice of energy storage technology (capacitors, primary batteries, rechargeable batteries, fuel cells, regenerative fuel cells, flywheels). NASA is planning a number of robotic and human space exploration missions for the exploration of space. These missions will require energy storage devices with mass and volume efficiency, long life capability, an the ability to operate safely in extreme environments. Advanced energy storage technologies continue to be developed to meet future space mission needs.

  1. Wax: A benign hydrogen-storage material that rapidly releases H2-rich gases through microwave-assisted catalytic decomposition

    PubMed Central

    Gonzalez-Cortes, S.; Slocombe, D. R.; Xiao, T.; Aldawsari, A.; Yao, B.; Kuznetsov, V. L.; Liberti, E.; Kirkland, A. I.; Alkinani, M. S.; Al-Megren, H. A.; Thomas, J. M.; Edwards, P. P.

    2016-01-01

    Hydrogen is often described as the fuel of the future, especially for application in hydrogen powered fuel-cell vehicles (HFCV’s). However, its widespread implementation in this role has been thwarted by the lack of a lightweight, safe, on-board hydrogen storage material. Here we show that benign, readily-available hydrocarbon wax is capable of rapidly releasing large amounts of hydrogen through microwave-assisted catalytic decomposition. This discovery offers a new material and system for safe and efficient hydrogen storage and could facilitate its application in a HFCV. Importantly, hydrogen storage materials made of wax can be manufactured through completely sustainable processes utilizing biomass or other renewable feedstocks. PMID:27759014

  2. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted

  3. Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kovacic, Donald N

    2015-01-01

    This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture

  4. Factors Influencing the Adoption of Cloud Storage by Information Technology Decision Makers

    ERIC Educational Resources Information Center

    Wheelock, Michael D.

    2013-01-01

    This dissertation uses a survey methodology to determine the factors behind the decision to adopt cloud storage. The dependent variable in the study is the intent to adopt cloud storage. Four independent variables are utilized including need, security, cost-effectiveness and reliability. The survey includes a pilot test, field test and statistical…

  5. National assessment of geologic carbon dioxide storage resources: methodology implementation

    USGS Publications Warehouse

    Blondes, Madalyn S.; Brennan, Sean T.; Merrill, Matthew D.; Buursink, Marc L.; Warwick, Peter D.; Cahan, Steven M.; Corum, Margo D.; Cook, Troy A.; Craddock, William H.; DeVera, Christina A.; Drake II, Ronald M.; Drew, Lawrence J.; Freeman, P.A.; Lohr, Celeste D.; Olea, Ricardo A.; Roberts-Ashby, Tina L.; Slucher, Ernie R.; Varela, Brian A.

    2013-01-01

    In response to the 2007 Energy Independence and Security Act, the U.S. Geological Survey (USGS) conducted a national assessment of potential geologic storage resources for carbon dioxide (CO2). Storage of CO2 in subsurface saline formations is one important method to reduce greenhouse gas emissions and curb global climate change. This report provides updates and implementation details of the assessment methodology of Brennan and others (2010, http://pubs.usgs.gov/of/2010/1127/) and describes the probabilistic model used to calculate potential storage resources in subsurface saline formations.

  6. ASIS healthcare security benchmarking study.

    PubMed

    2001-01-01

    Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.

  7. Ensuring Food Security Through Enhancing Microbiological Food Safety

    NASA Astrophysics Data System (ADS)

    Mikš-Krajnik, Marta; Yuk, Hyun-Gyun; Kumar, Amit; Yang, Yishan; Zheng, Qianwang; Kim, Min-Jeong; Ghate, Vinayak; Yuan, Wenqian; Pang, Xinyi

    2015-10-01

    Food safety and food security are interrelated concepts with a profound impact on the quality of human life. Food security describes the overall availability of food at different levels from global to individual household. While, food safety focuses on handling, preparation and storage of foods in order to prevent foodborne illnesses. This review focuses on innovative thermal and non-thermal technologies in the area of food processing as the means to ensure food security through improving food safety with emphasis on the reduction and control of microbiological risks. The antimicrobial efficiency and mechanism of new technologies to extend the shelf life of food product were also discussed.

  8. 76 FR 4123 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    .... The closed portions of the meeting will address threats to our homeland security, results of a cyber... designed to keep our country safe. A briefing on the Cyber Storm III Exercise will include lessons learned and vulnerabilities of cyber assets, as well as potential methods to improve a Federal response to a...

  9. Multifunctional Structural-energy Storage Nanocomposites for Ultra Lightweight Micro Autonomous Vehicles

    DTIC Science & Technology

    2013-02-01

    supplement the main power supply. Here we report on the use of flexible carbon nanotube (CNT)-based composites for multifunctional structural energy storage...TERMS Micro vehicle, Supercapacitor, Carbon Nanotubes , CNTs, Energy Storage, Multifunctional Materials 16. SECURITY CLASSIFICATION OF: 17...consists of a current collector, a porous electrode layer ( carbon nanotubes [CNTs], in this case) infiltrated with an electrolyte (i.e., a liquid

  10. Teleradiology network system and computer-aided diagnosis workstation using the web medical image conference system with a new information security solution

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2011-03-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.

  11. Digital Device Architecture and the Safe Use of Flash Devices in Munitions

    NASA Technical Reports Server (NTRS)

    Katz, Richard B.; Flowers, David; Bergevin, Keith

    2017-01-01

    Flash technology is being utilized in fuzed munition applications and, based on the development of digital logic devices in the commercial world, usage of flash technology will increase. Digital devices of interest to designers include flash-based microcontrollers and field programmable gate arrays (FPGAs). Almost a decade ago, a study was undertaken to determine if flash-based microcontrollers could be safely used in fuzes and, if so, how should such devices be applied. The results were documented in the Technical Manual for the Use of Logic Devices in Safety Features. This paper will first review the Technical Manual and discuss the rationale behind the suggested architectures for microcontrollers and a brief review of the concern about data retention in flash cells. An architectural feature in the microcontroller under study will be discussed and its use will show how to screen for weak or failed cells during manufacture, storage, or immediately prior to use. As was done for microcontrollers a decade ago, architectures for a flash-based FPGA will be discussed, showing how it can be safely used in fuzes. Additionally, architectures for using non-volatile (including flash-based) storage will be discussed for SRAM-based FPGAs.

  12. Re-designing the PhEDEx Security Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, C.-H.; Wildish, T.; Zhang, X.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less

  13. Archival storage solutions for PACS

    NASA Astrophysics Data System (ADS)

    Chunn, Timothy

    1997-05-01

    While they are many, one of the inhibitors to the wide spread diffusion of PACS systems has been robust, cost effective digital archive storage solutions. Moreover, an automated Nearline solution is key to a central, sharable data repository, enabling many applications such as PACS, telemedicine and teleradiology, and information warehousing and data mining for research such as patient outcome analysis. Selecting the right solution depends on a number of factors: capacity requirements, write and retrieval performance requirements, scaleability in capacity and performance, configuration architecture and flexibility, subsystem availability and reliability, security requirements, system cost, achievable benefits and cost savings, investment protection, strategic fit and more.This paper addresses many of these issues. It compares and positions optical disk and magnetic tape technologies, which are the predominant archive mediums today. Price and performance comparisons will be made at different archive capacities, plus the effect of file size on storage system throughput will be analyzed. The concept of automated migration of images from high performance, high cost storage devices to high capacity, low cost storage devices will be introduced as a viable way to minimize overall storage costs for an archive. The concept of access density will also be introduced and applied to the selection of the most cost effective archive solution.

  14. Device-independent two-party cryptography secure against sequential attacks

    NASA Astrophysics Data System (ADS)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-05-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

  15. Analysis of Remote Site Energy Storage and Generation Systems

    DTIC Science & Technology

    1979-07-01

    Identify by block numIber) Wind Turbines Solar Energy Energy Wheels Solar Cells Wind Energy Hydrogen Energy Storage The rmion ics Energy Storage...using two separate nominal eight kilowatt wind turbine modules in con- * DD JAN 73 1473 UNCLASSIFIED41 SECURITY CLASSIFICATION OF THIS PAGE (When Dot...2. 1.3 Advanced Wind Energy Converters 28 2. 1. 3. 1 Cyclogyro 28 2. 1.3.2 Diffuser Augmented Wind Turbine (DAWT) 28 2.1.3.3 Vortex Augmenter Wind

  16. Monolithic natural gas storage delivery system based on sorbents

    DOEpatents

    Hornbostel, Marc; Krishnan, Gopala N.; Sanjurjo, Angel

    2016-09-27

    The invention provides methods for producing a strong, light, sorbent-based storage/dispenser system for gases and fuels. The system comprises a porous monolithic material with an adherent strong impervious skin that is capable of storing a gas under pressure in a safe and usable manner.

  17. Storage of Poisonous Substances and Firearms in Homes with Young Children Visitors and Older Adults

    PubMed Central

    Coyne-Beasley, Tamera; Runyan, Carol W.; Baccaglini, Lorena; Perkis, David; Johnson, Renee M.

    2011-01-01

    Background Most unintentional childhood poisonings and firearm injuries occur in residential environments. Therefore, a preventive strategy includes limiting children’s access to poisons and firearms through safe storage. This study examines storage of poisons and firearms among households with older adults, and households where young children reside compared to those where they visit only. Methods Sample is from a 2002 national random-digit-dial survey of 1003 households. Analyses were weighted to reflect the national population. Results There were 637 households with children residents or visitors aged <6 years. Seventy-five percent of the households (n =480) had children aged <6 as visitors only, and 15% had older adult residents (aged ≥70 years). Poisons and firearms were stored less securely in homes with young children as visitors as compared to those homes with resident young children. In 55% of homes where young children lived, and 74% of homes where young children were only visitors, household chemicals were reportedly stored unlocked. Although firearm ownership was comparable between the two categories of households (33% vs 34%), homes in which children were only visitors were more likely to store firearms unlocked (56%), than homes in which children resided (33%). Homes with older adult residents had more firearms present. Conclusions Children are at risk from improperly stored poisonous substances and firearms in their own homes and homes they visit. Strategies are needed to improve the storage practices of both poisons and firearms to minimize in-home hazards to young children, particularly raising awareness of these hazards to young visitors. PMID:15626565

  18. RAIN: A Bio-Inspired Communication and Data Storage Infrastructure.

    PubMed

    Monti, Matteo; Rasmussen, Steen

    2017-01-01

    We summarize the results and perspectives from a companion article, where we presented and evaluated an alternative architecture for data storage in distributed networks. We name the bio-inspired architecture RAIN, and it offers file storage service that, in contrast with current centralized cloud storage, has privacy by design, is open source, is more secure, is scalable, is more sustainable, has community ownership, is inexpensive, and is potentially faster, more efficient, and more reliable. We propose that a RAIN-style architecture could form the backbone of the Internet of Things that likely will integrate multiple current and future infrastructures ranging from online services and cryptocurrency to parts of government administration.

  19. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.

    PubMed

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-06-17

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.

  20. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs

    PubMed Central

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-01-01

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12–1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15–1.26 times the storage utilization efficiency compared with other schemes. PMID:28629135

  1. The shutdown reactor: Optimizing spent fuel storage cost

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pennington, C.W.

    1995-12-31

    Several studies have indicated that the most prudent way to store fuel at a shutdown reactor site safely and economically is through the use of a dry storage facility licensed under 10CFR72. While such storage is certainly safe, is it true that the dry ISFSI represents the safest and most economical approach for the utility? While no one is really able to answer that question definitely, as yet, Holtec has studied this issue for some time and believes that both an economic and safety case can be made for an optimization strategy that calls for the use of both wetmore » and dry ISFSI storage of spent fuel at some plants. For the sake of brevity, this paper summarizes some of Holtec`s findings with respect to the economics of maintaining some fuel in wet storage at a shutdown reactor. The safety issue, or more importantly the perception of safety of spent fuel in wet storage, still varies too much with the eye of the beholder, and until a more rigorous presentation of safety analyses can be made in a regulatory setting, it is not practically useful to argue about how many angels can sit on the head of a safety-related pin. Holtec is prepared to present such analyses, but this does not appear to be the proper venue. Thus, this paper simply looks at certain economic elements of a wet ISFSI at a shutdown reactor to make a prima facie case that wet storage has some attractiveness at a shutdown reactor and should not be rejected out of hand. Indeed, an optimization study at certain plants may well show the economic vitality of keeping some fuel in the pool and converting the NRC licensing coverage from 10CFR50 to 10CFR72. If the economics look attractive, then the safety issue may be confronted with a compelling interest.« less

  2. 21 CFR 205.50 - Minimum requirements for the storage and handling of prescription drugs and for the establishment...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...

  3. 21 CFR 205.50 - Minimum requirements for the storage and handling of prescription drugs and for the establishment...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...

  4. 21 CFR 205.50 - Minimum requirements for the storage and handling of prescription drugs and for the establishment...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...

  5. 21 CFR 205.50 - Minimum requirements for the storage and handling of prescription drugs and for the establishment...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...

  6. Securing the Data Storage and Processing in Cloud Computing Environment

    ERIC Educational Resources Information Center

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  7. Secure Skyline Queries on Cloud Platform.

    PubMed

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-04-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.

  8. Secure Skyline Queries on Cloud Platform

    PubMed Central

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-01-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710

  9. Willingness to pay for safe drinking water: Evidence from Parral, Mexico.

    PubMed

    Vásquez, William F; Mozumder, Pallab; Hernández-Arce, Jesús; Berrens, Robert P

    2009-08-01

    A referendum-format contingent valuation (CV) survey is used to elicit household willingness to pay responses for safe and reliable drinking water in Parral, Mexico. Households currently adopt a variety of averting and private investment choices (e.g., bottled water consumption, home-based water treatment, and installation of water storage facilities) to adapt to the existing water supply system. These revealed behaviors indicate the latent demand for safer and more reliable water services, which is corroborated by the CV survey evidence. Validity findings include significant scope sensitivity in WTP for water services. Further, results indicate that households are willing to pay from 1.8% to 7.55% of reported household income above their current water bill for safe and reliable drinking water services, depending upon the assumptions about response uncertainty.

  10. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  11. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    PubMed

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  12. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

    PubMed Central

    Moghaddasi, Hamid; Kamkarhaghighi, Mehran

    2016-01-01

    Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823

  13. 75 FR 14330 - Transitional Safe Harbor Protection for Treatment by the Federal Deposit Insurance Corporation as...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... Assets Transferred by an Insured Depository Institution in Connection With a Securitization or... limited time the safe harbor provision for securitizations that would be affected by recent changes to... securitizations for which financial assets were transferred or, for revolving trusts, for which securities were...

  14. Study of a fail-safe abort system for an actively cooled hypersonic aircraft: Computer program documentation

    NASA Technical Reports Server (NTRS)

    Haas, L. A., Sr.

    1976-01-01

    The Fail-Safe Abort System TEMPerature Analysis Program, (FASTEMP), user's manual is presented. This program was used to analyze fail-safe abort systems for an actively cooled hypersonic aircraft. FASTEMP analyzes the steady state or transient temperature response of a thermal model defined in rectangular, cylindrical, conical and/or spherical coordinate system. FASTEMP provides the user with a large selection of subroutines for heat transfer calculations. The various modes of heat transfer available from these subroutines are: heat storage, conduction, radiation, heat addition or generation, convection, and fluid flow.

  15. Subscale Validation of the Subsurface Active Filtration of Exhaust (SAFE) Approach to the NTP Ground Testing

    NASA Technical Reports Server (NTRS)

    Marshall, William M.; Borowski, Stanley K.; Bulman, Mel; Joyner, Russell; Martin, Charles R.

    2015-01-01

    Nuclear thermal propulsion (NTP) has been recognized as an enabling technology for missions to Mars and beyond. However, one of the key challenges of developing a nuclear thermal rocket is conducting verification and development tests on the ground. A number of ground test options are presented, with the Sub-surface Active Filtration of Exhaust (SAFE) method identified as a preferred path forward for the NTP program. The SAFE concept utilizes the natural soil characteristics present at the Nevada National Security Site to provide a natural filter for nuclear rocket exhaust during ground testing. A validation method of the SAFE concept is presented, utilizing a non-nuclear sub-scale hydrogen/oxygen rocket seeded with detectible radioisotopes. Additionally, some alternative ground test concepts, based upon the SAFE concept, are presented. Finally, an overview of the ongoing discussions of developing a ground test campaign are presented.

  16. Energy Security: From Deal Killers to Game Changers

    NASA Astrophysics Data System (ADS)

    Cooke, Charlie

    2010-03-01

    Five energy security ``deal killers" are identified: 1) Global warming and CO2 emissions from fossil fuel combustion; 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid; 3) Penetration of plant defenses to produce transportation fuels from biomass; 4) Mimicking nature: artificial photosynthesis for solar energy to fuels; and 5) Spent fuel from nuclear power reactors. Transformational basic research is required to successfully change the ground rules, to transform these ``deal killers" into ``game changers." T hey are: 1) Offsetting carbon capture and storage costs through enhanced oil recovery and methane generation from high temperature geothermal saline aquifers; 2) Electrical energy storage, through batteries and super-capacitors; 3) Genetic modification of plant cell walls, and catalytic methods for transforming plant sugars into fuels; 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels; and 5) Closing the nuclear fuel cycle. Basic research can revolutionize our approach to carbon-free energy by enhancing nature to achieve energy security.

  17. Voices from the Field: Working Together for Safe and Secure Schools. Summary of Findings from Florida Education Commissioner Charlie Crist's School Safety and Security Summits.

    ERIC Educational Resources Information Center

    Florida State Dept. of Education, Tallahassee.

    During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…

  18. Balancing the Need for Clinical Photography With Patient Privacy Issues: The Search for a Secure SmartPhone Application to Take and Store Clinical Photographs.

    PubMed

    Dumestre, Danielle O; Fraulin, Frankie O G

    2017-11-01

    Physicians are increasingly using smartphones to take clinical photographs. This study evaluates a smartphone application for clinical photography that prioritizes and facilitates patient security. Ethics approval was obtained to trial a smartphone clinical photography application, PicSafe Medi. Calgary plastic surgeons and residents used the application to obtain informed consent and photograph patients. Surveys gauging the application's usability, consent process, and photograph storage/sharing were then sent to surgeons and patients. Over a 6-month trial period, 15 plastic surgeons and residents used the application to photograph 86 patients. Over half of the patients (57%) completed the survey. The majority of patients (96%) were satisfied with the application's consent process, and all felt their photographs were secure. The majority (93%) of surgeons/residents completed the survey. The application was felt to overcome issues with current photography practices: inadequate consent and storage of photographs (100%), risk to patient confidentiality (92%), and unsecure photograph sharing (93%). Barriers to regular use of the application included need for cellphone service/Internet (54%), sanitary concerns due to the need for patients to sign directly on the phone (46%), inability to obtain proactive/retroactive consent (85%), and difficulty viewing photographs (80%). The majority of surgeons (85%) believe a smartphone application would be suitable for clinical patient photography, but due to its limitations, only 23% would use the trialed application. A smartphone clinical photography application addresses the patient confidentiality risks of current photography methods; however, limitations of the trialed application prevent its broad implementation.

  19. Operational adaptability evaluation index system of pumped storage in UHV receiving-end grids

    NASA Astrophysics Data System (ADS)

    Yuan, Bo; Zong, Jin; Feng, Junshu

    2017-01-01

    Pumped storage is an effective solution to deal with the emergency reserve shortage, renewable energy accommodating and peak-shaving problems in ultra-high voltage (UHV) transmission receiving-end grids. However, governments and public opinion in China tend to evaluate the operational effectiveness of pumped storage using annual utilization hour, which may result in unreasonable and unnecessary dispatch of pumped storage. This paper built an operational adaptability evaluation index system for pumped storage in UHV-receiving end grids from three aspects: security insurance, peak-shaving and renewable energy accommodating, which can provide a comprehensive and objective way to evaluate the operational performance of a pumped storage station.

  20. Organizing Safe Transitions from Intensive Care

    PubMed Central

    Häggström, Marie; Bäckström, Britt

    2014-01-01

    Background. Organizing and performing patient transfers in the continuum of care is part of the work of nurses and other staff of a multiprofessional healthcare team. An understanding of discharge practices is needed in order to ultimate patients' transfers from high technological intensive care units (ICU) to general wards. Aim. To describe, as experienced by intensive care and general ward staff, what strategies could be used when organizing patient's care before, during, and after transfer from intensive care. Method. Interviews of 15 participants were conducted, audio-taped, transcribed verbatim, and analyzed using qualitative content analysis. Results. The results showed that the categories secure, encourage, and collaborate are strategies used in the three phases of the ICU transitional care process. The main category; a safe, interactive rehabilitation process, illustrated how all strategies were characterized by an intention to create and maintain safety during the process. A three-way interaction was described: between staff and patient/families, between team members and involved units, and between patient/family and environment. Discussion/Conclusions. The findings highlight that ICU transitional care implies critical care rehabilitation. Discharge procedures need to be safe and structured and involve collaboration, encouraging support, optimal timing, early mobilization, and a multidiscipline approach. PMID:24782924

  1. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  2. Secure Container For Discarded Hypodermic Needles

    NASA Technical Reports Server (NTRS)

    Lee, Angelene M.

    1992-01-01

    Container designed for safe retention of discarded blood-collecting hypodermic needles and similar sharp objects used in life-science experiments aboard spacecraft. Needles inserted through self-closing lid and retained magnetically. They are inserted, sharp end first, through spring-loaded flap. Long needles and needles on syringes cannot turn around in container. Can be emptied, cleaned, and reused. Used on Earth to provide unusually secure containment of sharp objects.

  3. Earth Observations for Global Water Security

    NASA Technical Reports Server (NTRS)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  4. PREFACE: Nanosafe 2008: International Conference on Safe production and use of nanomaterials

    NASA Astrophysics Data System (ADS)

    Sentein, Carole; Schuster, Frédéric; Tardif, Francois

    2009-07-01

    The first international conference on 'Safe production and use of nanomaterials': NanoSafe2008 was held on 3-7 November at the Minatec congress center located in Grenoble, France. As recognised, the rapidly developing field of nanotechnologies presents many opportunities and benefits for new materials with significantly improved properties as well as revolutionary applications in the fields of energy, environment, medicine, etc. However, the potential impact of these new materials on human health and the environment is viewed with apprehension. All the security aspects have to be solved in order to reach an acceptable level of risk. The new nano industry can only develop dynamically if these legitimate fears are satisfactory allayed. This event was organized by the French Commissariat à l'Energie Atomique (CEA) in the frame of the Integrated European project NanoSafe2 funded by the European Commission under FP6 programs. NanoSafe2008 had broad international participation from 25 countries representing the 5 continents, with registered delegates numbering over 250. The scientific program involved the presentation and discussion of 112 papers, classified as 8 plenary lectures, 65 oral and 39 posters. The conference attracted many of the best known leading scientists and specialists in almost all the different fields of expertise covering nanosafety issues: Exposure, Characterisation, Detection, Monitoring, Life cycle, Toxicology, Personal protection, Secure industrial production, Safety parameter evaluation, Standardization, Regulation and Education. In parallel with the conference an exhibition took place where 10 exhibitors presented the commercial equipment available today in relation to safety during the production or the use of nanomaterials. We believe that this conference, with the above topics, has provided a forum where the many matters of interest to the NanoSafety community have been debated. The success of the conference was such that attendees asked the

  5. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    PubMed

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  6. A biometric access personal optical storage device

    NASA Astrophysics Data System (ADS)

    Davies, David H.; Ray, Steve; Gurkowski, Mark; Lee, Lane

    2007-01-01

    A portable USB2.0 personal storage device that uses built-in encryption and allows data access through biometric scanning of a finger print is described. Biometric image derived templates are stored on the removable 32 mm write once (WO) media. The encrypted templates travel with the disc and allow access to the data providing the biometric feature (e.g. the finger itself) is present. The device also allows for export and import of the templates under secure key exchange protocols. The storage system is built around the small form factor optical engine that uses a tilt arm rotary actuator and front surface media.

  7. Security Protection on Trust Delegated Data in Public Mobile Networks

    NASA Astrophysics Data System (ADS)

    Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.

  8. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    ERIC Educational Resources Information Center

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  9. Cryptography in the Bounded-Quantum-Storage Model

    NASA Astrophysics Data System (ADS)

    Schaffner, Christian

    2007-09-01

    This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.

  10. Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven

    DTIC Science & Technology

    2011-06-03

    havens—such as activities funded through State’s Peacekeeping Operations and State-funded DHS training to combat money laundering and bulk cash...Management, Committee on Homeland Security House of Representatives COMBATING TERRORISM U.S. Government Strategies and Efforts to Deny Terrorists... Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  11. Electronic signatures for long-lasting storage purposes in electronic archives.

    PubMed

    Pharow, Peter; Blobel, Bernd

    2005-03-01

    Communication and co-operation in healthcare and welfare require a certain set of trusted third party (TTP) services describing both status and relation of communicating principals as well as their corresponding keys and attributes. Additional TTP services are needed to provide trustworthy information about dynamic issues of communication and co-operation such as time and location of processes, workflow relations, and system behaviour. Legal and ethical requirements demand securely stored patient information and well-defined access rights. Among others, electronic signatures based on asymmetric cryptography are important means for securing the integrity of a message or file as well as for accountability purposes including non-repudiation of both origin and receipt. Electronic signatures along with certified time stamps or time signatures are especially important for electronic archives in general, electronic health records (EHR) in particular, and especially for typical purposes of long-lasting storage. Apart from technical storage problems (e.g. lifetime of the storage devices, interoperability of retrieval and presentation software), this paper identifies mechanisms of e.g. re-signing and re-stamping of data items, files, messages, sets of archived items or documents, archive structures, and even whole archives.

  12. Diagnosing water security in the rural North with an environmental security framework.

    PubMed

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage

    PubMed Central

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703

  14. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    PubMed

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  15. Caprock Breach: A Threat to Secure Geologic Sequestration

    NASA Astrophysics Data System (ADS)

    Selvadurai, A. P.; Dong, W.

    2013-12-01

    The integrity of caprock in providing a reliable barrier is crucial to several environmental geosciences endeavours related to geologic sequestration of CO2, deep geologic disposal of hazardous wastes and contaminants. The integrity of geologic barriers can be compromised by several factors. The re-activation of dormant fractures and development of new fractures in the caprock during the injection process are regarded as effects that can pose a threat to storage security. Other poromechanical influences of pore structure collapse due to chemically induced erosion of the porous fabric resulting in worm-hole type features can also contribute to compromising storage security. The assessment of the rate of steady or transient seepage through defects in the caprock can allow geoscientists to make prudent evaluations of the effectiveness of a sequestration strategy. While complicated computational simulations can be used to calculate leakage through defects, it is useful to explore alternative analytical results that could be used in providing preliminary estimates of leakage rates through defects in the caprock in a storage setting. The relevance of such developments is underscored by the fact that the permeability characteristics of the storage formation, the fracture and the surficial rocks overlying the caprock can rarely be quantified with certainty. This paper presents the problem of a crack in a caprock that connects to a storage formation and an overburden rock or surficial soil formation. The geologic media are maintained at constant far-field flow potentials and leakage takes place at either steady or transient conditions. The paper develops an analytical result that can be used to estimate the steady seepage through the crack. The analytical result can also be used to estimate the leakage through hydraulically non-intersecting cracks and leakage from caprock-well casing interfaces. The analytical result is used to estimate the accuracy of a computational

  16. Positively Fire Safe. Third Grade. Fire Safety for Texans: Fire and Burn Prevention Curriculum Guide.

    ERIC Educational Resources Information Center

    Texas State Commission on Fire Protection, Austin.

    This booklet comprises the third grade component of a series of curriculum guides on fire and burn prevention. Designed to meet the age-specific needs of third grade students, its objectives include: (1) acquiring basic knowledge of hazards and safe storage of flammable liquids; and (2) developing positive actions to prevent fires and burns or to…

  17. Adoption of the B2SAFE EUDAT replication service by the EPOS community

    NASA Astrophysics Data System (ADS)

    Cacciari, Claudio; Fares, Massimo; Fiameni, Giuseppe; Michelini, Alberto; Danecek, Peter; Wittenburg, Peter

    2014-05-01

    B2SAFE is the EUDAT service for moving and replicating data between sites and storage systems for different purposes. The goal of B2SAFE is to keep the data from a repository safe by replicating it across different geographical and administrative zones according to a set of well-defined policies. It is also a way to store large volumes of data permanently at those sites which are providing powerful on-demand data analysis facilities. In particular, B2SAFE operates on the domain of registered data where data objects are referable via persistent identifiers (PIDs). B2SAFE is more than just copying data because the PIDs must be carefully managed when data objects are moved or replicated. The EUDAT B2SAFE Service offers functionality to replicate datasets across different data centres in a safe and efficient way while maintaining all information required to easily find and query information about the replica locations. The information about the replica locations and other important information is stored in PID records, each managed in separate administrative domains. The B2SAFE Service is implemented as an iRODS module providing a set of iRODS rules or policies to interface with the EPIC handle API and uses the iRODS middleware to replicate datasets from a source data (or community) centre to a destination data centre. The definition of the dataset(s) to replicate is flexible and up to the communities using the B2SAFE service. While the B2SAFE is internally using the EPIC handle API, communities have the choice to use any PID system they prefer to assign PIDs to their digital objects. A reference to one or more EUDAT B2SAFE PIDs is returned by the B2SAFE service when a dataset is replicated. The presentation will introduce the problem space of B2SAFE, presents the achievements that have been made during the last year for enabling communities to make use of the B2SAFE service, demonstrates a EPOS use cases, outlines the commonalities and differences between the policies

  18. GAS STORAGE TECHNOLGOY CONSORTIUM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert W. Watson

    2004-04-23

    Gas storage is a critical element in the natural gas industry. Producers, transmission and distribution companies, marketers, and end users all benefit directly from the load balancing function of storage. The unbundling process has fundamentally changed the way storage is used and valued. As an unbundled service, the value of storage is being recovered at rates that reflect its value. Moreover, the marketplace has differentiated between various types of storage services, and has increasingly rewarded flexibility, safety, and reliability. The size of the natural gas market has increased and is projected to continue to increase towards 30 trillion cubic feetmore » (TCF) over the next 10 to 15 years. Much of this increase is projected to come from electric generation, particularly peaking units. Gas storage, particularly the flexible services that are most suited to electric loads, is critical in meeting the needs of these new markets. In order to address the gas storage needs of the natural gas industry, an industry-driven consortium was created--the Gas Storage Technology Consortium (GSTC). The objective of the GSTC is to provide a means to accomplish industry-driven research and development designed to enhance operational flexibility and deliverability of the Nation's gas storage system, and provide a cost effective, safe, and reliable supply of natural gas to meet domestic demand. To accomplish this objective, the project is divided into three phases that are managed and directed by the GSTC Coordinator. Base funding for the consortium is provided by the U.S. Department of Energy (DOE). In addition, funding is anticipated from the Gas Technology Institute (GTI). The first phase, Phase 1A, was initiated on September 30, 2003, and is scheduled for completion on March 31, 2004. Phase 1A of the project includes the creation of the GSTC structure, development of constitution (by-laws) for the consortium, and development and refinement of a technical approach (work

  19. GAS STORAGE TECHNOLOGY CONSORTIUM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert W. Watson

    2004-04-17

    Gas storage is a critical element in the natural gas industry. Producers, transmission and distribution companies, marketers, and end users all benefit directly from the load balancing function of storage. The unbundling process has fundamentally changed the way storage is used and valued. As an unbundled service, the value of storage is being recovered at rates that reflect its value. Moreover, the marketplace has differentiated between various types of storage services, and has increasingly rewarded flexibility, safety, and reliability. The size of the natural gas market has increased and is projected to continue to increase towards 30 trillion cubic feetmore » (TCF) over the next 10 to 15 years. Much of this increase is projected to come from electric generation, particularly peaking units. Gas storage, particularly the flexible services that are most suited to electric loads, is critical in meeting the needs of these new markets. In order to address the gas storage needs of the natural gas industry, an industry-driven consortium was created--the Gas Storage Technology Consortium (GSTC). The objective of the GSTC is to provide a means to accomplish industry-driven research and development designed to enhance operational flexibility and deliverability of the Nation's gas storage system, and provide a cost effective, safe, and reliable supply of natural gas to meet domestic demand. To accomplish this objective, the project is divided into three phases that are managed and directed by the GSTC Coordinator. Base funding for the consortium is provided by the U.S. Department of Energy (DOE). In addition, funding is anticipated from the Gas Technology Institute (GTI). The first phase, Phase 1A, was initiated on September 30, 2003, and is scheduled for completion on March 31, 2004. Phase 1A of the project includes the creation of the GSTC structure, development of constitution (by-laws) for the consortium, and development and refinement of a technical approach (work

  20. Port Security in the Persian Gulf

    DTIC Science & Technology

    2008-06-01

    drafters of ISPS for secure, standardized documents to be issued to the world’s merchant seamen, another arm of the UN, the International Labour ...Revised), 2003," International Labour Organization, http://www.ilo.org/ilolex/cgi-lex/convde.pl?C185 (accessed March 11, 2008). 5 The convention has...identity documents for a particularly impoverished portion of their workforce . 2. MTSA (2002) and SAFE-Port (2006) The two primary pieces of

  1. Long-term storage and safe retrieval of human papillomavirus DNA using FTA elute cards.

    PubMed

    Barth, Heidi; Morel, Adrien; Mougin, Christiane; Averous, Gerlinde; Legrain, Michèle; Fender, Muriel; Risch, Simone; Fafi-Kremer, Samira; Velten, Michel; Oudet, Pierre; Baldauf, Jean-Jacques; Stoll-Keller, Françoise

    2016-03-01

    Biobanking or collection and storage of specimens for future research purposes have become an essential tool in many fields of biomedical research and aims to provide a better understanding of disease mechanisms as well as the identification of disease-specific biomarkers that can navigate in complex diseases. In this study, we assessed the use of Flinders Technology Associates (FTA) cards as a long-term storage device for cervical specimens with suspected human papillomavirus (HPV) infections. HPV detection and genotyping results in liquid-based transport media were compared to HPV results from FTA cards. The overall agreement for the presence of any HPV infection between liquid-based medium and FTA cards stored for 1 year at ambient temperature was 100%. Reproducibility analysis of HPV detection and genotyping from FTA cards demonstrated that FTA cards are a reliable medium to store and preserve viral nucleic acids. Biobanking of cervical cells on FTA cards may provide a key resource for epidemiological and retrospective HPV studies. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. Energy Management and Optimization Methods for Grid Energy Storage Systems

    DOE PAGES

    Byrne, Raymond H.; Nguyen, Tu A.; Copp, David A.; ...

    2017-08-24

    Today, the stability of the electric power grid is maintained through real time balancing of generation and demand. Grid scale energy storage systems are increasingly being deployed to provide grid operators the flexibility needed to maintain this balance. Energy storage also imparts resiliency and robustness to the grid infrastructure. Over the last few years, there has been a significant increase in the deployment of large scale energy storage systems. This growth has been driven by improvements in the cost and performance of energy storage technologies and the need to accommodate distributed generation, as well as incentives and government mandates. Energymore » management systems (EMSs) and optimization methods are required to effectively and safely utilize energy storage as a flexible grid asset that can provide multiple grid services. The EMS needs to be able to accommodate a variety of use cases and regulatory environments. In this paper, we provide a brief history of grid-scale energy storage, an overview of EMS architectures, and a summary of the leading applications for storage. These serve as a foundation for a discussion of EMS optimization methods and design.« less

  3. Energy Management and Optimization Methods for Grid Energy Storage Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Byrne, Raymond H.; Nguyen, Tu A.; Copp, David A.

    Today, the stability of the electric power grid is maintained through real time balancing of generation and demand. Grid scale energy storage systems are increasingly being deployed to provide grid operators the flexibility needed to maintain this balance. Energy storage also imparts resiliency and robustness to the grid infrastructure. Over the last few years, there has been a significant increase in the deployment of large scale energy storage systems. This growth has been driven by improvements in the cost and performance of energy storage technologies and the need to accommodate distributed generation, as well as incentives and government mandates. Energymore » management systems (EMSs) and optimization methods are required to effectively and safely utilize energy storage as a flexible grid asset that can provide multiple grid services. The EMS needs to be able to accommodate a variety of use cases and regulatory environments. In this paper, we provide a brief history of grid-scale energy storage, an overview of EMS architectures, and a summary of the leading applications for storage. These serve as a foundation for a discussion of EMS optimization methods and design.« less

  4. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  5. DIRAC distributed secure framework

    NASA Astrophysics Data System (ADS)

    Casajus, A.; Graciani, R.; LHCb DIRAC Team

    2010-04-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  6. Secure Nearest Neighbor Query on Crowd-Sensing Data

    PubMed Central

    Cheng, Ke; Wang, Liangmin; Zhong, Hong

    2016-01-01

    Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU) situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes. PMID:27669253

  7. Secure Nearest Neighbor Query on Crowd-Sensing Data.

    PubMed

    Cheng, Ke; Wang, Liangmin; Zhong, Hong

    2016-09-22

    Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU) situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes.

  8. [Development of operation patient security detection system].

    PubMed

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  9. A privacy-preserving solution for compressed storage and selective retrieval of genomic data

    PubMed Central

    Huang, Zhicong; Ayday, Erman; Lin, Huang; Aiyar, Raeka S.; Molyneaux, Adam; Xu, Zhenyu; Hubaux, Jean-Pierre

    2016-01-01

    In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients’ complete aligned genomic data in addition to variant calls relative to a reference sequence. Due to the large size of human genome sequence data files (varying from 30 GB to 200 GB depending on coverage), two major challenges facing genomics laboratories are the costs of storage and the efficiency of the initial data processing. In addition, privacy of genomic data is becoming an increasingly serious concern, yet no standard data storage solutions exist that enable compression, encryption, and selective retrieval. Here we present a privacy-preserving solution named SECRAM (Selective retrieval on Encrypted and Compressed Reference-oriented Alignment Map) for the secure storage of compressed aligned genomic data. Our solution enables selective retrieval of encrypted data and improves the efficiency of downstream analysis (e.g., variant calling). Compared with BAM, the de facto standard for storing aligned genomic data, SECRAM uses 18% less storage. Compared with CRAM, one of the most compressed nonencrypted formats (using 34% less storage than BAM), SECRAM maintains efficient compression and downstream data processing, while allowing for unprecedented levels of security in genomic data storage. Compared with previous work, the distinguishing features of SECRAM are that (1) it is position-based instead of read-based, and (2) it allows random querying of a subregion from a BAM-like file in an encrypted form. Our method thus offers a space-saving, privacy-preserving, and effective solution for the storage of clinical genomic data. PMID:27789525

  10. [Safe school].

    PubMed

    Liberal, Edson Ferreira; Aires, Roberto Tschoepke; Aires, Mariana Tschoepke; Osório, Ana Carla de Albuquerque

    2005-11-01

    To review the strategies to make school a safe environment. The paper first addresses the social context of accidents and violence in the school environment, and makes recommendations, based on the literature data, for the implementation of safe schools. Articles published between 1993 and 2005 in the MEDLINE database. Brazilian epidemiological and literature data have also been searched. There is growing evidence that intervention has multiple components, focusing on health education practices, with the participation of the whole community. The aim of those interventions is to help students and community members to adopt healthy and safe behaviors. Schools are taking on an increasing role in health promotion, disease prevention, and injury prevention. In the context of prevention of external causes of morbidity and mortality, it is important to recognize a risky environment, places, and risk behaviors as favorable to injury and violence, as well as the concept of accident as something one can avoid. Implementation of safe schools represents a promising new direction for school-based preventive work. It is important to note that a safe school should intervene not only in its physical structure, but it should also make it as safe as possible by gathering the school community through health education, and mainly encouraging healthy behavior.

  11. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... resources more efficiently, build on one another's expertise, drive innovation, engage in collective action... utilizing diverse perspectives, skills, tools, and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring that to keep our Nation safe ``we must tap the ingenuity outside...

  12. Transmission and storage of medical images with patient information.

    PubMed

    Acharya U, Rajendra; Subbanna Bhat, P; Kumar, Sathish; Min, Lim Choo

    2003-07-01

    Digital watermarking is a technique of hiding specific identification data for copyright authentication. This technique is adapted here for interleaving patient information with medical images, to reduce storage and transmission overheads. The text data is encrypted before interleaving with images to ensure greater security. The graphical signals are interleaved with the image. Two types of error control-coding techniques are proposed to enhance reliability of transmission and storage of medical images interleaved with patient information. Transmission and storage scenarios are simulated with and without error control coding and a qualitative as well as quantitative interpretation of the reliability enhancement resulting from the use of various commonly used error control codes such as repetitive, and (7,4) Hamming code is provided.

  13. Efficient Cryptography for the Next Generation Secure Cloud

    ERIC Educational Resources Information Center

    Kupcu, Alptekin

    2010-01-01

    Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…

  14. Sentinel 2 MMFU: The first European Mass Memory System Based on NAND-Flash Storage Technology

    NASA Astrophysics Data System (ADS)

    Staehle, M.; Cassel, M.; Lonsdorfer, U.; Gliem, F.; Walter, D.; Fichna, T.

    2011-08-01

    Sentinel-2 is the multispectral optical mission of the EU-ESA GMES (Global Monitoring for Environment and Security) program, currently under development by Astrium-GmbH in Friedrichshafen (Germany) for a launch in 2013. The mission features a 490 Mbit/s optical sensor operating at high duty cycles, requiring in turn a large 2.4 Tbit on-board storage capacity.The required storage capacity motivated the selection of the NAND-Flash technology which was already secured by a lengthy period (2004-2009) of detailed testing, analysis and qualification by Astrium GmbH, IDA and ESTEC. The mass memory system is currently being realized by Astrium GmbH.

  15. Polyaniline as a material for hydrogen storage applications.

    PubMed

    Attia, Nour F; Geckeler, Kurt E

    2013-07-12

    The main challenge of commercialization of the hydrogen economy is the lack of convenient and safe hydrogen storage materials, which can adsorb and release a significant amount of hydrogen at ambient conditions. Finding and designing suitable cost-effective materials are vital requirements to overcome the drawbacks of investigated materials. Because of its outstanding electronic, thermal, and chemical properties, the electrically conducting polyaniline (PANI) has a high potential in hydrogen storage applications. In this review, the progress in the use of different structures of conducting PANI, its nanocomposites as well as activated porous materials based on PANI as hydrogen storage materials is presented and discussed. The effect of the unique electronic properties based on the π-electron system in the backbone of these materials in view of the hydrogen uptake and the relevant mechanisms are highlighted. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. Secure and robust cloud computing for high-throughput forensic microsatellite sequence analysis and databasing.

    PubMed

    Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A

    2017-11-01

    Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs

    PubMed Central

    Liu, Anfeng; Liu, Xiao; Long, Jun

    2016-01-01

    Security is a pivotal issue for wireless sensor networks (WSNs), which are emerging as a promising platform that enables a wide range of military, scientific, industrial and commercial applications. Traceback, a key cyber-forensics technology, can play an important role in tracing and locating a malicious source to guarantee cybersecurity. In this work a trust-based adaptive probability marking and storage (TAPMS) traceback scheme is proposed to enhance security for WSNs. In a TAPMS scheme, the marking probability is adaptively adjusted according to the security requirements of the network and can substantially reduce the number of marking tuples and improve network lifetime. More importantly, a high trust node is selected to store marking tuples, which can avoid the problem of marking information being lost. Experimental results show that the total number of marking tuples can be reduced in a TAPMS scheme, thus improving network lifetime. At the same time, since the marking tuples are stored in high trust nodes, storage reliability can be guaranteed, and the traceback time can be reduced by more than 80%. PMID:27043566

  18. The Naval Postgraduate School SECURE ARCHIVAL STORAGE SYSTEM. Part II. Segment and Process Management Implementation.

    DTIC Science & Technology

    1981-03-01

    Research Instructor of Computer Scienr-. Reviewed by: Released by: WILLIAM M. TOLLES Department puter Science Dean of Research 4c t SECURITY...Lyle A. Cox, Roger R. Schell, and Sonja L. Perdue 9. PERFORMING ORGANIZATION NAME ANO ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT... Computer Networks, Operating Systems, Computer Security 20. AftUrCT (Cnthm, w v re eae old* It n..*p and idm 0 F W blk ..m.m.o’) ",A_;he security

  19. 10 CFR 51.23 - Temporary storage of spent fuel after cessation of reactor operation-generic determination of no...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Temporary storage of spent fuel after cessation of reactor... Procedures § 51.23 Temporary storage of spent fuel after cessation of reactor operation—generic determination... necessary, spent fuel generated in any reactor can be stored safely and without significant environmental...

  20. 10 CFR 51.23 - Temporary storage of spent fuel after cessation of reactor operation-generic determination of no...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Temporary storage of spent fuel after cessation of reactor... Procedures § 51.23 Temporary storage of spent fuel after cessation of reactor operation—generic determination... necessary, spent fuel generated in any reactor can be stored safely and without significant environmental...

  1. Investigation of safe-life fail-safe criteria for the space shuttle

    NASA Technical Reports Server (NTRS)

    1972-01-01

    An investigation was made to determine the effects of a safe-life design approach and a fail-safe design approach on the space shuttle booster vehicle structure, and to recommend any changes to the structural design criteria. Two configurations of the booster vehicle were considered, one incorporating a delta wing (B-9U configuration) and the other a swept wing (B-16B configuration). Several major structural components of the booster were studied to determine the fatigue life, safe-life, and fail-safe capabilities of the baseline design. Each component was investigated to determine the practicability of applying a safe-life or fail-safe design philosophy, the changes such design approaches might require, and the impact of these changes on weight, cost, development plans, and performance.

  2. Security and Privacy in a DACS.

    PubMed

    Delgado, Jaime; Llorente, Silvia; Pàmies, Martí; Vilalta, Josep

    2016-01-01

    The management of electronic health records (EHR), in general, and clinical documents, in particular, is becoming a key issue in the daily work of Healthcare Organizations (HO). The need for providing secure and private access to, and storage for, clinical documents together with the need for HO to interoperate, raises a number of issues difficult to solve. Many systems are in place to manage EHR and documents. Some of these Healthcare Information Systems (HIS) follow standards in their document structure and communications protocols, but many do not. In fact, they are mostly proprietary and do not interoperate. Our proposal to solve the current situation is the use of a DACS (Document Archiving and Communication System) for providing security, privacy and standardized access to clinical documents.

  3. Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos

    NASA Astrophysics Data System (ADS)

    Long, Min; Li, You; Peng, Fei

    Aiming to strike for a balance between the security, efficiency and availability of the data verification in cloud storage, a novel integrity verification scheme based on spatiotemporal chaos is proposed for multiple data copies. Spatiotemporal chaos is implemented for node calculation of the binary tree, and the location of the data in the cloud is verified. Meanwhile, dynamic operation can be made to the data. Furthermore, blind information is used to prevent a third-party auditor (TPA) leakage of the users’ data privacy in a public auditing process. Performance analysis and discussion indicate that it is secure and efficient, and it supports dynamic operation and the integrity verification of multiple copies of data. It has a great potential to be implemented in cloud storage services.

  4. Safe School Design: A Handbook for Educational Leaders Applying the Principles of Crime Prevention through Environmental Design.

    ERIC Educational Resources Information Center

    Schneider, Tod; Walker, Hill; Sprague, Jeffrey

    This document seeks to synthesize, integrate, and make available to school personnel solid information regarding Crime Prevention through Environmental Design (CPTED). Chapter 1, "The Changed Landscape of School Safety and Security," examines characteristics of safe and unsafe schools, causes of vulnerability, and the role of design and technology…

  5. Organising a safe space for navigating social-ecological transformations to sustainability.

    PubMed

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-05-28

    The need for developing socially just living conditions for the world's growing population whilst keeping human societies within a 'safe operating space' has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a 'safe space' to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  6. Research on crude oil storage and transportation based on optimization algorithm

    NASA Astrophysics Data System (ADS)

    Yuan, Xuhua

    2018-04-01

    At present, the optimization theory and method have been widely used in the optimization scheduling and optimal operation scheme of complex production systems. Based on C++Builder 6 program development platform, the theoretical research results are implemented by computer. The simulation and intelligent decision system of crude oil storage and transportation inventory scheduling are designed. The system includes modules of project management, data management, graphics processing, simulation of oil depot operation scheme. It can realize the optimization of the scheduling scheme of crude oil storage and transportation system. A multi-point temperature measuring system for monitoring the temperature field of floating roof oil storage tank is developed. The results show that by optimizing operating parameters such as tank operating mode and temperature, the total transportation scheduling costs of the storage and transportation system can be reduced by 9.1%. Therefore, this method can realize safe and stable operation of crude oil storage and transportation system.

  7. OverView of Space Applications for Environment (SAFE) initiative

    NASA Astrophysics Data System (ADS)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  8. Motivation and Design of the Sirocco Storage System Version 1.0.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Curry, Matthew Leon; Ward, H. Lee; Danielson, Geoffrey Charles

    Sirocco is a massively parallel, high performance storage system for the exascale era. It emphasizes client-to-client coordination, low server-side coupling, and free data movement to improve resilience and performance. Its architecture is inspired by peer-to-peer and victim- cache architectures. By leveraging these ideas, Sirocco natively supports several media types, including RAM, flash, disk, and archival storage, with automatic migration between levels. Sirocco also includes storage interfaces and support that are more advanced than typical block storage. Sirocco enables clients to efficiently use key-value storage or block-based storage with the same interface. It also provides several levels of transactional data updatesmore » within a single storage command, including full ACID-compliant updates. This transaction support extends to updating several objects within a single transaction. Further support is provided for con- currency control, enabling greater performance for workloads while providing safe concurrent modification. By pioneering these and other technologies and techniques in the storage system, Sirocco is poised to fulfill a need for a massively scalable, write-optimized storage system for exascale systems. This is version 1.0 of a document reflecting the current and planned state of Sirocco. Further versions of this document will be accessible at http://www.cs.sandia.gov/Scalable_IO/ sirocco .« less

  9. Safe and secure. How to create an effective OSHA compliance program in your practice.

    PubMed

    Anderson, Douglas G

    2007-08-01

    Medical group practice administrators have a responsibility to provide a safe working environment for their employees and patients. You must create an effective Occupational Safety and Health Administration (OSHA) compliance program in your organization. The complexity and diversity of OSHA standards are significant, and developing an effective program requires more than a cut-and-paste approach. This article describes the scope of the task, the steps to take and tools you can use.

  10. Methods to assess geological CO2 storage capacity: Status and best practice

    USGS Publications Warehouse

    Heidug, Wolf; Brennan, Sean T.; Holloway, Sam; Warwick, Peter D.; McCoy, Sean; Yoshimura, Tsukasa

    2013-01-01

    To understand the emission reduction potential of carbon capture and storage (CCS), decision makers need to understand the amount of CO2 that can be safely stored in the subsurface and the geographical distribution of storage resources. Estimates of storage resources need to be made using reliable and consistent methods. Previous estimates of CO2 storage potential for a range of countries and regions have been based on a variety of methodologies resulting in a correspondingly wide range of estimates. Consequently, there has been uncertainty about which of the methodologies were most appropriate in given settings, and whether the estimates produced by these methods were useful to policy makers trying to determine the appropriate role of CCS. In 2011, the IEA convened two workshops which brought together experts for six national surveys organisations to review CO2 storage assessment methodologies and make recommendations on how to harmonise CO2 storage estimates worldwide. This report presents the findings of these workshops and an internationally shared guideline for quantifying CO2 storage resources.

  11. SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING

    PubMed Central

    Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.

    2013-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  12. Safe Zones: Creating LGBT Safe Space Ally Programs

    ERIC Educational Resources Information Center

    Poynter, Kerry John; Tubbs, Nancy Jean

    2008-01-01

    This article discusses model LGBT Safe Space Ally programs. These programs, often called "Safe Zones," include self selected students, faculty, and employees who publicly show support by displaying stickers, signs, and other identifiable items. Issues covered in the article include history, development, training, membership, assessment, and…

  13. High-Capacity Hydrogen-Based Green-Energy Storage Solutions For The Grid Balancing

    NASA Astrophysics Data System (ADS)

    D'Errico, F.; Screnci, A.

    One of the current main challenges in green-power storage and smart grids is the lack of effective solutions for accommodating the unbalance between renewable energy sources, that offer intermittent electricity supply, and a variable electricity demand. Energy management systems have to be foreseen for the near future, while they still represent a major challenge. Integrating intermittent renewable energy sources, by safe and cost-effective energy storage systems based on solid state hydrogen is today achievable thanks to recently some technology breakthroughs. Optimized solid storage method made of magnesium-based hydrides guarantees a very rapid absorption and desorption kinetics. Coupled with electrolyzer technology, high-capacity storage of green-hydrogen is therefore practicable. Besides these aspects, magnesium has been emerging as environmentally friend energy storage method to sustain integration, monitoring and control of large quantity of GWh from high capacity renewable generation in the EU.

  14. High-Capacity Hydrogen-Based Green-Energy Storage Solutions for the Grid Balancing

    NASA Astrophysics Data System (ADS)

    D'Errico, F.; Screnci, A.

    One of the current main challenges in green-power storage and smart grids is the lack of effective solutions for accommodating the unbalance between renewable energy sources, that offer intermittent electricity supply, and a variable electricity demand. Energy management systems have to be foreseen for the near future, while they still represent a major challenge. Integrating intermittent renewable energy sources, by safe and cost-effective energy storage systems based on solid state hydrogen is today achievable thanks to recently some technology breakthroughs. Optimized solid storage method made of magnesium-based hydrides guarantees a very rapid absorption and desorption kinetics. Coupled with electrolyzer technology, high-capacity storage of green-hydrogen is therefore practicable. Besides these aspects, magnesium has been emerging as environmentally friend energy storage method to sustain integration, monitoring and control of large quantity of GWh from high capacity renewable generation in the EU.

  15. Safe at Any Speed: Securing Your Wi-Fi Network Is Easier and More Important than You Might Think

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2007-01-01

    In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…

  16. 360 PORT MDA - A Strategy to Improve Port Security

    DTIC Science & Technology

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  17. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    ERIC Educational Resources Information Center

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  18. A privacy-preserving solution for compressed storage and selective retrieval of genomic data.

    PubMed

    Huang, Zhicong; Ayday, Erman; Lin, Huang; Aiyar, Raeka S; Molyneaux, Adam; Xu, Zhenyu; Fellay, Jacques; Steinmetz, Lars M; Hubaux, Jean-Pierre

    2016-12-01

    In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients' complete aligned genomic data in addition to variant calls relative to a reference sequence. Due to the large size of human genome sequence data files (varying from 30 GB to 200 GB depending on coverage), two major challenges facing genomics laboratories are the costs of storage and the efficiency of the initial data processing. In addition, privacy of genomic data is becoming an increasingly serious concern, yet no standard data storage solutions exist that enable compression, encryption, and selective retrieval. Here we present a privacy-preserving solution named SECRAM (Selective retrieval on Encrypted and Compressed Reference-oriented Alignment Map) for the secure storage of compressed aligned genomic data. Our solution enables selective retrieval of encrypted data and improves the efficiency of downstream analysis (e.g., variant calling). Compared with BAM, the de facto standard for storing aligned genomic data, SECRAM uses 18% less storage. Compared with CRAM, one of the most compressed nonencrypted formats (using 34% less storage than BAM), SECRAM maintains efficient compression and downstream data processing, while allowing for unprecedented levels of security in genomic data storage. Compared with previous work, the distinguishing features of SECRAM are that (1) it is position-based instead of read-based, and (2) it allows random querying of a subregion from a BAM-like file in an encrypted form. Our method thus offers a space-saving, privacy-preserving, and effective solution for the storage of clinical genomic data. © 2016 Huang et al.; Published by Cold Spring Harbor Laboratory Press.

  19. Instability risk analysis and risk assessment system establishment of underground storage caverns in bedded salt rock

    NASA Astrophysics Data System (ADS)

    Jing, Wenjun; Zhao, Yan

    2018-02-01

    Stability is an important part of geotechnical engineering research. The operating experiences of underground storage caverns in salt rock all around the world show that the stability of the caverns is the key problem of safe operation. Currently, the combination of theoretical analysis and numerical simulation are the mainly adopts method of reserve stability analysis. This paper introduces the concept of risk into the stability analysis of underground geotechnical structure, and studies the instability of underground storage cavern in salt rock from the perspective of risk analysis. Firstly, the definition and classification of cavern instability risk is proposed, and the damage mechanism is analyzed from the mechanical angle. Then the main stability evaluating indicators of cavern instability risk are proposed, and an evaluation method of cavern instability risk is put forward. Finally, the established cavern instability risk assessment system is applied to the analysis and prediction of cavern instability risk after 30 years of operation in a proposed storage cavern group in the Huai’an salt mine. This research can provide a useful theoretical base for the safe operation and management of underground storage caverns in salt rock.

  20. Storage of Unfed and Leftover Mothers' Own Milk.

    PubMed

    Fogleman, April D; Meng, Ting; Osborne, Jason; Perrin, Maryanne T; Jones, Frances; Allen, Jonathan C

    The objective was to examine the bacteriological and immunological properties of freshly expressed, previously frozen, and leftover mothers' own milk during storage. In the first of two pilot studies, 12 mother-infant dyads participated. The milk studied included freshly expressed unfed and freshly expressed leftover milk. Milk samples were stored at 24°C, 4°C, or -20°C. In the second pilot study, 11 mother-infant dyads participated. The milk studied included milk that had been previously frozen, including previously frozen leftover milk. Milk samples were stored at 24°C and 4°C. After storage in both studies, the milk was analyzed for bacteriological and immunological properties. Bacteriological and immunological characteristics of freshly expressed unfed and freshly expressed leftover milk and previously frozen unfed and previously frozen leftover milk remained stable during storage at 4°C for at least 6 days. The quality of all groups of mothers' milk declined when stored at 24°C for longer than 3 hours. While this study provides evidence that human milk might be safe at longer storage times, storage guidelines should not be revised until more research is performed. This study serves as a call to action for more research on the topic of human milk storage, specifically leftover human milk. The study provides information to inform future study designs on the topic of unpasteurized human milk storage. More research is needed regarding leftover human milk storage with a greater number of participants, determination of the quality of human milk, and the storage of human milk in a real-life setting.

  1. Firearm Ownership, Storage Practices, and Suicide Risk Factors in Washington State, 2013-2016.

    PubMed

    Morgan, Erin Renee; Gomez, Anthony; Rowhani-Rahbar, Ali

    2018-05-17

    To characterize firearm ownership and storage practices in Washington State and assess their relationship with suicide risk factors. Using Washington State Behavioral Risk Factor Surveillance System data for 2013 to 2016, we conducted survey-weighted multivariable Poisson regression models to obtain prevalence ratios (PRs) and confidence intervals (CIs). Of 34 884 adult respondents, 34.3% (95% CI = 33.7%, 35.0%) reported a firearm in their household, among whom 36.6% (95% CI = 35.4%, 37.7%) stored their firearm locked and unloaded. There were no differences in mental health indicators by firearm ownership or storage practice status. Binge and chronic alcohol use were somewhat more prevalent among adults from firearm-owning households (PR = 1.2; 95% CI = 1.1, 1.3; PR = 1.2; 95% CI = 1.1, 1.4, respectively) and among those living in households not practicing safe storage (PR = 1.4; 95% CI = 1.2, 1.7; PR = 1.9; 1.5, 2.3, respectively). Variability in mental health does not explain the substantial increased suicide risk among individuals in firearm-owning households. Greater prevalence of alcohol misuse among adults in firearm-owning households not practicing safe storage highlights the need for suicide prevention interventions. (Am J Public Health. Published online ahead of print May 17, 2018: e1-e7. doi:10.2105/AJPH.2018.304403).

  2. Subseabed storage of radioactive waste

    NASA Astrophysics Data System (ADS)

    Bell, Peter M.

    The subject of the storage of nuclear wastes products incites emotional responses from the public, and thus the U.S. Subseabed Disposal Program will have to make a good case for waste storage beneath the ocean floor. The facts attendant, however, describe circumstances necessitating cool-headed analysis to achieve a solution to the growing nuclear waste problem. Emotion aside, a good case indeed is being made for safe disposal beneath the ocean floor.The problems of nuclear waste storage are acute. A year ago, U.S. military weapons production had accumulated over seventy-five million gallons of high-level radioactive liquid waste; solid wastes, such as spent nuclear fuel rods from reactors, amounted to more than 12,000 tons. These wastes are corrosive and will release heat for 1000 years or more. The wastes will remain dangerously radioactive for a period of 10,000 years. There are advantages in storing the wastes on land, in special underground repositories, or on the surface. These include the accessibility to monitor the waste and the possibility of taking action should a container rupture occur, and thus the major efforts to determine suitable disposal at this time are focused on land-based storage. New efforts, not to be confused with ocean dumping practices of the past, are demonstrating that waste containers isolated in the clays and sediments of the ocean floor may be superior (Environ. Sci. Tech., 16, 28A-37A 1982).

  3. Household safe water management in Kisii County, Kenya.

    PubMed

    Misati, A G

    2016-11-01

    Contaminated drinking water can lead to the risk of intestinal and other infectious diseases that lead to high morbidity. Therefore, determining household safe water management practices will benefit billions of people by ensuring there is no recontamination. A cross-sectional study design was used and a sample of 346 households was selected through systematic random sampling. A questionnaire was then used which was based on the core questions on drinking water and sanitation for household surveys and descriptive analyses were performed for the collected data using SPSS. Springs were predominantly used as the main source of water (97 %). Approximately, over half (58 %) of the sampled households never treated their drinking water to ensure that it was safe for drinking. Mostly (56 %), the households used jerricans for the storage of water with a majority of the households (95 %) covering their containers which were elevated from the reach of children in 52 % of the households. The risks included lack of water treatment, not covering the water container, risk of permitting dipping for those containers, lacking narrow neck and the risk of container being accessible to children. Basic treatment of the water at the household level by use of chemicals, filtration and boiling may have a great impact on the drinking water quality and health of the inhabitants of Kisii County. Also, creation of awareness on the possibilities of spring water being contaminated should be carried because of the assumption that spring water is safe and does not need to be treated.

  4. Polyurethane Foam Pack Outdoor Storage Test

    DTIC Science & Technology

    1987-10-01

    formed between the polyurthane foam and the plywood. No nails "re used to secure the top. It was impossible to tell If the pack was completely filled...Ulm. rILE: toury AD-A 187 729 - N T. ;I[ POLYURIET!AN FOAM PACK OUTDOOR STORAGE TEST I OCTOBU 1987 DTIC &%ELECTEi NOV 3 0197 * 1’• Thomas M...U.S. ARMY TANK-AUTOMOTIVE COMMANDRESEARCH, DEVELOPMENT & ENGINEERING CENTERWarren, Michigan 48397-5000 REPRODUCTION QUALITY NOTICE This document is the

  5. CE: Can Your Older Patients Drive Safely?

    PubMed

    Staplin, Loren; Lococo, Kathy H; Mastromatto, Tia; Sifrit, Kathy J; Trazzera, Kathleen M

    2017-09-01

    : In many areas of the world, driving is an essential part of life and for reasons of comfort, convenience, and security remains the primary mode of transportation among older adults. Both normal aging and diseases that are more prevalent in advanced age can substantially reduce older drivers' functional abilities, elevating their risk of involvement in motor vehicle accidents and serious injury or death. Identifying and intervening with older drivers at increased crash risk is an important aspect of preventive medicine. The authors discuss the specific driving risks adults face as they age and how nurses can raise older patients' awareness of these risks. They also discuss the importance of connecting older adults to community resources that may help them continue driving safely for a longer period or find alternative transportation options.

  6. Global Assessment of Groundwater Sustainability Based On Storage Anomalies

    NASA Astrophysics Data System (ADS)

    Thomas, Brian F.; Caineta, Júlio; Nanteza, Jamiat

    2017-11-01

    The world's largest aquifers are a fundamental source of freshwater used for agricultural irrigation and to meet human water needs. Therefore, their stored volume of groundwater is linked with water security, which becomes more relevant during periods of drought. This work focuses on understanding large-scale groundwater changes, where we introduce an approach to evaluate groundwater sustainability at a global scale. We employ a groundwater drought index to assess performance metrics (reliability, resilience, vulnerability, and a combined sustainability index) for the largest and most productive global aquifers. Spatiotemporal changes in total water storage are derived from remote sensing observations of gravity anomalies, from which the groundwater drought index is inferred. The results reveal a complex relationship between the indicators, while considering monthly variability in groundwater storage. Combining the drought and sustainability indexes, as presented in this work, constitutes a measure for quantifying groundwater sustainability. This framework integrates changes in groundwater resources due to human influences and climate changes, thus opening a path to assess progress toward sustainable use and water security.

  7. Radiotoxicity and decay heat power of spent nuclear fuel of VVER type reactors at long-term storage.

    PubMed

    Bergelson, B R; Gerasimov, A S; Tikhomirov, G V

    2005-01-01

    Radiotoxicity and decay heat power of the spent nuclear fuel of VVER-1000 type reactors are calculated during storage time up to 300,000 y. Decay heat power of radioactive waste (radwaste) determines parameters of the heat removal system for the safe storage of spent nuclear fuel. Radiotoxicity determines the radiological hazard of radwaste after its leakage and penetration into the environment.

  8. On-site low level radwaste storage facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knauss, C.H.; Gardner, D.A.

    1993-12-31

    This paper will explore several storage and processing technologies that are available for the safe storage of low-level waste, their advantages and their limitations such that potential users may be able to determine which technology may be most appropriate for their particular application. Also, a brief discussion will be included on available types of shipping and disposal containers and waste forms for use in those containers when ready for ultimate disposal. For the purposes of this paper, the waste streams considered will be restricted to nuclear power plant wastes. Wastes that will be discussed are powdered and bead resins formore » cooling and reactor water clean-up, filter cartridges, solidified waste oils, and Dry Active Wastes (DAW), which consist of contaminated clothing, tools, respirator filters, etc. On-site storage methods that will be analyzed include a storage facility constructed of individual temporary shielded waste containers on a hard surface; an on-site, self contained low level radwaste facility for resins and filters; and an on-site storage and volume reduction facility for resins and filters; and an on-site DAW. Simple, warehouse-type buildings and pre-engineered metal buildings will be discussed only to a limited degree since dose rate projections can be high due to their lack of adequate shielding for radiation protection. Waste processing alternatives that will be analyzed for resins include dewatering, solidifying in Portland cement, solidifying in bituminous material, and solidifying in a vinyl ester styrene matrix. The storage methods describes will be analyzed for their ability to shield the populace from the effects of direct transmission and skyshine radiation when storing the above mentioned materials, which have been properly processed for storage and have been placed in suitable storage containers.« less

  9. Reducing Postharvest Losses during Storage of Grain Crops to Strengthen Food Security in Developing Countries.

    PubMed

    Kumar, Deepak; Kalita, Prasanta

    2017-01-15

    While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers' livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%-60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%-2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail.

  10. Reducing Postharvest Losses during Storage of Grain Crops to Strengthen Food Security in Developing Countries

    PubMed Central

    Kumar, Deepak; Kalita, Prasanta

    2017-01-01

    While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers’ livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%–60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%–2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail. PMID:28231087

  11. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  12. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  13. Maximum Security. The Culture of Violence in Inner-City Schools.

    ERIC Educational Resources Information Center

    Devine, John

    In an ethnographic reflection on 10 years experience working in the high schools of inner-city New York, issues of school safety, discipline, and violence are explored. The central proposition is that the mentality that relies on paramilitary security measures and technological devices, such as metal detectors, to achieve safe schools is only an…

  14. 75 FR 36449 - Yankee Atomic Electric Co.; Yankee Atomic Independent Spent Fuel Storage Installation; Issuance...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-25

    ... Specification (TS) Surveillance Requirement 3.1.6.1 to verify the operability of the concrete cask heat removal....6.1 to verify the operability of the concrete cask heat removal system to maintain safe storage...

  15. SUNRAYCE 1993: Working safely with lead-acid batteries and photovoltaic power systems

    NASA Astrophysics Data System (ADS)

    Dephillips, M. P.; Moskowitz, P. D.; Fthenakis, V. M.

    1992-11-01

    The US Department of Energy (DOE) is sponsoring SUNRAYCE 93 to advance tile technology and use of photovoltaics and electric vehicles. Participants will use cars powered by photovoltaic modules and lead-acid storage batteries. This brochure, prepared for students and faculty participating in this race, outlines the health hazards presented by these electrical systems and gives guidance on strategies for their safe usage. At the outset, it should be noted that working with photovoltaic systems and batteries requires electric vehicle drivers and technicians to have 'hands-on' contact with the car on a daily basis. It is important that no one work near a photovoltaic energy system or battery, either in a vehicle or on the bench, unless they familiarize themselves with the components in use and know and observe safe work practices including the safety precautions described in the manuals provided by the various equipment vendors and this document.

  16. Safe Schools, Safe Communities.

    ERIC Educational Resources Information Center

    Lewis, Julie E.; Pickett, Dean; Pulliam, Janet L.; Schwartz, Richard A.; St. Germaine, Anne-Marie; Underwood, Julie; Worona, Jay

    Schools must work together with agencies, groups, and individuals to eliminate the forces leading children to violence. Chapter 1, "School Safety: Working Together to Keep Schools Safe," stresses the importance of community collaboration in violence prevention. Effective prevention requires sharing information about students, consistent…

  17. Provably Secure Password-based Authentication in TLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less

  18. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    NASA Technical Reports Server (NTRS)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  19. Development of an Internet Security Policy for health care establishments.

    PubMed

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  20. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    PubMed Central

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-01-01

    The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation. PMID:26030471