[Secure e-mail between physicians--aspect of a telemedicine platform for the health care system].
Goetz, C F
2001-10-01
Ever since the Roland-Berger-Study in 1997, the concept of a "telematics platform" for health care describes the combination of all technical and organizational components and services for the online transmission of patient data. This platform works on an interoperable collection of standards for addressing, security and content-description. In this context the security for application and transport data is based on data protection as well as medical non-disclosure rules. The methods of cryptography can provide security services for data transmitted realizing addressed, direct and indirect privacy. The first German health professional card, the electronic physicians' ID, provides central tools for such applications. First functionally simple pilot projects will prove the effectiveness of chosen methods in this year, even if not all identified construction sites in health care telematics have yet been lead towards a finalized solution.
European health telematics networks for positron emission tomography
NASA Astrophysics Data System (ADS)
Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios
2006-12-01
A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.
[Telematics in the public health sector. Where is the protection of health data?].
Voßhoff, Andrea; Raum, Bertram; Ernestus, Walter
2015-10-01
There is a long history of telematics in the German health system. Apart from the growing technical possibilities in the field, it is important to concentrate on the protection of health data in telematics applications. Health data in the hands of service providers or other third parties entails certain risks for the patient's personality rights, because these institutions may not be bound by the practice of medical confidentiality. In addition, big data processing risks make the individual lives of patients and insured persons totally transparent. Measures to reduce these risks have to be taken by the providers as well as by the users of telematics infrastructure; they are the ones who should explicitly address the relevant risks and dangers in a data protection and IT-security concept and develop adequate strategies to cope with these dangers. Additionally, the German legislator remains obliged to create a regulatory framework for the protection of patients' rights.
[Telematics in the health system and data protection].
Müller, J H
2005-06-01
In the health system, telematics are to be used for the benefit of patients and to make it possible for them to receive better medical care. Telematics must be employed in accordance with the guidelines of data protection and this means in particular that the patient must remain the master of his data. Therefore, he must be able to decide in which situation and to whom he wants to reveal his medical data. For this reason, the exact implementation of the introduction of the electronic medical smart card envisaged by the law requires detailed access authorisations and limitations, which must be reinforced by ample technical security measures. These measures must be transmitted to the patients through co-operation of doctors and health insurance companies in such a transparent way that they recognise the advantages of the new technology. The higher the acceptance is on the patients' side, the more they will be willing to participate voluntarily in telematic projects.
Mixing console design for telematic applications in live performance and remote recording
NASA Astrophysics Data System (ADS)
Samson, David J.
The development of a telematic mixing console addresses audio engineers' need for a fully integrated system architecture that improves efficiency and control for applications such as distributed performance and remote recording. Current systems used in state of the art telematic performance rely on software-based interconnections with complex routing schemes that offer minimal flexibility or control over key parameters needed to achieve a professional workflow. The lack of hardware-based control in the current model limits the full potential of both the engineer and the system. The new architecture provides a full-featured platform that, alongside customary features, integrates (1) surround panning capability for motorized, binaural manikin heads, as well as all sources in the included auralization module, (2) self-labelling channel strips, responsive to change at all remote sites, (3) onboard roundtrip latency monitoring, (4) synchronized remote audio recording and monitoring, and (5) flexible routing. These features combined with robust parameter automation and precise analog control will raise the standard for telematic systems as well as advance the development of networked audio systems for both research and professional audio markets.
Application of decision rules for empowering of Indonesian telematics services SMEs
NASA Astrophysics Data System (ADS)
Tosida, E. T.; Hairlangga, O.; Amirudin, F.; Ridwanah, M.
2018-03-01
The independence of the field of telematics became one of Indonesia's vision in 2024. One effort to achieve it can be done by empowering SMEs in the field of telematics. Empowerment carried out need a practical mechanism by utilizing data centered, including through the National Economic Census database (Susenas). Based on the Susenas can be formulated the decision rules of determining the provision of assistance for SMEs in the field of telematics. The way it did by generating the rule base through the classification technique. The CART algorithm-based decision rule model performs better than C45 and ID3 models. The high level of performance model is also in line with the regulations applied by the government. This becomes one of the strengths of research, because the resulting model is consistent with the existing conditions in Indonesia. The rules base generated from the three classification techniques show different rules. The CART technique has pattern matching with the realization of activities in The Ministry of Cooperatives and SMEs. So far, the government has difficulty in referring data related to the empowerment of SMEs telematics services. Therefore, the findings resulting from this research can be used as an alternative decision support system related to the program of empowerment of SMEs in telematics.
Telematics and satellites. Part 1: Information systems
NASA Astrophysics Data System (ADS)
Burke, W. R.
1980-06-01
Telematic systems are identified and described. The applications are examined emphasizing the role played by satellite links. The discussion includes file transfer, examples of distributed processor systems, terminal communication, information retrieval systems, office information systems, electronic preparation and publishing of information, electronic systems for transfer of funds, electronic mail systems, record file transfer characteristics, intra-enterprise networks, and inter-enterprise networks.
Telematics Framework for Federal Agencies: Lessons from the Marine Corps Fleet
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Cabell; Singer, Mark R.
Executive Order 13693 requires federal agencies to acquire telematics for their light- and medium-duty vehicles as appropriate. This report is intended to help agencies that are deploying telematics systems and seeking to integrate them into their fleet management process. It provides an overview of telematics capabilities, lessons learned from the deployment of telematics in the Marine Corps fleet, and recommendations for federal fleet managers to maximize value from telematics.
DOT National Transportation Integrated Search
2003-04-01
"In-Vehicle Telematics" refers to devices incorporating wireless communications technologies in order to provide information services, vehicle automation and other functions. While cellular phones are currently the most common type of telematics devi...
DOT National Transportation Integrated Search
2014-04-01
Transportation and logistics companies increasingly : rely on modern technologies and in-vehicle tools : (also known as telematics systems) to optimize their : truck fleet operations. Telematics is technology that : combines telecommunications (i.e.,...
Sound source tracking device for telematic spatial sound field reproduction
NASA Astrophysics Data System (ADS)
Cardenas, Bruno
This research describes an algorithm that localizes sound sources for use in telematic applications. The localization algorithm is based on amplitude differences between various channels of a microphone array of directional shotgun microphones. The amplitude differences will be used to locate multiple performers and reproduce their voices, which were recorded at close distance with lavalier microphones, spatially corrected using a loudspeaker rendering system. In order to track multiple sound sources in parallel the information gained from the lavalier microphones will be utilized to estimate the signal-to-noise ratio between each performer and the concurrent performers.
Study of the impact of a telematics system on safe and fuel-efficient driving in trucks.
DOT National Transportation Integrated Search
2014-04-01
A telematics system has been successfully demonstrated to be useful for improving motor carrier efficiency. In this : particular field study, the research team demonstrated that telematics can be used to monitor and improve safe : driving behavior as...
Butera, R; Locatelli, C; Gandini, C; Minuco, G; Mazzoleni, M C; Giordano, A; Zanuti, M; Varango, C; Petrolini, V; Candura, S M; Manzo, L
1997-01-01
Health management of major chemical incidents requires a close collaboration between rescuers (on the disaster site and in the emergency department) and the poison center. The study tested telematic technologies allowing telepresence and teleconsulting, a real time and continuous connection among health care personnel and toxicologists involved in the management of the emergency. The link between the poison center (PC) and the emergency department in the local hospital is provided by a ISDN operating video conferencing system, while the data transmission from the site of the accident to the PC is achieved with a personal computer and GSM cellular data transmission. Toxicological databases and risk assessment software are integrated in the system, to support information sharing. To test such instruments in operative nearly realistic conditions, the main phase of the study has implemented simulated chemical disasters in different locations in Italy. Instruments for telepresence and teleconsulting have been effectively utilized to evaluate from a remote location the scenario and the severity of the accident, by inspecting either specific details or the whole scene, to enable PC guiding the triage of the victims before and after hospitalization, to utilize and share data, such as intervention protocols or patient records, and to document all the activities. In summary, this experience shows that the telematic link allows the toxicologists of the poison center to rapidly understand the situation, and to correctly learn about the conditions of patients with the help of images. The results of this study indicate the valuable benefits of telematic instruments for the health care in case of major chemical disasters occurring in a remote geographical location or in an area which lacks local toxicological experts, where specialized expertise can be achieved by the use of telematic technologies.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-08
...Telematics, Inc., Atlanta, GA; Inducta d.o.o., Zagreb, CROATIA; Infinite Infosoft Services Pvt Ltd, Gurgaon, INDIA; ING Bank N.V., Amsterdam, NETHERLANDS; integracija od-do d.o.o., Zagreb, CROATIA; Intraway Corp...; HughesTelematics to HughesTelematics, Inc., Atlanta, GA; Inducta to Inducta d.o.o., Zagreb, CROATIA...
ERIC Educational Resources Information Center
Alocer, Josep Garcia
1993-01-01
Describes the implementation of a training course in computerized educational resource management provided for staff of Pedagogical Resource Centres in Catalonia (Spain). Training in telematics is explained, including documentary training and an ongoing process of permanent training assistance; the telematics infrastructure is discussed; and the…
SHINE: Strategic Health Informatics Networks for Europe.
Kruit, D; Cooper, P A
1994-10-01
The mission of SHINE is to construct an open systems framework for the development of regional community healthcare telematic services that support and add to the strategic business objectives of European healthcare providers and purchasers. This framework will contain a Methodology, that identifies healthcare business processes and develops a supporting IT strategy, and the Open Health Environment. This consists of an architecture and information standards that are 'open' and will be available to any organisation wishing to construct SHINE conform regional healthcare telematic services. Results are: generic models, e.g., regional healthcare business networks, IT strategies; demonstrable, e.g., pilot demonstrators, application and service prototypes; reports, e.g., SHINE Methodology, pilot specifications & evaluations; proposals, e.g., service/interface specifications, standards conformance.
Education and training in the MEDICOM system.
Marinos, G; Palamas, S; Vlachos, I; Panou-Diamandi, O; Kalivas, D; Koutsouris, D
2000-01-01
MEDICOM system is a world wide telematics application for electronic commerce of medical devices. It has been designed so as to provide the health care professionals with a central Internet access to up-to-date information about medical equipment from multiple manufacturers, in a particular easy and friendly way. Moreover, the Medicom system will serve the health care professionals' requirements for high-quality information about specific products in a form of multimedia presentations and that of a secure communication channel with the community of manufacturers, especially for post marketing surveillance. The system will provide the medical staff (physicians and technicians) with demonstrations of the operation procedures and the functioning of high-tech equipment in a form of virtual models. Moreover, through the medicom system the end users of medical devices can have access to on line libraries and participate in special newsgroups. This paper discusses the architectural structure of the MEDICOM system with emphasis to its educational and training functionality.
Communicating with residential electrical devices via a vehicle telematics unit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roth, Rebecca C.; Pebbles, Paul H.
A method of communicating with residential electrical devices using a vehicle telematics unit includes receiving information identifying a residential electrical device to control; displaying in a vehicle one or more controlled features of the identified residential electrical device; receiving from a vehicle occupant a selection of the displayed controlled features of the residential electrical device; sending an instruction from the vehicle telematics unit to the residential electrical device via a wireless carrier system in response to the received selection; and controlling the residential electrical device using the sent instruction.
Vehicle telematics as a platform for road use fees : final report.
DOT National Transportation Integrated Search
2016-11-01
Vehicle telematics systems are composed of various onboard communications, positioning technologies, and computing technologies. Much of the data generated and/or gathered by these systems can be used to determine travel. These systems enable a range...
Cooperation with Central and Eastern Europe in Language Engineering.
ERIC Educational Resources Information Center
Andersen, Poul
This paper outlines trends and activities in Central and Eastern European language research and language-related software development (language engineering) and briefly describes some specific projects. The language engineering segment of the European Union's Fourth Framework Programme, intended to facilitate use of telematics applications and…
Organisational Culture: Electronic Support for Occupational Learning.
ERIC Educational Resources Information Center
Saunders, Murray
1998-01-01
Outlines the interrelationship between telematic learning support and organizational culture of the workplace, defines occupational learning and types of organizationally generated knowledge, identifies concepts of organizational culture, and assesses the argument that telematics can effect changes in culture. Contextualizes these issues in new…
TOPILOT: An Application of New Technology for Distance Learning.
ERIC Educational Resources Information Center
Marks, Ken
1997-01-01
A European Community project is using telematics to serve the educational needs of children whose families are occupational travelers. Portable multimedia materials and a telecommunications system are intended to enable tutors to manage students' learning at a distance. Tutors are concerned about frustration, isolation, and lack of support. (SK)
Latent class analysis of accident risks in usage-based insurance: Evidence from Beijing.
Jin, Wen; Deng, Yinglu; Jiang, Hai; Xie, Qianyan; Shen, Wei; Han, Weijian
2018-06-01
Car insurance is quickly becoming a big data industry, with usage-based insurance (UBI) poised to potentially change the business of insurance. Telematics data, which are transmitted from wireless devices in car, are widely used in UBI to obtain individual-level travel and driving characteristics. While most existing studies have introduced telematics data into car insurance pricing, the telematics-related characteristics are directly obtained from the raw data. In this study, we propose to quantify drivers' familiarity with their driving routes and develop models to quantify drivers' accident risks using the telematics data. In addition, we build a latent class model to study the heterogeneity in travel and driving styles based on the telematics data, which has not been investigated in literature. Our main results include: (1) the improvement to the model fit is statistically significant by adding telematics-related characteristics; (2) drivers' familiarity with their driving trips is critical to identify high risk drivers, and the relationship between drivers' familiarity and accident risks is non-linear; (3) the drivers can be classified into two classes, where the first class is the low risk class with 0.54% of its drivers reporting accidents, and the second class is the high risk class with 20.66% of its drivers reporting accidents; and (4) for the low risk class, drivers with high probability of reporting accidents can be identified by travel-behavior-related characteristics, while for the high risk class, they can be identified by driving-behavior-related characteristics. The driver's familiarity will affect the probability of reporting accidents for both classes. Copyright © 2018 Elsevier Ltd. All rights reserved.
Telematics Options and Capabilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Cabell
This presentation describes the data tracking and analytical capabilities of telematics devices. Federal fleet managers can use the systems to keep their drivers safe, maintain a fuel efficient fleet, ease their reporting burden, and save money. The presentation includes an example of how much these capabilities can save fleets.
Fleet Feedback and Fleet Efficiency Metrics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singer, Mark R
The Marine Corps have 10 years of experience implementing a telematics program and several lessons to share with partner agencies. This presentation details results of a Marine Corps survey as well as methods of using telematics to promote fleet efficiency and optimize the vehicle acquisition process.
Hübner, Ursula; Schulte, Georg; Sellemann, Björn; Quade, Matthias; Rottmann, Thorsten; Fenske, Matthias; Egbert, Nicole; Kuhlisch, Raik; Rienhoff, Otto
2015-01-01
Although national eHealth strategies have existed now for more than a decade in many countries, they have been implemented with varying success. In Germany, the eHealth strategy so far has resulted in a roll out of electronic health cards for all citizens in the statutory health insurance, but in no clinically meaningful IT-applications. The aim of this study was to test the technical and organisation feasibility, usability, and utility of an eDischarge application embedded into a laboratory Health Telematics Infrastructure (TI). The tests embraced the exchange of eDischarge summaries based on the multiprofessional HL7 eNursing Summary standard between a municipal hospital and a nursing home. All in all, 36 transmissions of electronic discharge documents took place. They demonstrated the technical-organisation feasibility and resulted in moderate usability ratings. A comparison between eDischarge and paper-based summaries hinted at higher ratings of utility and information completeness for eDischarges. Despite problems with handling the electronic health card, the proof-of-concept for the first clinically meaningful IT-application in the German Health TI could be regarded as successful.
Arcarese, T; Boi, S; Gagliardi, R
2000-01-01
The concepts expressed in this paper concerns the activities to be developed within HEALTHLINE, a European project under the Telematics Application programme. HEALTHLINE is an umbrella project which takes initiatives and provides links to other international projects on health telematics. The projects involved are NIVEMES and RISE; they represent the starting point from which a common approach will be developed. The experience gained from these projects has highlighted two emerging requirements: information dissemination and training. To fulfil the needs of information, an Internet corner will be set up; it will allow citizens and health professionals to find and exchange information as well as to discuss themes concerning health care. Due to the most advanced technologies recently introduced, the Health care sector has had to modify its traditional ways of working to aid professionals in exploiting new training techniques and Health Care provision methods. HEALTHLINE will focus on training and on the development of the use of new tools and services. Furthermore, the project will exploit the training methodologies based on multimedia technology for developing training-on-the-job modules. The entire system, in its final stage, will consist of a network for co-operating training and information dissemination; European sites in the project will share information, training material and provide education and information on tele-health, medical and health-care issues to health care providers, beneficiaries and the general public.
Preparation and Design of Educational Material in a European Multi-Partner Telematics Project.
ERIC Educational Resources Information Center
Dobbeni, Ann; Botke, Jolanda; Marks, Ken
1998-01-01
Describes "TOPILOT," a European telematics project coordinated by the European Federation for the Education of the Children of Occupational Travellers (EFECOT), which responds to the educational and training needs of fairground, circus, and bargee families. Discusses teacher involvement, linking project phases, and communication and the…
The Virtual Campus: Trends for Higher Education and Training.
ERIC Educational Resources Information Center
Verdejo, Felisa, Ed.; Davies, Gordon, Ed.
This volume presents 27 papers given at a conference on the virtual campus. Papers are grouped into five parts: (1) keynote presentations, (2) global approaches, (3) evaluation studies, (4) collaborative learning and group activities, and (5) web tools and web applications. The papers are: "New Wine and Old Bottles? Tele-learning, Telematics,…
The future is no longer what it used to be. Managing health telematics projects.
Demeester, M; Beuscart, R
1997-09-01
Future used to mean global progress and convergence of science and technology and society. Today, we observe the decoupling of the two poles of knowledge formation and application (i.e. science and technology, and culture and society, respectively) and also fierce confrontation between them. The key issue to reconcile the two poles is to re-invent the link between them. The new future lies in the development of mental and technical capacities for change and the creation of new forms of solidarity. We propose, as a general attitude, to reactivate and develop the four principles of efficacy-effectiveness-efficiency, hospitality, responsibility and pertinence. Translated into driving forces for the development of health care telematic projects, they amount to the acceptance of and capacity for enterprise-wide solutions, hospitality and capacity to acquire outside knowledge, self-managed, multi-functional team work spirit, reengineering mentality to achieve pertinent technico-cultural solutions.
Investigation of the performance of EOTD for GSM users in telematics applications
NASA Astrophysics Data System (ADS)
Sharawi, Mohammad S.; Aloi, Daniel N.
2003-08-01
Location-based services have been standardized for incorporation into 3rd generation wireless communications as a result of the Federal Communications Commission"s (FCC) mandate on wireless carriers to provide automatic location information (ALI) during emergency911 calls. This mandate has driven the wireless carriers to explore terrestrial, satellite, and hybrid based location technology solutions. This paper presents a communications model that investigates the position accuracyof a Global Standard Mobile (GSM) phone employing the enhanced observed time difference (EOTD) location technology. The EOTD positioning technique requires the mobile station (MS) to detect signals from at least three base stations (BS). This studyassumes the three BSs are synchronized in time. For a given BS geometry with respect to the MS, a Monte Carlo simulation was performed to assess the two-dimensional position accuracyof the MS in Rayleigh and Ricean fading channels. In each channel, a Monte Carlo simulation was performed for a good and a bad BS-to-MS geometry. The paper concludes with a list of pros/cons of implementing EOTD as a location technologyenabler in telematics applications.
Remote consulting based on ultrasonic digital immages and dynamic ultrasonic sequences
NASA Astrophysics Data System (ADS)
Margan, Anamarija; Rustemović, Nadan
2006-03-01
Telematic ultrasonic diagnostics is a relatively new tool in providing health care to patients in remote, islolated communities. Our project facility, "The Virtual Polyclinic - A Specialists' Consulting Network for the Islands", is located on the island of Cres in the Adriatic Sea in Croatia and has been extending telemedical services to the archipelago population since 2000. Telemedicine applications include consulting services by specialists at the University Clinical Hospital Center Rebro in Zagreb and at "Magdalena", a leading cardiology clinic in Croatia. After several years of experience with static high resolution ultrasonic digital immages for referral consulting diagnostics purposes, we now also use dynamic ultrasonic sequences in a project with the Department of Emmergency Gastroenterology at Rebro in Zagreb. The aim of the ongoing project is to compare the advantages and shortcomings in transmitting static ultrasonic digital immages and live sequences of ultrasonic examination in telematic diagnostics. Ultrasonic examination is a dynamic process in which the diagnostic accuracy is highly dependent on the dynamic moment of an ultrasound probe and signal. Our first results indicate that in diffuse parenchymal organ pathology the progression and the follow up of a disease is better presented to a remote consulting specialist by dynamic ultrasound sequences. However, the changes that involve only one part of a parenchymal organ can be suitably presented by static ultrasonic digital images alone. Furthermore, we need less time for digital imaging and such tele-consultations overall are more economical. Our previous telemedicine research and practice proved that we can greatly improve the level of medical care in remote healthcare facilities and cut healthcare costs considerably. The experience in the ongoing project points to a conclusion that we can further optimize remote diagnostics benefits by a right choice of telematic application thus reaching a correct diagnosis and starting an applicable therapy even faster. Nevertheless, a successful implementation of such diagnostics methods may require further improvements in telemedical systems.
Telematics and Electronic Communication and Their Effect on Educational Space. [Brief No.] 3.
ERIC Educational Resources Information Center
Morton, James E.
A telematics and electronic communication task group examines technology's influence on the educational process as well as the physical classroom, and the needs and concerns these new technologies bring to architects and educators in designing an adaptable classroom. Technology and the classroom are examined in the following areas: the use of…
ERIC Educational Resources Information Center
Brooks, Pauline
2014-01-01
This article reflects upon the process of creating dance in an intermedial telematic dance setting with university students. Some contextualisation is made of five telematic dance projects (the "Phillypool Projects 2007-2012") that have taken place between two universities, one in the UK and one in the US. It will explore some of the…
DOT National Transportation Integrated Search
2007-07-01
A study was undertaken to determine the statistics and economics associated with the use of the passive monitoring of commercial vehicle telematics as a source of highway traffic data. relationships were established with a group of private sector com...
Health Telematics: A challenge for Healthcare Quality
2001-10-25
coordination of medical professionals and the quality of care. A a consequence, Health Telematics is a striking challenge for : 1. The communication between... professionals . Many experiences of professional networks all around the world demonstrate the feasibility and the benefits of such an electronic...communication between doctors, nurses, hospitals, labs... 2. The communication between professionals and their patients. Are the professionals ready
Implementation of safety driving system using e-health and telematics technology.
Lee, Youngbum; Lee, Myoungho
2008-08-01
This research aimed to develop a safety driving system using e-health and telematics technology. Biosignal sensors were installed in an automobile to check the driver's health status with an automatic diagnosis system providing health information to the driver. Measured data were sent to the e-health center through a telematics device, and a medical doctor analyzed these data, sending diagnosis and prescription information to the driver. This system recognizes the driver's sleeping, drinking impairment, excitability, and fatigue using biosensors. The system initially provides alerts in the automobile. It also controls the driving environment in the car, searches for a highway service area using Global Positioning System (GPS), and provides additional information for safety driving. If a car accident has occurred, it makes an emergency call to the nearest hospital, emergency center, and insurance company. A conceptual and prototype model for an imbedded system is presented with initial data for driver condition. Such a system could prevent car accidents caused by drivers driving while intoxicated and falling asleep at the wheel using the driver's biosignals measured by biosensors. The system can provide various e-health services using a telematics system to enhance the technical compatibility of the automobile.
An Architecture for Integrated Regional Health Telematics Networks
2001-10-25
that enables informed citizens to have an impact on the healthcare system and to be more concerned and care for their own health . The current...resource, educational, integrated electronic health record (I- EHR ), and added value services [2]. These classes of telematic services are applica...cally distributed clinical information systems . 5) Finally, added-value services (e.g. image processing, information indexing, data pre-fetching
ERIC Educational Resources Information Center
International Telecommunication Union, Geneva (Switzerland).
The African Regional Symposium on Telematics for Development was organized in view of the special educational and communication needs of Africa in a time of accelerating change and development of information technologies. The symposium brought together more than 150 African specialists, and over 40 participants from other regions and development…
Factors That Facilitate Or Hinder Fuel-Saving Initiatives and Technology
2015-12-01
loading times, unloading times, prevailing winds , flying times, and such other factors as air traffic control delay times, taxi delay times, and...just the simple vehicle telematics used, which is the sensors and so on, the driver behavior telematics. There’s things like the communication module...electric, compressed natural gas, and even turbine -powered vehicles (Interview FE02, July 2, 2015). As early as 2003, the company was looking to replace
Design and Implementation of a Threaded Search Engine for Tour Recommendation Systems
NASA Astrophysics Data System (ADS)
Lee, Junghoon; Park, Gyung-Leen; Ko, Jin-Hee; Shin, In-Hye; Kang, Mikyung
This paper implements a threaded scan engine for the O(n!) search space and measures its performance, aiming at providing a responsive tour recommendation and scheduling service. As a preliminary step of integrating POI ontology, mobile object database, and personalization profile for the development of new vehicular telematics services, this implementation can give a useful guideline to design a challenging and computation-intensive vehicular telematics service. The implemented engine allocates the subtree to the respective threads and makes them run concurrently exploiting the primitives provided by the operating system and the underlying multiprocessor architecture. It also makes it easy to add a variety of constraints, for example, the search tree is pruned if the cost of partial allocation already exceeds the current best. The performance measurement result shows that the service can run even in the low-power telematics device when the number of destinations does not exceed 15, with an appropriate constraint processing.
Securing a web-based teleradiology platform according to German law and "best practices".
Spitzer, Michael; Ullrich, Tobias; Ueckert, Frank
2009-01-01
The Medical Data and Picture Exchange platform (MDPE), as a teleradiology system, facilitates the exchange of digital medical imaging data among authorized users. It features extensive support of the DICOM standard including networking functions. Since MDPE is designed as a web service, security and confidentiality of data and communication pose an outstanding challenge. To comply with demands of German laws and authorities, a generic data security concept considered as "best practice" in German health telematics was adapted to the specific demands of MDPE. The concept features strict logical and physical separation of diagnostic and identity data and thus an all-encompassing pseudonymization throughout the system. Hence, data may only be merged at authorized clients. MDPE's solution of merging data from separate sources within a web browser avoids technically questionable techniques such as deliberate cross-site scripting. Instead, data is merged dynamically by JavaScriptlets running in the user's browser. These scriptlets are provided by one server, while content and method calls are generated by another server. Additionally, MDPE uses encrypted temporary IDs for communication and merging of data.
Emerging Technology Domains Risk Survey
2015-04-01
integration technologies (Apple CarPlay, Google Open Automotive Alliance, Blackberry QNX) are of particular concern. 6.3 Time Frame Telematics systems...are numerous quantified self devices and applications available for use now, and the market is growing in popularity (3.3 million fitness trackers...in 2015 to validate the progress of the tech- nology. The market for smart appliances is currently rather small but is expected to grow in com- ing
ERIC Educational Resources Information Center
Moller, Morten, Ed.; Shaughnessy, Haydn, Ed.
This report is based on contributions to two workshops arranged jointly by Task Force Human Resources and the DELTA (Developing European Learning through Technological Advance) Unit. The purpose of collecting these papers was to provide an overview of the implications of the DELTA Exploratory Action outcomes for future research. After the preface…
Exploring Telematics Big Data for Truck Platooning Opportunities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lammert, Michael P; Bugbee, Bruce; Hou, Yi
NREL completed a temporal and geospatial analysis of telematics data to estimate the fraction of platoonable miles traveled by class 8 tractor trailers currently in operation. This paper discusses the value and limitations of very large but low time-resolution data sets, and the fuel consumption reduction opportunities from large scale adoption of platooning technology for class 8 highway vehicles in the US based on telematics data. The telematics data set consist of about 57,000 unique vehicles traveling over 210 million miles combined during a two-week period. 75% of the total fuel consumption result from vehicles operating in top gear, suggestingmore » heavy highway utilization. The data is at a one-hour resolution, resulting in a significant fraction of data be uncategorizable, yet significant value can still be extracted from the remaining data. Multiple analysis methods to estimate platoonable miles are discussed. Results indicate that 63% of total miles driven at known hourly-average speeds happens at speeds amenable to platooning. When also considering availability of nearby partner vehicles, results indicate 55.7% of all classifiable miles driven were platoonable. Analysis also address the availability of numerous partners enabling platoons greater than 2 trucks and the percentage of trucks that would be required to be equipped with platooning equipment to realize more than 50% of the possible savings.« less
Duplaga, Mariusz; Leszczuk, Mikolaj; Zielinski, Krzysztof
2006-01-01
Central and Eastern Europe countries (CEEC) undertook considerable efforts to include themselves in the main research and development activities in the area of health telematics in Europe. Countries of this region demonstrate diversified environments of economy transformation and health care systems status. The transition phase to market economy brings essential risks to the healthcare system performance. It seems that efforts of developing e-health environment in CEEC could be substantially accelerated by extended co-operation with partners from current member states of the European Union. The PRO-ACCESS project was initiated in the late phase of fifth Framework Programme as supporting action. It focused on the transfer of current concepts in medical telematics to countries remaining in the pre-accession phase. The process of dissemination of up-to-date approaches to e-health environment development is carried out by the Krakow Centre of Telemedicine and is supported by leading health telematics centres in Europe. To accelerate the dissemination activities the network of co-operating centres in CEEC was established. The strategy employed within the PRO-ACCESS project is supposed to yield "critical mass" necessary for facilitating the e-health development in this region of Europe. The activities employed to reach this objective included publishing activities, events and trainings as well as intake of solutions from supporting centres.
Telematics for rural health care practitioners
NASA Astrophysics Data System (ADS)
Greenfield, Robert H.; Kardaun, Jan W. P. F.
1990-06-01
The " crisis" in rural health care i. e. the decreasing number of practitioners is partially caused by the increasing use of technology in health care. Health care practitioners in rural Canada are progressively finding their practice more difficult because of their isolation from the population centers housing many of the services and supplies needed in the modern practice of medicine. The centralization of these supplies and services results from the increasing use of technology in medicine. It is uneconomical to place expensive equipment highly trained technicians and consultants and well-stocked and current information sources in rural locations where they are underutilized. Thus over the years the increasing use of technology makes rural practice more difficult and less attractive in comparison to an urban practice that can easily and cheaply employ the benefits of technology and expert consultation. The Saskatchewan situation is examined using data collected by the authors and compared to other rural areas reported in the literature. The ways that computer communications can help alleviate this situation are explained and illustrated through a review of North American telematics activities. Telematic services for physicians are developing in North America. This is in synergy with the increasing ownership of computers by physicians. We contrast the Canadian scene with the American. Telematics is a technological approach that can be employed to reduce the isolation of rural health care practitioners. It can provide
Besalduch-Balaguer, M; Aguilera-Roig, X; Urrútia-Cuchí, G; Puntonet-Bruch, A; Jordan-Sales, M; González-Osuna, A; Celaya-Ibáñez, F; Colomina-Morales, J
2015-01-01
Questionnaires measuring health-related quality of life are difficult to perform and obtain for patients and professionals. Computerised tools are now available to collect this information. The objective of this study was to assess the ability of patients undergoing total knee replacement to fill in health-related quality-of-life questionnaires using a telematic platform. Ninety eight consecutive patients undergoing total knee arthroplasty were included. Participants were given an access code to enter the website where they had to respond to 2 questionnaires (SF8 and the reduced WOMAC), and 3 additional questions about the difficulty in completing the questionnaires. A total of 98 patients agreed to participate: 45 males and 53 females (mean age 72.7 years). Fourteen did not agree to participate due to lack of internet access. Of the final 84 participants, 50% entered the website, and only 36 answered all questions correctly. Of the patients who answered the questionnaire, 80% were helped by a relative or friend, and 22% reported difficulty accessing internet. The use of telematic systems to respond to health-related quality of life questionnaires should be used cautiously, especially in elderly population. It is likely that the population they are directed at is not prepared to use this type of technology. Therefore, before designing telematics questionnaires it must be ensured that they are completed properly. Copyright © 2014 SECOT. Published by Elsevier Espana. All rights reserved.
Smart Roadside System for Driver Assistance and Safety Warnings: Framework and Applications
Jang, Jeong Ah; Kim, Hyun Suk; Cho, Han Byeog
2011-01-01
The use of newly emerging sensor technologies in traditional roadway systems can provide real-time traffic services to drivers through Telematics and Intelligent Transport Systems (ITSs). This paper introduces a smart roadside system that utilizes various sensors for driver assistance and traffic safety warnings. This paper shows two road application models for a smart roadside system and sensors: a red-light violation warning system for signalized intersections, and a speed advisory system for highways. Evaluation results for the two services are then shown using a micro-simulation method. In the given real-time applications for drivers, the framework and certain algorithms produce a very efficient solution with respect to the roadway type features and sensor type use. PMID:22164025
Telemedicine: barriers and opportunities in the 21st century.
Stanberry, B
2000-06-01
This paper aims to examine how health telematics will develop in the first 10 years of the new millennium and, in particular, to assess what operational, ethical and legal barriers may lie in the way of this development. A description of the key principles and concepts involved in telemedicine and a short historical overview of telemedicine's evolution over the past century are followed by consideration of why empirical research into 'info-ethics' and other deontological and legal issues relating to telemedicine is being necessarily catalysed by, amongst others, the European Commission. Four evolving health telematics applications are examined in some detail: electronic health records; the transmission of visual media in disciplines such as teleradiology, teledermatology, telepathology and teleophthalmology; telesurgery and robotics and the use of call centres and decision-support software. These are discussed in the light of their moral, ethical and cultural implications for clinicians, patients and society at large. The author argues that telemedicine presents unique opportunities for both patients and clinicians where it is implemented in direct response to clear clinical needs, but warns against excessive reliance upon technology to the detriment of traditional clinician-patient relationships and against complacency regarding the risks and responsibilities - many of which are as yet unknown - that distant medical intervention, consultation and diagnosis carry.
Proposal of a Roundabout Solution within a Particular Traflc Operation
NASA Astrophysics Data System (ADS)
Ližbetin, Ján; Stopka, Ondrej
2016-11-01
This paper presents the practical solution of the transport telematics elements within a particular traffic operation when providing a transport and logistics services. A roundabout helps to increase the fluency and safety of transport and logistics services in cities and urban areas, however, the positive effect can be achieved only after determining the proper intersection parameters. Based on a survey performed in a real traffic situation, the practical application of roundabout in the city of Pilsen is processed in the most important part of the paper.
Alcántara-Aragón, Valeria; Rodrigo-Cano, Susana; Lupianez-Barbero, Ascension; Martinez, María José; Martinez, Carmen; Tapia, José; Iniesta, José Manuel; Tenes, Susana; Urgell, Eulalia; Navarro, Gemma; Hernando, M Elena; Merino-Torres, Juan Francisco; de Leiva, Alberto; Gonzalez, Cintia
2018-05-01
An ongoing clinical trial is testing the efficacy of web telematic support in a structured program for obesity treatment and diabetes prevention. Participants were recruited from two tertiary-care hospitals and randomized to receive either a telematic intervention (TI) supported by PREDIRCAM2 web platform or a non-telematic intervention (NTI). All receive 1-year follow-up. Both interventions consist of tailored dietary and exercise prescriptions, based on a Mediterranean dietary pattern and general WHO exercise recommendations for adults. At 6 months, both groups have received 7 contacts, 3 exclusively telematic for the TI group. This is a preliminary result intention-to-treat analysis. One hundred eighty-three participants were recruited, with a mean body mass index of 34.75 ± 2.75 kg/m 2 . General dropout rate at 6 months was 26.8%. Weight changes were statistically significant at months 3 and 6 compared to baseline, -2.915 ± 0.24 kg, -3.29 ± 0.36 kg, respectively (P < 0.001), but not statistically significant between the 3- and 6-month time points -0.37 ± 0.21 kg (P = 0.24). Mean group differences showed that the TI group lost 1.61 ± 1.88 kg more than the NTI group (P = 0.39). Waist, waist/hip ratio, resting heart rate, blood pressure, HbA1c, and low-density lipoprotein cholesterol also showed statistically significant changes at 6 months, with no significant differences between groups. Weight loss in the TI group shows similar results as the usual care NTI group for weight loss and control of obesity comorbidities. At completion of the clinical trial, these results will be reevaluated to assess the potential role of web support in weight-loss maintenance and its cost-effectiveness.
NASA Astrophysics Data System (ADS)
Suyono, Joko; Sukoco, Agus; Ikhsan Setiawan, M.; Suhermin; Rahim, Robbi
2017-12-01
Indonesia a great number of populations and demand of air transportation services keep increasing by the year in line with the increasing of population and welfare its people. Need for telematics solutions to support goods transport and distribution in cities is mainly due to the complexity of the processes taking place in urban transport systems and the importance of the optimisation of transport operations via ensuring adequate availability of linear and point infrastructure, while reducing the adverse impacts of the transport system on the environment. Efficient infrastructure supports economic growth, improves quality of life, and it is important for national security. Impact of GDP Information Technology in developing of Regional Central Business especially SME Business, are very large correlations and very significant supported by Passenger Arrival and Departure, Baggage Loaded and Unloaded, Cargo Loaded and Unloaded, Separated regional asset, Grant, Capital Expenditure, Investment of Regional Gov., GDP Agriculture-Forestry-Fishing, GDP Manufacturing, GDP Electricity-Gas, GDP Water supply- Sewerage-Waste Management-Remediation Activities, GDP Financial-Insurance Activities, GDP Business Activities, GDP Public Administration and Defense-Compulsory Social Security, GDP Education and GDP Other Services Activities
Telematics and smart cards in integrated health information system.
Sicurello, F; Nicolosi, A
1997-01-01
Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole network of services involved will be monitored for the duration of the project. The system users will also include general practitioners, social workers, physicians, health operators, pharmacists, laboratory workers and administrative personnel of the municipality and of the health structures concerned.
[Telescience : Feasibility studies, definition and a fair answer to the scientific brain drain].
Craemer, E M; Bassa, B; Jacobi, C; Becher, H; Meyding-Lamadé, U
2017-02-01
What is telescience? Is it feasible to transfer academic information with the help of telematics to educate and teach young scientists over large distances? The term telescience has so far not been defined but covers a variety of possibilities, which could be successfully implemented worldwide. This article gives examples and highlights the feasibility analysis of telescience. We have carried out feasibility analyses for neurological functional diagnostics, an epidemiological cross-sectional study as well as a laboratory study for detection of thrombocyte function during dengue fever with the help of telemedicine. The basis for all these projects was a telemedical transcontinental cooperation over a distance of 12,000 km. All performed studies demonstrated the feasibility. With the help of telematics the laboratory techniques, planning, conduction and interpretation of results as well as publication skills can be transferred. Telescience is feasible. Our studies showed that telescience is a very promising option to transfer knowledge, which will help to enable professional expertise to be transferred directly to the region/country without a brain drain. All too often young motivated scientists are enticed to move to well-known institutions, which involves the danger of a brain drain. Brain drain can be avoided in favor of local implementation of scientific projects. Our results illustrate that it is feasible to educate and guide scientists with the help of telematics infrastructures.
Ptochos, Dimitrios; Panopoulos, Dimitrios; Metaxiotis, Kostas; Askounis, Dimitrios
2004-01-01
Recent EU and Greek Government legislation highlights the need for the modernisation of the public health management system and the improvement of the overall health of EU citizens. In addition, the effusion of epidemics even in developed countries makes the need for the enhancement of public health services imperative. In order to best confront the above-described challenges, the National Technical University of Athens, in cooperation with the Greek Ministry of Health and Welfare and the European Commission (EC), designed and developed an integrated public health information network, named GEPIMI (Integrated Geographical System for EPIdemiological and other Medical Information), in the framework of a three-year pilot project. This pilot project, funded by Greek Ministry of Health and Welfare and the EC supported the Programme INTERREG II to establish an advanced and integrated web-based information system that can process and move information in real time, allowing public health authorities to monitor events at hundreds or thousands of public health facilities at once. The system is established among hospitals, primary healthcare authorities and health agents in Greece, Bulgaria, Albania, Fyrom, and Turkey. The project aims at demonstrating the best practices, prospects, applications and high potential of Telematics Healthcare Networks in Europe, with a view to promoting cooperation and interconnection between European communities in the field of Telematics Healthcare Applications. The GEPIMI System, implemented via an innovative web based system, constitutes a replication of a highly effective mechanism. It incorporates state-of-the-art technologies such as Geographic Information Systems (G.I.S.), web based databases, GPS, and Smart Card Technology and supports a variety of health-related web applications including early warning and response of epidemics, remote management of medical records, seamless healthcare coverage, comprehensive statistical analysis of data, decision-making procedures, inter-communication between international scientific fora and other.
Code of Federal Regulations, 2013 CFR
2013-07-01
... associated data, video and photographic images, and such other telematics and/or data services as may exist... the preexisting satellite digital audio radio services as defined in 17 U.S.C. 114(j)(10). Term means...
Code of Federal Regulations, 2014 CFR
2014-07-01
... associated data, video and photographic images, and such other telematics and/or data services as may exist... the preexisting satellite digital audio radio services as defined in 17 U.S.C. 114(j)(10). Term means...
Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI
NASA Astrophysics Data System (ADS)
Zúquete, André; Gomes, Helder; Cunha, João Paulo Silva
This paper describes the design and implementation of an e-Health authentication architecture using smartcards and a PKI. This architecture was developed to authenticate e-Health Professionals accessing the RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals' credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short-lived certificates and cross-certification agreements between RTS and e-Health institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional's role at their home institution for role-based authorization. Trust agreements between e-Health institutions and RTS are necessary in order to make the certificates recognized by the RTS. As a proof of concept, a prototype was implemented with Windows technology. The presented authentication architecture is intended to be applied to other medical telematic systems.
ITS evaluation and assessment issues : EC discussion paper
DOT National Transportation Integrated Search
1997-05-22
This paper has summarised the role and importance of systematic assessment and evaluation : when considering investment in Road Transport Telematics. The CONVERGE project recommends the use of five broad evaluation themes detailed above, to which we ...
Transport telematics, tolling and info systems
DOT National Transportation Integrated Search
1995-10-03
This online document is the full text of the speech delivered by John Dawson, Group Public Affairs Director, The Automobile Association (AA), at the Waldorf Hotel, London, on October 3, 1995. It focuses on intelligent transportation systems, ITS, for...
Kluge, Eike-Henner W
2011-02-01
Telehealth is one of the more recent applications of ICT to health care. It promises to be both cost-effective and efficient. However, there lies a danger that focusing mainly on pragmatic considerations will ignore fundamental ethical issues with legal implications that could undermine its success. Implicated here are, among others, changes in the nature of the health care professional patient relationship and informed consent, etc. The position of health informatics professionals as well as hard- and software providers is also affected. A further complicating factor is outsourcing. This paper identifies relevant issues and outlines some of their implications. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Real-time attended home-polysomnography with telematic data transmission.
Bruyneel, Marie; Van den Broecke, Sandra; Libert, Walter; Ninane, Vincent
2013-08-01
Home-polysomnography (HPSG) has been proposed as a cost-effective alternative for obstructive sleep apnea (OSA) diagnosis. We assessed, in a feasibility study, whether telematic transmission using the Dream® and Sleepbox® technologies was associated with low HPSG failure rate. Patients referred by chest physicians for clinical suspicion of OSA underwent one HPSG, using Dream® and Sleepbox® (Medatec, Belgium), which is a wireless system able to communicate with Dream®, and with Internet through a wi-fi/3G interface. It is equipped with a digital infrared camera, and with a speaker/microphone system for bidirectional audio/video communication via Skype®. The Sleep Lab nurse performed a remote discontinuous monitoring of the PSG. In case of sensor loss, she called the patient who had been previously educated to replace the sensors. Twenty-one patients have been studied. 90% of the recordings were of excellent quality. We observed a 10% PSG failure rate: one failure of the Dream®, and one recording of poor quality. There were 2 successful Skype® interventions resulting in readjustment of the defective probes (nasal cannula and EEG). PSG signal visualization was possible in 90% of cases but Skype® connection was problematic in 19% of cases. However, patients could be reached by phone to solve the problem. Real-time attended HPSG through telematic data transmission is feasible and could be an interesting perspective to decrease the failure rate of home sleep studies, even if some technical aspects need to be improved. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Digital Telematics: Present and Future.
ERIC Educational Resources Information Center
Stalberg, Christian E.
1987-01-01
This overview of developments in international telecommunications networks focuses on their importance for developing countries and the necessary interdependence of all countries. Highlights include digital technology, telephone service, packet switching networks, communications satellites, fiber optic cables, and possible future developments.…
Convergent Technologies in Distance Learning Delivery.
ERIC Educational Resources Information Center
Wheeler, Steve
1999-01-01
Describes developments in British education in distance learning technologies. Highlights include networking the rural areas; communication, community, and paradigm shifts; digital compression techniques and telematics; Web-based material delivered over the Internet; system flexibility; social support; learning support; videoconferencing; and…
Information Technology for Economic and Social Benefit--Options for Bangladesh.
ERIC Educational Resources Information Center
Bhuiyan, Farhad Ali
2002-01-01
Considers how information technology (IT) can help socioeconomic growth of developing countries based on experiences in Bangladesh. Topics include Bangladesh's development plans; future economic growth trends triggered by IT; emerging technologies; intellectual and societal development; industrial revolutions; telematics; regional and world…
Matthies, H K; Walter, G F; Brandis, A; Stan, A C; Ammann, A; von Jan, U; Porth, A J
1999-01-01
The combination of new and rapidly developing interactive multimedia computers and applications with electronic networks will require a restructuring of our traditional approach to strategic planning and organizational structure. Worldwide telecommunication networks (using satellites, cable) are now facilitating the global pooling of healthcare information and medical knowledge independent of location. The development of multimedia information and communication systems demands cooperative working teams of authors, who are able to master several areas of medical knowledge as well as the presentation of these in different multimedia forms. The assemblage of telematics and services offers a base for multimedia applications, for example teleteaching, telelearning, telepublishing, teleconsulting, teleconferencing, telemedicine etc. The expansion of the internet will also lead to the formation of interdisciplinary "Global Education Networks". The theory and practice of education are undergoing dramatic changes. Lifelong learning and adaptation of medical practice to new knowledge and new techniques will be even more important in the future.
NASA Astrophysics Data System (ADS)
The subjects discussed are related to LSI/VLSI based subscriber transmission and customer access for the Integrated Services Digital Network (ISDN), special applications of fiber optics, ISDN and competitive telecommunication services, technical preparations for the Geostationary-Satellite Orbit Conference, high-capacity statistical switching fabrics, networking and distributed systems software, adaptive arrays and cancelers, synchronization and tracking, speech processing, advances in communication terminals, full-color videotex, and a performance analysis of protocols. Advances in data communications are considered along with transmission network plans and progress, direct broadcast satellite systems, packet radio system aspects, radio-new and developing technologies and applications, the management of software quality, and Open Systems Interconnection (OSI) aspects of telematic services. Attention is given to personal computers and OSI, the role of software reliability measurement in information systems, and an active array antenna for the next-generation direct broadcast satellite.
Quade, G; Novotny, J; Burde, B; May, F; Beck, L E; Goldschmidt, A
1999-01-01
A distributed multimedia electronic patient record (EPR) is a central component of a medicine-telematics application that supports physicians working in rural areas of South America, and offers medical services to scientists in Antarctica. A Hyperwave server is used to maintain the patient record. As opposed to common web servers--and as a second generation web server--Hyperwave provides the capability of holding documents in a distributed web space without the problem of broken links. This enables physicians to browse through a patient's record by using a standard browser even if the patient's record is distributed over several servers. The patient record is basically implemented on the "Good European Health Record" (GEHR) architecture.
Tri-Level Optimization Algorithms for Solving Defender-Attacker-Defender Network Models
2016-06-01
ed.). New York: Springer. Brimberg, J., Hansen, P., Lin, K., Mladenović, N., & Breton, M. (2003). An Oil Pipeline Design Problem. Operations...H. (2012). Critical infrastructure protection: The vulnerability conundrum. Telematics and informatics , 29(1), 56–65. Retrieved from http
A pen-based system to support pre-operative data collection within an anaesthesia department.
Sanz, M. F.; Gómez, E. J.; Trueba, I.; Cano, P.; Arredondo, M. T.; del Pozo, F.
1993-01-01
This paper describes the design and implementation of a pen-based computer system for remote preoperative data collection. The system is envisaged to be used by anaesthesia staff at different hospital scenarios where pre-operative data are generated. Pen-based technology offers important advantages in terms of portability and human-computer interaction, as direct manipulation interfaces by direct pointing, and "notebook user interfaces metaphors". Being the human factors analysis and user interface design a vital stage to achieve the appropriate user acceptability, a methodology that integrates the "usability" evaluation from the earlier development stages was used. Additionally, the selection of a pen-based computer system as a portable device to be used by health care personnel allows to evaluate the appropriateness of this new technology for remote data collection within the hospital environment. The work presented is currently being realised under the Research Project "TANIT: Telematics in Anaesthesia and Intensive Care", within the "A.I.M.--Telematics in Health CARE" European Research Program. PMID:8130488
NASA Astrophysics Data System (ADS)
Pijanowski, B.; Łukjanow, S.; Burliński, R.
2016-09-01
The rapid development of telematics, particularly mobile telephony (GSM), wireless data transmission (GPRS) and satellite positioning (GPS) noticeable in the last decade, resulted in an almost unlimited growth of the possibilities for monitoring of mobile objects. These solutions are already widely used in the so-called “Intelligent Transport Systems” - ITS and affect a significant increase for road safety. The article describes a method of testing and evaluation of Car Safety Systems (Polish abbreviation - SSB) especially for monitoring traffic incidents, such as collisions and accidents. The algorithm of SSB testing process is also presented. Tests are performed on the dynamic test bench, part of which is movable platform with car security system mounted on it. Crash tests with a rigid obstacle are carried out instead of destructive attempts to crash test of the entire vehicle which is expensive. The tested system, depending on the simulated traffic conditions, is mounted in such a position and with the use of components, indicated by the manufacturer for the automotive safety system installation in a vehicle, for which it is intended. Then, the tests and assessments are carried out.
New Technology and Information Explosion.
ERIC Educational Resources Information Center
Johns, David
A flood of new electronic technologies promises to usher in the Information Age and alter economic and social structures. Telematics, a potent combination of telecommunications and computer technologies, could eventually bring huge volumes of information to great numbers of people by making large data bases accessible to computer terminals in…
Mass Media and the School: Descartes or McLuhan?
ERIC Educational Resources Information Center
Schaeffer, Pierre
1980-01-01
Compares the world of learning with the world of the media, with emphasis on the areas of common interest. Discusses areas of potential cooperation, including local audiovisual centers, adaptation of new media to educational content, computer technology, telematics, and accumulation of audiovisual stock on topics pertinent to education. (DB)
Disseminating Educational Research with IT.
ERIC Educational Resources Information Center
Davis, Niki
Teachers and researchers need to use the research produced in education to improve their practice. However, the current modes of dissemination through journals and papers are often written for the expert community. The Telematics Centre at the University of Exeter (United Kingdom), School of Education provides creative solutions for the effective…
ERIC Educational Resources Information Center
Brodin, Jane; Magnusson, Magnus
This annotated bibliography on videotelephony and disability is based on a literature search in nine databases, as well as information collected from literature lists in published reports. The bibliography's scope includes telephony and related fields such as telematics, the use of different kinds of picture telephones, information technology,…
The Practical Use of the Educational Cable (Educable) Service.
ERIC Educational Resources Information Center
Debats, Pierre
1994-01-01
Analyzes Educable, a French program that includes a national educational film bank, a telematic server, and educational marketing. The analysis is divided into four sections: (1) teacher-users; (2) a classification of films by usage; (3) teacher use of audiovisual material; (4) the video on demand approach to a specific need. (KRN)
A Multimedia Telematics Network for On-the-Job Training, Tutoring and Assessment.
ERIC Educational Resources Information Center
Ferreira, J. M. Martins; MacKinnon, Lachlan; Desmulliez, Marc; Foulk, Patrick
This paper describes an educational multimedia network developed in Advanced Software for Training and Evaluation of Processes (ASTEP). ASTEP started in February 1998 and was set up by a mixed industry-academia consortium with the objective of meeting the educational/training demands of the highly competitive microelectronics/semiconductor…
NASA Astrophysics Data System (ADS)
Tosida, E. T.; Maryana, S.; Thaheer, H.; Hardiani
2017-01-01
Information technology and communication (telematics) is one of the most rapidly developing business sectors in Indonesia. It has strategic position in its contribution towards planning and implementation of developmental, economics, social, politics and defence strategies in business, communication and education. Aid absorption for the national telecommunication SMEs is relatively low; therefore, improvement is needed using analysis on business support cluster of which basis is types of business. In the study, the business support cluster analysis is specifically implemented for Indonesian telecommunication service. The data for the business are obtained from the National Census of Economic (Susenas 2006). The method used to develop cluster model is an Artificial Neural Network (ANN) system called Self-Organizing Maps (SOM) algorithm. Based on Index of Davies Bouldin (IDB), the accuracy level of the cluster model is 0.37 or can be categorized as good. The cluster model is developed to find out telecommunication business clusters that has influence towards the national economy so that it is easier for the government to supervise telecommunication business.
Esmatjes, Enric; Jansà, Margarida; Roca, Daria; Pérez-Ferre, Natalia; del Valle, Laura; Martínez-Hervás, Sergio; Ruiz de Adana, Marisol; Linares, Francisca; Batanero, Ricardo; Vázquez, Federico; Gomis, Ramon; de Solà-Morales, Oriol
2014-07-01
This study evaluated the impact of an Internet-based telematic system on the economic and clinical management of patients with type 1 diabetes mellitus. This 6-month prospective, randomized, comparative, open, multicenter study included patients with type 1 diabetes >18 years old treated with multiple insulin doses and with a glycated hemoglobin (HbA1c) level of >8%. We compared an intervention group (IG) (two face-to-face and five telematic appointments) with a control group (CG) (seven face-to-face appointments). The variables studied were (1) patient and healthcare team costs, (2) metabolic control, (3) knowledge of diabetes, (4) quality of life, and (5) self-care treatment adherence. Of the 154 patients included, 118 (76.6%) completed the study (IG, 54; CG, 64). The time used by the CG to follow the program was 823±645 min versus 353±222 min in the IG (P<0.0001). Compared with the CG, the IG required less healthcare time from the professionals (288±105 min vs. 232±89 min; P<0.001). HbA1c improved in both groups (IG, 9.2±1.5% [77.0±17.0 mmol/mol] vs. 8.7±1.5% [71.6±17.0 mmol/mol] [P<0.001]; CG, 9.2±0.9% [77.0±10.0 mmol/mol] vs. 8.6±0.9% [70.5±10.0 mmol/mol] [P<0.001], as did knowledge and self-care treatment adherence. The use of interactive telematic appointments in subjects with type 1 diabetes and inadequate metabolic control is an efficient strategy, providing results comparable to those of face-to-face appointments in relation to improvement in glycemic control, knowledge acquisition, and self-care treatment adherence, with a significant reduction in the time used, especially by patients.
Energy efficiency of task allocation for embedded JPEG systems.
Fan, Yang-Hsin; Wu, Jan-Ou; Wang, San-Fu
2014-01-01
Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT) to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.
Energy Efficiency of Task Allocation for Embedded JPEG Systems
2014-01-01
Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT) to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin. PMID:24982983
The ELISE II Project: A Digital Image Library for Europe.
ERIC Educational Resources Information Center
Strunz, Bob; Waters, Mairead
This paper describes the progress made under the ELISE II electronic image library project from a technical standpoint. The ELISE II project is a European-wide initiative that aims to provide a comprehensive electronic image library service for Europe. It is funded under the European Commission, DG XIII-E, Telematics for Libraries Initiative. The…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-15
... general area of Toyota and Ford's planned activity is the research and development of (a) A hybrid system initially targeted for use in sport utility vehicles and light trucks, and (b) standards and/ or enabling technologies for vehicle telematics. The parties may subsequently agree to expand the scope of the...
Dancing with the Web: Students Bring Meaning to the Semantic Web
ERIC Educational Resources Information Center
Brooks, Pauline
2012-01-01
This article will discuss the issues concerning the storage, retrieval and use of multimedia technology in dance, and how semantic web technologies can support those requirements. It will identify the key aims and outcomes of four international telematic dance projects, and review the use of reflective practice to engage students in their learning…
VREPAR 2: VR in eating disorders.
Riva, G; Bacchetta, M; Baruffi, M; Defrance, C; Gatti, F; Galimberti, C; Nugues, P; Ferretti, G S; Tonci, A
1999-01-01
Virtual Reality Environments for Psychoneurophysiological Assessment and Rehabilitation (VREPAR) are two European Community funded projects (Telematics for health-HC 1053/HC 1055-http://www.psicologia.net) whose aim is (a) to develop a PC based virtual reality system (PC-VRS) for the medical market that can be marketed at a price that is accessible to its possible endusers (hospitals, universities, and research centres) and that would have the modular, connectability and interoperability characteristics that the existing systems lack; and (b) to develop three hardware/software modules for the application of the PC-VRS in psychoneurophysiological assessment and rehabilitation. The chosen development areas are eating disorders (bulimia, anorexia, and obesity), movement disorders (Parkinson's disease and torsion dystonia), and stroke disorders (unilateral neglect and hemiparesis). In particular, the VREPAR 2 project is now testing the eating disorders module on a clinical sample.
NASA Astrophysics Data System (ADS)
Various papers on communications for the information age are presented. Among the general topics considered are: telematic services and terminals, satellite communications, telecommunications mangaement network, control of integrated broadband networks, advances in digital radio systems, the intelligent network, broadband networks and services deployment, future switch architectures, performance analysis of computer networks, advances in spread spectrum, optical high-speed LANs, and broadband switching and networks. Also addressed are: multiple access protocols, video coding techniques, modulation and coding, photonic switching, SONET terminals and applications, standards for video coding, digital switching, progress in MANs, mobile and portable radio, software design for improved maintainability, multipath propagation and advanced countermeasure, data communication, network control and management, fiber in the loop, network algorithm and protocols, and advances in computer communications.
A Human Systems Integration Approach to Energy Efficiency in Ground Transportation
2015-12-01
Granite Construction Organizational Structure .........................................53 Figure 7. A Comparison of USMC Structure to Granite Construction...Caterpillar Corporation and the implementation and use of their telematics systems within a company called Granite Construction. Granite Construction...profit over 250 million dollars annually. In addition, similar to the USMC, Granite Construction handles both large and small scale projects in a
ERIC Educational Resources Information Center
Skinner, Nigel C.; Preece, Peter F. W.
2003-01-01
Describes the AstraZeneca-Exeter Science through Telematics (AZEST) project and reports that the Internet has much potential as a communication channel for the provision and discussion of INSET materials for primary science in the UK. Evaluates websites dedicated to primary science at the local level, concept mapping for stimulating discussion,…
The WISECARE Project and the impact of information technology on nursing knowledge.
Sermeus, W; Hoy, D; Jodrell, N; Hyslop, A; Gypen, T; Kinnunen, J; Mantas, J; Delesie, L; Tansley, J; Hofdijk, J
1997-01-01
The European Union retained the WISECARE project "Work flow Information Systems for European nursing CARE" for funding. The project focuses on the use of telematics technology for clinical and resource management in oncology care in hospitals. This paper outlines the impact of introducing this kind of advanced nursing informatics application on the management of nursing knowledge. Three shift in knowledge management that will get high attention in WISECARE, are identified. The first is the shift from knowledge dissemination to knowledge sharing. The second is the shift from individual knowledge to organisational knowledge. The third is the shift from deductive, prescriptive knowledge as seen in guidelines, protocols to more inductive, experience based knowledge. The paper emphasizes that the real impact of information technology is not in the automation of existing processes but on the discovery of new ways of organisation and living.
EPIRUS-NET: A Wireless Health Telematics Network in Greece
2001-10-25
has also to be made. The system is represented of three basic layers: the database layer, the middleware and the Hospital Daily Progress Anamnesis ... Anamnesis . The Encounter entry is uniquely identified by the incremental ID, IID, attribute. Each encounter entry is associated with a clinical...the main entities of the system (Hospital, Patient, Anamnesis , Encounter, Clinical Examination, Daily Progress, Examination, Release Ticket), along
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sears, Edward B; Daley, Ryan; Helm, Matthew
The University of Connecticut (UCONN) is exploring the possibility of adding electric vehicles (EVs) - including battery electric vehicles (BEVs), plug-in hybrid electric vehicles (PHEVs), or both - to its vehicle fleet. This report presents results of the UCONN fleet EV Suitability pilot program and offers recommendations for transitioning fleet vehicles to EVs as well as implementing adequate charging infrastructure.
ERIC Educational Resources Information Center
Brodin, Jane; Bjorck-Akesson, Eva
This project studied the use of still picture telephones by four Swedish adults (ages 25-45) with profound mental retardation and additional severe disabilities. After 5 to 6 months of subjects employing still picture telephones on a regular basis in their daily lives, relatives, staff from group homes, and other caregivers completed…
Inventarisatie telematica-ontwikkelingen Natco (Inventory Telematics Developments Natco)
1998-05-01
telefonie, die binnen afzienbare tijd een bereikbaarheid over nagenoeg de gehele wereldbol kan garanderen. Ook hier is de koppeling van netwerken van...PCS is ’de mogelijkheid voor een gebruiker te communiceren in elke gewenste vorm, op elke tijd , op elke plaats en in verschillende rollen...wat betreft plaats, tijd en tempo van het leren, kan worden gerealiseerd. De toepassing van teleleren kan leiden tot een verbetering van de interne
Röhrig, R; Stausberg, J; Dugas, M
2013-01-01
The aim of this project is to develop a catalogue of competency-based learning objectives "Medical Informatics" for undergraduate medical education (abbreviated NKLM-MI in German). The development followed a multi-level annotation and consensus process. For each learning objective a reason why a physician needs this competence was required. In addition, each objective was categorized according to the competence context (A = covered by medical informatics, B = core subject of medical informatics, C = optional subject of medical informatics), the competence level (1 = referenced knowledge, 2 = applied knowledge, 3 = routine knowledge) and a CanMEDS competence role (medical expert, communicator, collaborator, manager, health advocate, professional, scholar). Overall 42 objectives in seven areas (medical documentation and information processing, medical classifications and terminologies, information systems in healthcare, health telematics and telemedicine, data protection and security, access to medical knowledge and medical signal-/image processing) were identified, defined and consented. With the NKLM-MI the competences in the field of medical informatics vital to a first year resident physician are identified, defined and operationalized. These competencies are consistent with the recommendations of the International Medical Informatics Association (IMIA). The NKLM-MI will be submitted to the National Competence-Based Learning Objectives for Undergraduate Medical Education. The next step is implementation of these objectives by the faculties.
Leis, A
2008-03-01
Modern communication and information technologies are ubiquitous nowadays, and the medical field is no exception. Telemedicine is a reasonable way to prevent accidents, communicate faster in an emergency, and improve medical care in the hospital. Home aftercare benefits from this development, too; the use of networks - started by the electronic health card - can help reduce costs. This article highlights these subjects and discusses national and international structures that promote the spread of health telematics. Barriers to this path are also shown.
NASA Astrophysics Data System (ADS)
Chakravarty, T.; Chowdhury, A.; Ghose, A.; Bhaumik, C.; Balamuralidhar, P.
2014-03-01
Telematics form an important technology enabler for intelligent transportation systems. By deploying on-board diagnostic devices, the signatures of vehicle vibration along with its location and time are recorded. Detailed analyses of the collected signatures offer deep insights into the state of the objects under study. Towards that objective, we carried out experiments by deploying telematics device in one of the office bus that ferries employees to office and back. Data is being collected from 3-axis accelerometer, GPS, speed and the time for all the journeys. In this paper, we present initial results of the above exercise by applying statistical methods to derive information through systematic analysis of the data collected over four months. It is demonstrated that the higher order derivative of the measured Z axis acceleration samples display the properties Weibull distribution when the time axis is replaced by the amplitude of such processed acceleration data. Such an observation offers us a method to predict future behaviour where deviations from prediction are classified as context-based aberrations or progressive degradation of the system. In addition we capture the relationship between speed of the vehicle and median of the jerk energy samples using regression analysis. Such results offer an opportunity to develop a robust method to model road-vehicle interaction thereby enabling us to predict such like driving behaviour and condition based maintenance etc.
Riva, G; Bacchetta, M; Baruffi, M; Borgomainerio, E; Defrance, C; Gatti, F; Galimberti, C; Fontaneto, S; Marchi, S; Molinari, E; Nugues, P; Rinaldi, S; Rovetta, A; Ferretti, G S; Tonci, A; Wann, J; Vincelli, F
1999-01-01
Due, in large part, to the significant advances in PC hardware that have been made over the last 3 years, PC-based virtual environments are approaching reality. Virtual Reality Environments for Psychoneurophysiological Assessment and Rehabilitation (VREPAR) are two European Community funded projects (Telematics for health-HC 1053/HC 1055, http:// www.psicologia.net) that are trying to develop a PC-based virtual reality system (PC-VRS) for the medical market that can be marketed at a price that is accessible to its possible endusers (hospitals, universities, and research centres) and that would have the modular, connectability, and interoperability characteristics that the existing systems lack. In particular, the projects are developing three hardware/software modules for the application of the PCVRS in psycho-neuro-physiological assessment and rehabilitation. The chosen development areas are eating disorders (bulimia, anorexia, and obesity), movement disorders (Parkinson's disease and torsion dystonia) and stroke disorders (unilateral neglect and hemiparesis). This article describes the rationale of the modules and the preliminary results obtained.
Baldwin, Carryl L; Struckman-Johnson, David
2002-01-15
Speech displays and verbal response technologies are increasingly being used in complex, high workload environments that require the simultaneous performance of visual and manual tasks. Examples of such environments include the flight decks of modern aircraft, advanced transport telematics systems providing invehicle route guidance and navigational information and mobile communication equipment in emergency and public safety vehicles. Previous research has established an optimum range for speech intelligibility. However, the potential for variations in presentation levels within this range to affect attentional resources and cognitive processing of speech material has not been examined previously. Results of the current experimental investigation demonstrate that as presentation level increases within this 'optimum' range, participants in high workload situations make fewer sentence-processing errors and generally respond faster. Processing errors were more sensitive to changes in presentation level than were measures of reaction time. Implications of these findings are discussed in terms of their application for the design of speech communications displays in complex multi-task environments.
Electronics for better healthcare.
Wolf, Bernhard; Herzog, Karolin
2013-06-01
Microelectronics and microsystem technology have changed our daily lives considerably in the past 50 years. Countless everyday objects contain microelectronic components. In healthcare up to the present, however, it has not been possible to make major alterations in introducing electronics and information technology that would lead to innovative improvements and greater transparency. This paper describes initial steps in diagnostics and oncological therapy including telematic healthcare systems which can, for example, assist patients with cardiovascular diseases and shows, through these areas, how electronics and microsystems technology can contribute to better healthcare.
eHealth services and Directive on Electronic Commerce 2000/31/EC.
Van Gyseghem, Jean-Marc
2008-01-01
We often restrict the analysis of eHealth services to a concept of privacy. In this article, we'll demonstrate that other legislation can apply to those services as Directive 2000/31/EC on Ecommerce. By creating telematic networks or infrastructure, eHealth services are offering information services. But what are the consequences with such concept? What are the duties and rights for the actors of the network(s)? We'll try to answer to some questions, even if it won't be exhaustive.
NASA Astrophysics Data System (ADS)
Silva, Augusto F. d.; Costa, Carlos; Abrantes, Pedro; Gama, Vasco; Den Boer, Ad
1998-07-01
This paper describes an integrated system designed to provide efficient means for DICOM compliant cardiac imaging archival, transmission and visualization based on a communications backbone matching recent enabling telematic technologies like Asynchronous Transfer Mode (ATM) and switched Local Area Networks (LANs). Within a distributed client-server framework, the system was conceived on a modality based bottom-up approach, aiming ultrafast access to short term archives and seamless retrieval of cardiac video sequences throughout review stations located at the outpatient referral rooms, intensive and intermediate care units and operating theaters.
'SON-GO-KU' : a dream of automated library
NASA Astrophysics Data System (ADS)
Sato, Mamoru; Kishimoto, Juji
In the process of automating libraries, the retrieval of books through the browsing of shelves is being overlooked. The telematic library is a document based DBMS which can deliver the content of books by simulating the browsing process. The retrieval actually simulates the process a person would use in selecting a book in a real library, where a visual presentation using a graphic display is substituted. The characteristics of prototype system "Son-Go-Ku" for such retrieval implemented in 1988 are mentioned.
Pérez Alonso, Nuria; Pardo Rios, Manuel; Juguera Rodriguez, Laura; Vera Catalan, Tomas; Segura Melgarejo, Francisca; Lopez Ayuso, Belen; Martí Nez Riquelme, Carolina; Lasheras Velasco, Joaquin
2017-11-01
Through a clinical simulation, this study aims to assess the effect of telematics support through Google Glass (GG) from an expert physician on performance of cardiopulmonary resuscitation (CPR) performed by a group of nurses, as compared with a control group of nurses receiving no assistance. This was a randomised study carried out at the Catholic University of Murcia (November 2014-February 2015). Nursing professionals from the Emergency Medical Services in Murcia (Spain) were asked to perform in a clinical simulation of cardiac arrest. Half of the nurses were randomly chosen to receive coaching from physicians through GG, while the other half did not receive any coaching (controls). The main outcome of the study expected was successful defibrillation, which restores sinus rhythm. Thirty-six nurses were enrolled in each study group. Statistically significant differences were found in the percentages of successful defibrillation (100% GG vs 78% control; p=0005) and CPR completion times: 213.91 s for GG and 250.31 s for control (average difference=36.39 s (95% CI 12.03 to 60.75), p=0.004). Telematics support by an expert through GG improves success rates and completion times while performing CPR in simulated clinical situations for nurses in simulated scenarios. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Valente, R; Cambiaso, F; Santori, G; Ghirelli, R; Gianelli, A; Valente, U
2004-04-01
In Italy, health-care telematic is funded and supported at the level of national government or regional institutions. In 1999, the Italian Ministry of Health started to fund the Liguria-Trento Transplant Network (LTTN) project, a health research project with the aim to build an informative system for donor management and transplantation activity in a macroregional area. At the time of LTTN project proposal, no published Transplant Network Informative System fulfilled Italian rules on telematic management of electronic documentation concerning transplantation activity. Partnership of LTTN project were two Regional Transplant Coordinating Centres, Nord Italia Transplant Interregional Coordinating Centre and the Italian Institute of Health/National Transplant Coordinating Centre. Project Total Quality Management methods were adopted. Technological and case analysis followed ANSI-HL7, CEN-TC251, and Object-Oriented Software Engineering standards. A low-tech prototype powered by a web access relational database is running on a transplant network including web-based clients located in 17 intensive care units, in Nord Italia Transplant Interregional Coordinating Centre, and at the Italian Institute of Health/National Transplant Coordinating Centre. LTTN registry includes pretransplant, surgical, and posttransplant phases regarding liver, kidney, pancreas, and kidney-pancreas transplantation in adult and pediatric recipients. Clinical specifications were prioritized in agreement with the RAND/UCLA appropriateness method. Further implementation will include formal rules for data access and output release, fault tolerance, and a continuous registry evolution plan.
A communication-theory based view on telemedical communication.
Schall, Thomas; Roeckelein, Wolfgang; Mohr, Markus; Kampshoff, Joerg; Lange, Tim; Nerlich, Michael
2003-01-01
Communication theory based analysis sheds new light on the use of health telematics. This analysis of structures in electronic medical communication shows communicative structures with special features. Current and evolving telemedical applications are analyzed. The methodology of communicational theory (focusing on linguistic pragmatics) is used to compare it with its conventional counterpart. The semiotic model, the roles of partners, the respective message and their relation are discussed. Channels, sender, addressee, and other structural roles are analyzed for different types of electronic medical communication. The communicative processes are shown as mutual, rational action towards a common goal. The types of communication/texts are analyzed in general. Furthermore the basic communicative structures of medical education via internet are presented with their special features. The analysis shows that electronic medical communication has special features compared to everyday communication: A third participant role often is involved: the patient. Messages often are addressed to an unspecified partner or to an unspecified partner within a group. Addressing in this case is (at least partially) role-based. Communication and message often directly (rather than indirectly) influence actions of the participants. Communication often is heavily regulated including legal implications like liability, and more. The conclusion from the analysis is that the development of telemedical applications so far did not sufficiently take communicative structures into consideration. Based on these results recommendations for future developments of telemedical applications/services are given.
Noelle, G; Dudeck, J
1999-01-01
Two years, since the World Wide Web Consortium (W3C) has published the first specification of the eXtensible Markup Language (XML) there exist some concrete tools and applications to work with XML-based data. In particular, new generation Web browsers offer great opportunities to develop new kinds of medical, web-based applications. There are several data-exchange formats in medicine, which have been established in the last years: HL-7, DICOM, EDIFACT and, in the case of Germany, xDT. Whereas communication and information exchange becomes increasingly important, the development of appropriate and necessary interfaces causes problems, rising costs and effort. It has been also recognised that it is difficult to define a standardised interchange format, for one of the major future developments in medical telematics: the electronic patient record (EPR) and its availability on the Internet. Whereas XML, especially in an industrial environment, is celebrated as a generic standard and a solution for all problems concerning e-commerce, in a medical context there are only few applications developed. Nevertheless, the medical environment is an appropriate area for building XML applications: as the information and communication management becomes increasingly important in medical businesses, the role of the Internet changes quickly from an information to a communication medium. The first XML based applications in healthcare show us the advantage for a future engagement of the healthcare industry in XML: such applications are open, easy to extend and cost-effective. Additionally, XML is much more than a simple new data interchange format: many proposals for data query (XQL), data presentation (XSL) and other extensions have been proposed to the W3C and partly realised in medical applications.
Mobile-health: A review of current state in 2015.
Silva, Bruno M C; Rodrigues, Joel J P C; de la Torre Díez, Isabel; López-Coronado, Miguel; Saleem, Kashif
2015-08-01
Health telematics is a growing up issue that is becoming a major improvement on patient lives, especially in elderly, disabled, and chronically ill. In recent years, information and communication technologies improvements, along with mobile Internet, offering anywhere and anytime connectivity, play a key role on modern healthcare solutions. In this context, mobile health (m-Health) delivers healthcare services, overcoming geographical, temporal, and even organizational barriers. M-Health solutions address emerging problems on health services, including, the increasing number of chronic diseases related to lifestyle, high costs of existing national health services, the need to empower patients and families to self-care and handle their own healthcare, and the need to provide direct access to health services, regardless of time and place. Then, this paper presents a comprehensive review of the state of the art on m-Health services and applications. It surveys the most significant research work and presents a deep analysis of the top and novel m-Health services and applications proposed by industry. A discussion considering the European Union and United States approaches addressing the m-Health paradigm and directives already published is also considered. Open and challenging issues on emerging m-Health solutions are proposed for further works. Copyright © 2015 Elsevier Inc. All rights reserved.
REVIEW ARTICLE: Sensors for automotive telematics
NASA Astrophysics Data System (ADS)
Turner, J. D.; Austin, L.
2000-02-01
This article reviews the current practice in sensors and sensor applications for automotive and traffic-control systems. Sensors to control engine fuelling, ignition and transmission (known as the powertrain) are reviewed and the likely course of future development is discussed in the light of regulatory and market requirements as well as trends in sensor design and manufacture. Sensor needs for suspension, braking and control of traction are also reviewed and the likely introduction of wheel and tyre sensors to enhance driving safety is discussed. The recent trend towards vehicle-mounted devices to sense the vehicle's environment (such as radar, optical, ultrasound, capacitive and image-based systems) and the implications of the introduction of safety-critical automotive systems such as adaptive cruise control are discussed. Sensors for initiating the deployment of safety systems such as airbags, together with transducers for disconnecting fuel pumps and vehicle batteries in the event of a crash, are reviewed. The paper includes a brief discussion of highway-based sensors for measuring vehicle speed and presence and concludes with a discussion of the likely future developments in the field.
Information and communication systems for the assistance of carers based on ACTION.
Kraner, M; Emery, D; Cvetkovic, S R; Procter, P; Smythe, C
1999-01-01
Recent advances in telecommunication technologies allow the design of information and communication systems for people who are caring for others in the home as family members or as professionals in the health or community centres. The present paper analyses and classifies the information flow and maps it to an information life cycle, which governs the design of the deployed hardware, software and the data-structure. This is based on the initial findings of ACTION (assisting carers using telematics interventions to meet older persons' needs) a European Union funded project. The proposed information architecture discusses different designs such as centralized or decentralized Web and Client server solutions. A user interface is developed reflecting the special requirements of the targeted user group, which influences the functionality and design of the software, data architecture and the integrated communication system using video-conferencing. ACTION has engineered a system using plain Web technology based on HTML, extended with JavaScript and ActiveX and a software switch enabling the integration of different types of videoconferencing and other applications providing manufacturer independence.
NASA Astrophysics Data System (ADS)
Muna, Joseph T.; Prescott, Kevin
2011-08-01
Traditionally, freight transport and telematics solutions that exploit the GPS capabilities of in- vehicle devices to provide innovative Location Based Services (LBS) including track and trace transport systems have been the preserve of a select cluster of transport operators and organisations with the financial resources to develop the requisite custom software and hardware on which they are deployed. The average cost of outfitting a typical transport vehicle or truck with the latest Intelligent Transport System (ITS) increases the cost of the vehicle by anything from a couple to several thousand Euros, depending on the complexity and completeness of the solution. Though this does not generally deter large fleet transport owners since they typically get Return on Investment (ROI) based on economies of scale, it presents a barrier for the smaller independent entities that constitute the majority of freight transport operators [1].The North Sea Freight Intelligent Transport Solution (NS FRITS), a project co-funded by the European Commission Interreg IVB North Sea Region Programme, aims to make acquisition of such transport solutions easier for those organisations that cannot afford the expensive, bespoke systems used by their larger competitors.The project addresses transport security threats by developing a system capable of informing major actors along the freight logistics supply chain, of changing circumstances within the region's major transport corridors and between transport modes. The project also addresses issues of freight volumes, inter-modality, congestion and eco-mobility [2].
Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs
Islam, Md. Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386
[Telemedicine in Germany. Status, Barriers, Perspectives].
Brauns, H-J; Loos, Wolfgang
2015-10-01
Telemedicine as a subject has reached politics, doctors and patients, but it has still not been able to make the leap from research, development, and testing into real practice. This is generally because of the great barriers to implementation, mainly the lack of telematics infrastructure and of payment regulations in Germany. Telemedicine projects are mainly isolated applications and it has not been possible to integrate them in to nationwide regular health services. Other challenges along the path to standard care include that research-based small-medium enterprise (SME) companies usually face high barriers hindering access to this market, because it is imposible for them to finance all the required evidence-based studies to verify the medical benefits and the econimic efficiency. Additionally, a high market nontransparency is noted. However, the signs of progress are visible, e.g., the E-health initiative of the German government or recent legislative initiatives. However, long processes are observed that do not facilitate the use of telemedicine. Although some federal states, e.g., North Rhine Westphalia, Bavaria, Mecklenburg-Western Pomerania, and Saxony, show exemplary activities, there are still many white areas on the telemedicine map of Germany. The road to standard care will be long, but is not unattainable. The reasons for supporting telemedicine are still strong. The future development of telemedicine applications will contribute to sustainable and high-quality patient care in Germany.
Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.
Islam, Md Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.
Optimizing Security of Cloud Computing within the DoD
2010-12-01
information security governance and risk management; application security; cryptography; security architecture and design; operations security; business ...governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity...20 7. Operational Security (OPSEC).........................................................20 8. Business Continuity Planning (BCP) and Disaster
Computer applications in the search for unrelated stem cell donors.
Müller, Carlheinz R
2002-08-01
The majority of patients which are eligible for a blood stem cell transplantation from an allogeneic donor do not have a suitable related donor so that an efficient unrelated donor search is a prerequisite for this treatment. Currently, there are over 7 million volunteer donors in the files of 50 registries in the world and in most countries the majority of transplants are performed from a foreign donor. Evidently, computer and communication technology must play a crucial role in the complex donor search process on the national and international level. This article describes the structural elements of the donor search process and discusses major systematic and technical issues to be addressed in the development and evolution of the supporting telematic systems. The theoretical considerations are complemented by a concise overview over the current state of the art which is given by describing the scope, relevance, interconnection and technical background of three major national and international computer appliances: The German Marrow Donor Information System (GERMIS) and the European Marrow Donor Information System (EMDIS) are interoperable business-to-business e-commerce systems and Bone Marrow Donors World Wide (BMDW) is the basic international donor information desk on the web.
Ad-Hoc Networks and the Mobile Application Security System (MASS)
2006-01-01
solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems
An open, component-based information infrastructure for integrated health information networks.
Tsiknakis, Manolis; Katehakis, Dimitrios G; Orphanoudakis, Stelios C
2002-12-18
A fundamental requirement for achieving continuity of care is the seamless sharing of multimedia clinical information. Different technological approaches can be adopted for enabling the communication and sharing of health record segments. In the context of the emerging global information society, the creation of and access to the integrated electronic health record (I-EHR) of a citizen has been assigned high priority in many countries. This requirement is complementary to an overall requirement for the creation of a health information infrastructure (HII) to support the provision of a variety of health telematics and e-health services. In developing a regional or national HII, the components or building blocks that make up the overall information system ought to be defined and an appropriate component architecture specified. This paper discusses current international priorities and trends in developing the HII. It presents technological challenges and alternative approaches towards the creation of an I-EHR, being the aggregation of health data created during all interactions of an individual with the healthcare system. It also presents results from an ongoing Research and Development (R&D) effort towards the implementation of the HII in HYGEIAnet, the regional health information network of Crete, Greece, using a component-based software engineering approach. Critical design decisions and related trade-offs, involved in the process of component specification and development, are also discussed and the current state of development of an I-EHR service is presented. Finally, Human Computer Interaction (HCI) and security issues, which are important for the deployment and use of any I-EHR service, are considered.
Systematic Development of Intelligent Systems for Public Road Transport.
García, Carmelo R; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Alayón, Francisco
2016-07-16
This paper presents an architecture model for the development of intelligent systems for public passenger transport by road. The main objective of our proposal is to provide a framework for the systematic development and deployment of telematics systems to improve various aspects of this type of transport, such as efficiency, accessibility and safety. The architecture model presented herein is based on international standards on intelligent transport system architectures, ubiquitous computing and service-oriented architecture for distributed systems. To illustrate the utility of the model, we also present a use case of a monitoring system for stops on a public passenger road transport network.
Systematic Development of Intelligent Systems for Public Road Transport
García, Carmelo R.; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Alayón, Francisco
2016-01-01
This paper presents an architecture model for the development of intelligent systems for public passenger transport by road. The main objective of our proposal is to provide a framework for the systematic development and deployment of telematics systems to improve various aspects of this type of transport, such as efficiency, accessibility and safety. The architecture model presented herein is based on international standards on intelligent transport system architectures, ubiquitous computing and service-oriented architecture for distributed systems. To illustrate the utility of the model, we also present a use case of a monitoring system for stops on a public passenger road transport network. PMID:27438836
Security issues in healthcare applications using wireless medical sensor networks: a survey.
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458
Code of Federal Regulations, 2011 CFR
2011-04-01
... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...
Code of Federal Regulations, 2010 CFR
2010-04-01
... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Application. 200.602 Section 200.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT... Programs or Activities Conducted by the Securities and Exchange Commission § 200.602 Application. This...
Code of Federal Regulations, 2011 CFR
2011-04-01
... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...
Code of Federal Regulations, 2010 CFR
2010-04-01
... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...
17 CFR 201.193 - Applications by barred individuals for consent to associate.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Applications by barred individuals for consent to associate. 201.193 Section 201.193 Commodity and Securities Exchanges SECURITIES... securities dealers, government securities brokers, government securities dealers, investment advisers...
49 CFR 1572.9 - Applicant information required for HME security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... threat assessment. 1572.9 Section 1572.9 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.9 Applicant information required for HME security threat assessment. An applicant must supply the information...
Development and Application of Skill Standards for Security Practitioners
2006-07-01
Development and Application of Skill Standards for Security Practitioners Henry K. Simpson Northrop Grumman Technical Services Lynn F. Fischer...and Application of Skill Standards for Security Practitioners Henry K. Simpson, Northrop Grumman Technical Services Lynn F. Fischer, Defense...described in the present report was driven by a JSTC tasking to develop skill standards for security practitioners in seven different security
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 4 2012-04-01 2012-04-01 false Application for security deposit...' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Application for security deposit...' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Application for security deposit... AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other requirements. (a) Each...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...
SERENITY Aware System Development Process
NASA Astrophysics Data System (ADS)
Serrano, Daniel; Maña, Antonio; Llarena, Rafael; Crespo, Beatriz Gallego-Nicasio; Li, Keqin
Traditionally, security patterns have successfully been used to describe security and dependability. In the SERENITY Project the notion of security and dependability (S&D) pattern has been extended to exact specifications of re-usable security mechanisms for Ambient Intelligence (AmI) systems. These S&D Patterns include information on the security properties satisfied by the solution and on the context conditions to be fulfilled. This chapter presents the development of applications supported by SERENITY. In the context of SERENITY we refer to these applications as Serenity-aware applications. Firstly, this chapter presents the Serenity-aware application design using S&D Artefacts. Secondly, it proposes a Java Application Programming Interface (API) to be used in the application development. And, finally, it introduces the development of an example Serenity-aware application.
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
SysTerN. A nursing terminology system based on ICNP.
Alecu, S; Moisil, I; Jitaru, E
1999-01-01
This paper is presenting a terminology system for nursing--SysTerN--that is based on the ICNP1 classification. SysTerN has been developed using the framework of the TeleNurse ID-ENTITY Telematics for Health EU project as a support for the dissemination actions carried on by CCSSDM (Center for Health Computing Statistics and Medical Documentation of the Romanian Ministry of Health) for Romania and other Central Eastern European countries. Currently, the terminology system uses the alpha version of ICNP, but this version is going to be replaced by the beta version. SysTerN is designed primarily for Romanian users but an English version is also available for other partners from CEE countries.
E-learning for assistive technology professionals--a review of the TELEMATE project.
Turner-Smith, Alan; Devlin, Aisling
2005-09-01
The Telematic Multidisciplinary Assistive Technology Education project (TELEMATE) was conducted during 1998-2001 by a consortium of seven European organisations involved in rehabilitation engineering and education. Assistive technology professionals work in a rapidly developing field but are few in number and widely dispersed, therefore, electronic delivery of their education is particularly advantageous. TELEMATE took existing concepts and standards in education to create and test an e-learning framework. As well as providing an appropriate learning environment, the aim was to share teaching resources and encourage a sound and consistent understanding of assistive technology across the European Union. This paper explores work carried out and the subsequent outcomes of the project.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
17 CFR 229.1122 - (Item 1122) Compliance with applicable servicing criteria.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1122) Compliance with applicable servicing criteria. 229.1122 Section 229.1122 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES...
17 CFR 229.1122 - (Item 1122) Compliance with applicable servicing criteria.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 1122) Compliance with applicable servicing criteria. 229.1122 Section 229.1122 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES...
20 CFR 404.611 - How do I file an application for Social Security benefits?
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...
20 CFR 404.611 - How do I file an application for Social Security benefits?
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...
20 CFR 404.611 - How do I file an application for Social Security benefits?
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...
20 CFR 404.611 - How do I file an application for Social Security benefits?
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...
20 CFR 404.611 - How do I file an application for Social Security benefits?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...
6 CFR 11.1 - General application.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false General application. 11.1 Section 11.1 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.1 General application. (a) Application of Debt Collection Standards. The provisions of 31 CFR parts 285, 900-904, as amended by the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-15
... 1974; Department of Homeland Security/ALL--032 Official Passport Application and Maintenance Records.../ ALL--032 Official Passport Application and Maintenance Records System of Records.'' This system of... passport application or maintenance record on Department of Homeland Security employees and former...
6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Procedures for certification of approved products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... application for renewal must be made using the “Application for Certification of an Approved Product for...
Restricted access processor - An application of computer security technology
NASA Technical Reports Server (NTRS)
Mcmahon, E. M.
1985-01-01
This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
Smart Cards and remote entrusting
NASA Astrophysics Data System (ADS)
Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad
Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.
Design and development of a multimedia database for emergency telemedicine.
Pavlopoulos, S; Berler, A; Kyriacou, E; Koutsouris, D
1998-09-01
Recent studies conclude that early and specialised pre-hospital patient management contributes to emergency cases survival. Recent developments in telecommunication and medical informatics by means of telemedicine can be extremely useful to accomplish such tasks in a cost-effective manner. Along that direction, we have designed a portable device for emergency telemedicine. This device is able to telematically "bring" the expert doctor at the emergency site, have him perform an accurate diagnosis, and subsequently direct the Emergency Medical Technicians on how to treat the patient until he arrives to the hospital. The need for storing and archiving all data being interchanged during the telemedicine sessions is very crucial for clinical, legal and administrative purposes. For this, we have developed a multimedia database able to store and manage the data collected by the AMBULANCE system. The database was equipped with a user-friendly graphical interface to enable use from computer naive users. Furthermore, the database has the possibility to display, in an standard way, ECG's, X-ray, CT and MRI images. The application is password protected with a three-level hierarchy access for users with different privileges. The scope of this application is to enhance the capabilities of the doctor on duty for a more precise and prompt diagnosis. The application has the ability to store audio files related to each emergency case and still images of the scene. Finally, this database can become a useful multimedia tool which will work together with the AMBULANCE portable device, the HIS and the PACS of the hospital. The system has been validated in selected non-critical cases and proved to be functional and successful in enhancing the ability of the doctor's on duty for prompt and accurate diagnosis and specialised pre-hospital treatment.
A telemedicine support for diabetes management: the T-IDDM project.
Bellazzi, R; Larizza, C; Montani, S; Riva, A; Stefanelli, M; d'Annunzio, G; Lorini, R; Gomez, E J; Hernando, E; Brugues, E; Cermeno, J; Corcoy, R; de Leiva, A; Cobelli, C; Nucci, G; Del Prato, S; Maran, A; Kilkki, E; Tuominen, J
2002-08-01
In the context of the EU funded Telematic Management of Insulin-Dependent Diabetes Mellitus (T-IDDM) project, we have designed, developed and evaluated a telemedicine system for insulin dependent diabetic patients management. The system relies on the integration of two modules, a Patient Unit (PU) and a Medical Unit (MU), able to communicate over the Internet and the Public Switched Telephone Network. Using the PU, patients are allowed to automatically download their monitoring data from the blood glucose monitoring device, and to send them to the hospital data-base; moreover, they are supported in their every day self monitoring activity. The MU provides physicians with a set of tools for data visualization, data analysis and decision support, and allows them to send messages and/or therapeutic advice to the patients. The T-IDDM service has been evaluated through the application of a formal methodology, and has been used by European patients and physicians for about 18 months. The results obtained during the project demonstration, even if obtained on a pilot study of 12 subjects, show the feasibility of the T-IDDM telemedicine service, and seem to substantiate the hypothesis that the use of the system could present an advantage in the management of insulin dependent diabetic patients, by improving communications and, potentially, clinical outcomes.
Assessment of Telemedicine in Surgical Education and Patient Care
Demartines, Nicolas; Mutter, Didier; Vix, Michel; Leroy, Joël; Glatz, Dieter; Rösel, Fritz; Harder, Felix; Marescaux, Jacques
2000-01-01
Objective To analyze the value of teleconferencing for patient care and surgical education by assessing the activity of an international academic network. Summary Background Data The uses of telemedicine include teleeducation, training, and consulting, and surgical teams are now involved, sharing diagnostic information and opinions without the need for travel. However, the value of telematics in surgery remains to be assessed. Methods During a 2-year period, weekly surgical teleconferences were held among six university hospitals in four European countries. To assess the accuracy of telediagnosis for surgical cases, 60 randomly selected cases were analyzed by a panel of surgeons. Participants’ opinions were analyzed by questionnaire. Results Seventy teleconferences (50 lectures and 271 case presentations) were held. Ninety-five of the 114 participants (83.3%) completed the final questionnaire. Eighty-six percent rated the surgical activity as good or excellent, 75.7% rated the scientific level as good or excellent, 55.8% rated the daily clinical activity as good or excellent, and 28.4% rated the manual surgical technique as good or excellent. The target organ was identified in all the cases; the organ structure and pathology were considered well defined in 93.3%, and the fine structure was considered well defined in 58.3%. Diagnosis was accurate in 17 cases (28.3%), probable in 25 (41.7%), possible but uncertain in 16 (26.7%), and not possible in 2 cases (3.3%). Discussion among the remote sites increased the rate of valuable therapeutic advice from 55% of cases before the discussion to 95% after the discussion. Eighty-six percent of the surgeons expressed satisfaction with telematics for medical education and patient care. Conclusions Participant satisfaction was high, transmission of clinical documents was accurate, and the opportunity to discuss case documentation and management significantly improved diagnostic potential, resulting in an accuracy rate of up to 95%. Teleeducation and teleconsultation in surgery appear to be beneficial. PMID:10674622
49 CFR 1522.107 - Application.
Code of Federal Regulations, 2010 CFR
2010-10-01
... security threat assessments. (8) A statement acknowledging that all personnel of the applicant who must successfully complete a security threat assessment under the requirements of this part must do so before the... the Security Coordinator successfully completes a security threat assessment, TSA will provide to the...
5 CFR 844.201 - General requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... withdrawal of an application for social security disability benefits. (c) An agency may consider the... the Social Security Act; or (ii) An official statement from the Social Security Administration that... Social Security Act. (2) A disability retirement application under this part will be dismissed when OPM...
12 CFR 19.121 - Application for exemption.
Code of Federal Regulations, 2014 CFR
2014-01-01
... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...
12 CFR 19.121 - Application for exemption.
Code of Federal Regulations, 2010 CFR
2010-01-01
... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...
12 CFR 19.121 - Application for exemption.
Code of Federal Regulations, 2012 CFR
2012-01-01
... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...
12 CFR 19.121 - Application for exemption.
Code of Federal Regulations, 2011 CFR
2011-01-01
... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...
12 CFR 19.121 - Application for exemption.
Code of Federal Regulations, 2013 CFR
2013-01-01
... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...
Teaching Web Security Using Portable Virtual Labs
ERIC Educational Resources Information Center
Chen, Li-Chiou; Tao, Lixin
2012-01-01
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Development of a Secure Mobile GPS Tracking and Management System
ERIC Educational Resources Information Center
Liu, Anyi
2012-01-01
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
17 CFR 201.510 - Temporary cease-and-desist orders: Application process.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...
17 CFR 201.510 - Temporary cease-and-desist orders: Application process.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...
17 CFR 201.510 - Temporary cease-and-desist orders: Application process.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...
17 CFR 240.6a-2 - Amendments to application.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
17 CFR 240.6a-2 - Amendments to application.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
17 CFR 240.6a-2 - Amendments to application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30134; 812-14005] AmericaFirst Quantitative Trust and AmericaFirst Securities, Inc.; Notice of Application July 10, 2012. AGENCY...: AmericaFirst Quantitative Trust (the ``AmericaFirst Trust'') and AmericaFirst Securities, Inc. (``AFSI...
49 CFR 1515.3 - Terms used in this part.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... Applicant means an individual who has applied for one of the security threat assessments identified in 49... for the security threat assessment but TSA later determined that the individual poses a security.... Security threat assessment means the threat assessment for which the applicant has applied, as described in...
Multimedia Security System for Security and Medical Applications
ERIC Educational Resources Information Center
Zhou, Yicong
2010-01-01
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... and Annual Fee Applicable to Derivative Securities Products January 12, 2010. On November 24, 2009... Services (``Fee Schedule'') to revise the listing and annual fees applicable to Derivative Securities... Schedule, the term ``Derivative Securities Products'' includes securities described in NYSE Arca Equities...
2010-06-01
CLOTHES: THE CASE FOR BROADER APPLICATION OF RED TEAMING WITHIN HOMELAND SECURITY by A. Bentley Nettles June 2010 Thesis Advisor...Red Teaming Within Homeland Security 6. AUTHOR(S) A. Bentley Nettles 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...APPLICATION OF RED TEAMING WITHIN HOMELAND SECURITY A. Bentley Nettles Colonel, United States Army B.A., Texas A&M University, 1985 J.D. South
The Conception Approach to the Traffic Control in Czech Cities - Examples from Prague
NASA Astrophysics Data System (ADS)
Tichý, Tomáš; Krajčír, Dušan
Modern and economic development of contemporary towns is without question highly dependent upon traffic infrastructure progress. Automobile transport intensity is dramatically rising in large towns and other Czech and European cities. At the same time number of traffic congestions and accidents is increasing, standing times are becoming longer and ecological stress is also escalated. To solve this situation seems to be the most effective solution to design intelligent traffic light intersection control system, variable message signs, preference of public transportation, road line traffic control and next telematics subsystems. This control system and subsystems should improve permeability of traffic road network with a respect for all demands on recent trends of traffic development in towns and regions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form MSD, application for... of Municipal Securities Dealers § 249.1100 Form MSD, application for registration as a municipal... Exchange Act of 1934 (the “Act”), or to amend such application. Note: Copies of Form MSD have been filed...
12 CFR 350.12 - Disclosure required by applicable banking or securities law or regulations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Disclosure required by applicable banking or securities law or regulations. 350.12 Section 350.12 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... STATE NONMEMBER BANKS § 350.12 Disclosure required by applicable banking or securities law or...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
48 CFR 339.7102 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability. Contracting Officers are responsible for ensuring that all information technology acquisitions comply with the Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...
48 CFR 339.7102 - Applicability.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...
48 CFR 339.7102 - Applicability.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...
48 CFR 339.7102 - Applicability.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...
48 CFR 339.7102 - Applicability.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...
A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications.
Bao, Shu-Di; Chen, Meng; Yang, Guang-Zhong
2017-11-01
A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet-based applications and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally and the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks.
Gulacti, Umut; Lok, Ugur
2017-07-19
Consultation, the process of an Emergency Physician seeking an opinion from other specialties, occurs frequently in the Emergency Department (ED). The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time. We conducted a prospective, randomized controlled trial in the ED using allocation concealment over three months. Consultations requested in the ED were allocated into two groups: consultations requested via the secure messaging application and consultations requested by telephone as verbal. A total of 439 consultations requested in the ED were assessed for eligibility and 345 were included in the final analysis: 173 consultations were conducted using secure messaging application and 172 consultations were conducted using standard telephone communications. The median ED LOS was 240 minutes (IQR:230-270, 95% CI:240 to 255.2) for patients in the secure messaging application group and 277 minutes (IQR:270-287.8, 95% CI:277 to 279) for patients in the telephone group. The median total ED LOS was significantly lower among consults conducted using Secure messaging application relative to consults conducted by telephone (median dif: -30, 95%CI:-37to-25, p<0.0001). The median consult time was 158 minutes (IQR:133 to 177.25, 95% CI:150 to 169) for patients in the Secure messaging application group and 170 minutes (IQR:165 to 188.5, 95% CI:170-171) for patients in the Telephone group (median dif: -12, 95%CI:-19 to-7,p<0.0001). Consultations completed without ED arrival was 61.8% in the secure messaging group and 33.1% in the Telephone group (dif: 28.7, 95% CI:48.3 to 66, p<0.001). Use of secure messaging application for consultations in the ED reduces the total ED LOS and consultation time. Consultation with secure messaging application eliminated more than half of in-person ED consultation visits.
An E-Hospital Security Architecture
NASA Astrophysics Data System (ADS)
Tian, Fang; Adams, Carlisle
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.
Applications of spatially offset Raman spectroscopy to defense and security
NASA Astrophysics Data System (ADS)
Guicheteau, Jason; Hopkins, Rebecca
2016-05-01
Spatially offset Raman spectroscopy (SORS) allows for sub-surface and through barrier detection and has applications in drug analysis, cancer detection, forensic science, as well as defense and security. This paper reviews previous efforts in SORS and other through barrier Raman techniques and presents a discussion on current research in defense and security applications.
20 CFR 217.7 - Claim filed with the Social Security Administration.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...
20 CFR 217.7 - Claim filed with the Social Security Administration.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...
20 CFR 217.7 - Claim filed with the Social Security Administration.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...
20 CFR 217.7 - Claim filed with the Social Security Administration.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...
20 CFR 217.7 - Claim filed with the Social Security Administration.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application for registration of non-bank municipal securities dealers whose business is exclusively intrastate. 240.15Ba2-2... registration of non-bank municipal securities dealers whose business is exclusively intrastate. (a) An...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2012 CFR
2012-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2013 CFR
2013-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2014 CFR
2014-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
Code of Federal Regulations, 2010 CFR
2010-04-01
... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...
Code of Federal Regulations, 2011 CFR
2011-04-01
... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...
A Component-Based Approach for Securing Indoor Home Care Applications
Estévez, Elisabet
2017-01-01
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public’s confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home. PMID:29278370
A Component-Based Approach for Securing Indoor Home Care Applications.
Agirre, Aitor; Armentia, Aintzane; Estévez, Elisabet; Marcos, Marga
2017-12-26
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public's confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.
Technology Requirements and Selection for Securely Partitioning OBSW
NASA Astrophysics Data System (ADS)
Mendham, Peter; Windsor, James; Eckstein, Knut
2010-08-01
The Securely Partitioning Spacecraft Computing Resources project is a current ESA TRP activity investigating the application of secure time and space partitioning (TSP) technologies to enable multi-use missions from a single platform. Secure TSP technologies are used in a number of application areas outside the space domain and an opportunity exists to 'spin-in' a suitable solution. The selection of a technology for use within space the European space industry relies on an understanding of the requirements for the application of secure TSP, of which this paper presents a summary. Further, the paper outlines the selection process taken by the project and highlights promising solutions for use today.
Application of the JDL data fusion process model for cyber security
NASA Astrophysics Data System (ADS)
Giacobe, Nicklaus A.
2010-04-01
A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.
1997-11-01
This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSImore » addressed some of these issues to create a more manageable public key infrastructure.« less
Cha, Shi-Cho; Chen, Jyun-Fu
2017-01-01
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900
Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu
2017-10-14
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
17 CFR 200.551 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Applicability. 200.551 Section 200.551 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1984-01-01
The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
...; (b) The term ``Auction Rate Security'' or ``ARS'' means a security: (1) That is either a debt... Securities (ARS). The applicant describes ARS and the arrangement by which ARS are bought and sold as follows. ARS are securities (issued as debt or preferred stock) with an interest rate or dividend that is reset...
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-01-01
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
A Test-Bed of Secure Mobile Cloud Computing for Military Applications
2016-09-13
searching databases. This kind of applications is a typical example of mobile cloud computing (MCC). MCC has lots of applications in the military...Release; Distribution Unlimited UU UU UU UU 13-09-2016 1-Aug-2014 31-Jul-2016 Final Report: A Test-bed of Secure Mobile Cloud Computing for Military...Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Test-bed, Mobile Cloud Computing , Security, Military Applications REPORT
Security model for VM in cloud
NASA Astrophysics Data System (ADS)
Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.
2013-03-01
Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.
Routing architecture and security for airborne networks
NASA Astrophysics Data System (ADS)
Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato
2009-05-01
Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... , Director of Central Intelligence Directive (DCID) 1/14 2 and regulations of the National Security Agency. 1... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION General Provisions § 154.2 Applicability. (a) This part implements the...
76 FR 60100 - The Singapore Fund, Inc.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-28
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29817; 812-13944] The Singapore Fund, Inc.; Notice of Application September 22, 2011. AGENCY: Securities and Exchange Commission.... ADDRESSES: Secretary, Securities and Exchange Commission, 100 F Street, NE., Washington, DC 20549-1090...
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
Develop 3G Application with The J2ME SATSA API
NASA Astrophysics Data System (ADS)
JunWu, Xu; JunLing, Liang
This paper describes research in the use of the Security and Trust Services API for J2ME (SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2ME applications to communicate with and access functionality, secure storage and cryptographic operations provided by security elements such as smart cards and Wireless Identification Modules (WIM). A Java Card application could also work as an authentication module in a J2ME-based e-bank application. The e-bank application would allow its users to access their bank accounts using their cell phones.
LISA, the next generation: from a web-based application to a fat client.
Pierlet, Noëlla; Aerts, Werner; Vanautgaerden, Mark; Van den Bosch, Bart; De Deurwaerder, André; Schils, Erik; Noppe, Thomas
2008-01-01
The LISA application, developed by the University Hospitals Leuven, permits referring physicians to consult the electronic medical records of their patients over the internet in a highly secure way. We decided to completely change the way we secured the application, discard the existing web application and build a completely new application, based on the in-house developed hospital information system, used in the University Hospitals Leuven. The result is a fat Java client, running on a Windows Terminal Server, secured by a commercial SSL-VPN solution.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...
The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks
NASA Astrophysics Data System (ADS)
Turkanović, Muhamed; Hölbl, Marko
2014-10-01
Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of the applicative use of quantum principles in WSN. The outcome of the analysis elaborates a summary about the inadequacy of applicative use of quantum cryptography in WSN and presents an overview of all possible applicative challenges and problems while designing quantum-based security systems for WSN. Since WSNs are highly complex frameworks, with many restrictions and constraints, every security system has to be fully compatible and worthwhile. The aim of the paper was to contribute a verdict about this topic, backed up by equitable facts.
20 CFR 416.325 - When an application is considered filed.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...
20 CFR 416.325 - When an application is considered filed.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...
20 CFR 416.325 - When an application is considered filed.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...
20 CFR 416.325 - When an application is considered filed.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...
20 CFR 416.325 - When an application is considered filed.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...
20 CFR 416.315 - Who may sign an application.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Who may sign an application. 416.315 Section 416.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.315 Who may sign an application. We will...
Code of Federal Regulations, 2011 CFR
2011-04-01
... such security future is a stock, the product of the daily settlement price of such security future as shown by any regularly published reporting or quotation service, and the applicable number of shares per... regulations applicable to financial relations between a security futures intermediary and a customer with...
49 CFR 1540.201 - Applicability and terms used in this subpart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Applicability and terms used in this subpart. 1540.201 Section 1540.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69477; File No. 81-939] Notice of an Application of W2007 Grace Acquisition I, Inc. Under Section 12(h) of the Securities Exchange Act of 1934 April 30, 2013. The Securities and Exchange Commission gives notice that W2007 Grace Acquisition I, Inc...
Zywietz, Christoph
2004-01-01
The evolution of information technology and of telematics and increasing efforts to establish an electronic health record stimulate the development and introduction of new concepts in health care. However, compared to other application areas, e.g., tourism, banking, commerce etc. the use of information technology in health care is still of limited success. In hospitals as well in ambulatory medicine (General Practitioner systems) computers are often only used for administrative purposes. Fully operational Hospital Information Systems (HIS) are rare and often island solutions. The situation is somewhat better for department systems (DIS), e.g., where image analysis, processing of biochemical data or of biosignals is in the clinical focus. Even before we have solved the various problems in health care data processing and management within the "conventional" care institutions new challenges are coming up with concepts of telemedicine for assisted and non-assisted home care for patients with chronic diseases or people at high risk. The major challenges for provision of tele-monitoring and alarming services are improvement of communication and interoperability of devices and care providers. A major obstacle in achieving such goals are lack of standards for devices as well for procedures and a lack of databases with information on "normal" variability of many medical parameters to be monitored by serial comparison in continuous medical care. Some of these aspects will be discussed in more detail.
Clapworthy, G; Krokos, M; Vasilonikolidakis, N
1997-11-01
Our paper describes an integrated methodology addressing the development of an Internet service for medical professionals, medical students and generally, people interested in medicine. The service (currently developed in the framework of IAEVA, a Telematics Application Programme project of the European Union), incorporates a mechanism for retrieving from a relational database (reference library) 3D volumetric models of human organs reconstructed from computer tomography (CT) and/or magnetic resonance imaging (MRI). Retrieval is implemented in a way transparent to the actual physical location of the database. Prospective users are provided with a Solid Object Viewer that offers them manipulation (rotation, zooming, dissection etc.) of 3D volumetric models. The service constitutes an excellent foundation of understanding for medical professionals/students and a mechanism for broad and rapid dissemination of information related to particular pathological conditions; although pathological conditions of the knee and skin are supported currently, our methodology allows easy service extension into other human organs ultimately covering the entire human body. The service accepts most Internet browsers and supports MS-Windows 32 platforms; no graphics accelerators or any specialised hardware are necessary, thereby allowing service availability to the widest possible audience. Nevertheless, the service operates in near real-time not only over high speed expensive network lines but also over low/medium network connections.
Certifiable database generation for SVS
NASA Astrophysics Data System (ADS)
Schiefele, Jens; Damjanovic, Dejan; Kubbat, Wolfgang
2000-06-01
In future aircraft cockpits SVS will be used to display 3D physical and virtual information to pilots. A review of prototype and production Synthetic Vision Displays (SVD) from Euro Telematic, UPS Advanced Technologies, Universal Avionics, VDO-Luftfahrtgeratewerk, and NASA, are discussed. As data sources terrain, obstacle, navigation, and airport data is needed, Jeppesen-Sanderson, Inc. and Darmstadt Univ. of Technology currently develop certifiable methods for acquisition, validation, and processing methods for terrain, obstacle, and airport databases. The acquired data will be integrated into a High-Quality Database (HQ-DB). This database is the master repository. It contains all information relevant for all types of aviation applications. From the HQ-DB SVS relevant data is retried, converted, decimated, and adapted into a SVS Real-Time Onboard Database (RTO-DB). The process of data acquisition, verification, and data processing will be defined in a way that allows certication within DO-200a and new RTCA/EUROCAE standards for airport and terrain data. The open formats proposed will be established and evaluated for industrial usability. Finally, a NASA-industry cooperation to develop industrial SVS products under the umbrella of the NASA Aviation Safety Program (ASP) is introduced. A key element of the SVS NASA-ASP is the Jeppesen lead task to develop methods for world-wide database generation and certification. Jeppesen will build three airport databases that will be used in flight trials with NASA aircraft.
Securing electronic health records with novel mobile encryption schemes.
Weerasinghe, Dasun; Elmufti, Kalid; Rajarajan, Muttukrishnan; Rakocevic, Veselin
2007-01-01
Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.
Big data, little security: Addressing security issues in your platform
NASA Astrophysics Data System (ADS)
Macklin, Thomas; Mathews, Joseph
2017-05-01
This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.
20 CFR 422.525 - Where applications and other forms are available.
Code of Federal Regulations, 2014 CFR
2014-04-01
... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...
20 CFR 422.525 - Where applications and other forms are available.
Code of Federal Regulations, 2010 CFR
2010-04-01
... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...
20 CFR 422.525 - Where applications and other forms are available.
Code of Federal Regulations, 2011 CFR
2011-04-01
... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...
20 CFR 422.525 - Where applications and other forms are available.
Code of Federal Regulations, 2012 CFR
2012-04-01
... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...
20 CFR 422.525 - Where applications and other forms are available.
Code of Federal Regulations, 2013 CFR
2013-04-01
... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...
75 FR 66429 - Proposed Collection; Comment Request for Form 8946
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
... PTIN Supplemental Application For Foreign Persons Without a Social Security Number. DATES: Written... Supplemental Application For Foreign Persons Without a Social Security Number. OMB Number: 1545-2189. Form... have a social security number, which will be used to help establish their identity. However, paid...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-15
... DEPARTMENT OF LABOR Employee Benefits Security Administration [Application Number D-11638.... Ivan L. Strasfeld, Director, Office of Exemption Determinations, Employee Benefits Security... Employee Retirement Income Security Act of 1974, as amended, and from certain taxes imposed by the Internal...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...
Multiple Object Based RFID System Using Security Level
NASA Astrophysics Data System (ADS)
Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha
2007-12-01
RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.
77 FR 14839 - Harris & Harris Group, Inc.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29976; 812-13313] Harris & Harris Group, Inc.; Notice of Application March 7, 2012. AGENCY: Securities and Exchange Commission... from section 23(c) of the Act. SUMMARY OF THE APPLICATION: Harris & Harris Group, Inc. (``Applicant...
A sensor monitoring system for telemedicine, safety and security applications
NASA Astrophysics Data System (ADS)
Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka
2017-02-01
A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.
75 FR 66428 - Proposed Collection; Comment Request for Form 8945
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
... PTIN Supplemental Application For U.S. Citizens Without A Social Security Number Due To Conscientious... Supplemental Application For U.S. Citizens Without A Social Security Number Due To Conscientious Reasons. OMB... Identification Number (PTIN) will have a social security number, which will be used to help establish their...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Identity, law enforcement, or security investigations or examinations relating to applications for immigration relief, protection, or restriction on... Procedure § 1003.47 Identity, law enforcement, or security investigations or examinations relating to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62280] Order Granting Application for Extension... International Securities Exchange, LLC Relating to the Ownership Interest of International Securities Exchange Holdings, Inc. in an Electronic Communications Network June 11, 2010. I. Introduction On December 22, 2008...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615... Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) invites the general....S. Citizenship and Immigration Services, Department of Homeland Security. [FR Doc. 2013-06582 Filed...
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
20 CFR 416.355 - Withdrawal of an application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Withdrawal of an application. 416.355 Section 416.355 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Withdrawal of Application § 416.355 Withdrawal of an...
Do You Ignore Information Security in Your Journal Website?
Dadkhah, Mehdi; Borchardt, Glenn; Lagzian, Mohammad
2017-08-01
Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
Security applications of magnetic sensors
NASA Astrophysics Data System (ADS)
Ripka, Pavel
2013-06-01
Magnetic sensors are often used for security and military applications such as detection, discrimination and localization of ferromagnetic and conducting objects, navigation, position tracking and antitheft systems. We give only general overview, few remarks and some interesting references on these applications.
48 CFR 2301.104 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Applicability. 2301.104 Section 2301.104 Federal Acquisition Regulations System SOCIAL SECURITY ADMINISTRATION GENERAL SOCIAL SECURITY ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 2301.104 Applicability. The FAR and...
17 CFR 201.67 - Applications by legal guardians.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Applications by legal... Securities Exchange Act of 1934 § 201.67 Applications by legal guardians. An application pursuant to this subpart may be filed by an executor, administrator, or other legal representative of a person who provides...
Gordon, C; Gray, J A; Toth, B; Veloso, M
2000-01-01
In Europe, North America and elsewhere, growing interest has focussed on evidence-based healthcare systems, incorporating the deployment of practice guidelines, as a field of application for health telematics. The clinical benefit and technical feasibility of common European approaches to this task has recently been demonstrated. In Europe it is likely that, building on recent progress in electronic health record architecture (EHRA) standards, a sufficient state of maturity can be reached to justify initiation within CEN TC251 of a prestandards process on guideline content formats during the current 5th Framework of EC RT&D activity. There is now a similar impetus to agree standards for this field in North America. Thanks to fruitful EC-USA contacts during the 4th Framework programme, there is now a chance, given well-planned coordination, to establish a global consensus optimally suited to serve the world-wide delivery and application of evidence-based medicine. This review notes three factors which may accelerate progress to convergence: (1) revolutionary changes in the knowledge basis of professional/patient/public healthcare partnerships, involving the key role of the Web as a health knowledge resource for citizens, and a rapidly growing market for personalised health information and advice; (2) the emergence at national levels of digital warehouses of clinical guidelines and EBM knowledge resources, agencies which are capable of brokering common mark-up and interchange media definitions between knowledge providers, industry and healthcare organizations; (3) the closing gap in knowledge management technology, with the advent of XML and RDF, between approaches and services based respectively on text mark-up and knowledge-base paradigms. A current project in the UK National Health Service (the National electronic Library of Health) is cited as an example of a national initiative designed to harness these trends.
Security Research on VoIP with Watermarking
NASA Astrophysics Data System (ADS)
Hu, Dong; Lee, Ping
2008-11-01
With the wide application of VoIP, many problems have occurred. One of the problems is security. The problems with securing VoIP systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper, we propose a new security architecture for VoIP which is based on digital watermarking which is a new, flexible and powerful technology that is increasingly gaining more and more attentions. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that VoIP is based on.
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
2016-07-14
of the important properties of secure computation . In particular, it is known that full fairness cannot be achieved in the case of two-party com...Jakobsen, J. Nielsen, and C. Orlandi. A framework for outsourcing of secure computation . In ACM Workshop on Cloud Computing Security (CCSW), pages...Function Evaluation with Applications to Genomic Computation Abstract: Computation based on genomic data is becoming increasingly popular today, be it
20 CFR 416.305 - You must file an application to receive supplemental security income benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... benefits will be stopped because you are no longer eligible and you again meet the requirements for... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false You must file an application to receive supplemental security income benefits. 416.305 Section 416.305 Employees' Benefits SOCIAL SECURITY...
17 CFR 403.1 - Application of part to registered brokers and dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application of part to registered brokers and dealers. 403.1 Section 403.1 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER...
17 CFR 404.1 - Application of part to registered brokers and dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application of part to registered brokers and dealers. 404.1 Section 404.1 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RECORDKEEPING AND...
ERIC Educational Resources Information Center
Karamanian, Andre
2013-01-01
This qualitative, exploratory, normative study examined the security and privacy of location based services in mobile applications. This study explored risk, and controls to implement privacy and security. This study was addressed using components of the FIPS Risk Management Framework. This study found that risk to location information was…
Two RFID standard-based security protocols for healthcare environments.
Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E
2013-10-01
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning... management; and management and implementation level training in system/application life cycle management...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., including the Appendices, is applicable to all persons that participate in the government securities market, including, but not limited to: government securities brokers and dealers, depository institutions that... authorities are exempt from this part. This exemption is not applicable to a broker, dealer, financial...
NASA Astrophysics Data System (ADS)
Fathirad, Iraj; Devlin, John; Jiang, Frank
2012-09-01
The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Application. 149.102 Section 149.102 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ENFORCEMENT OF... COMMISSION § 149.102 Application. This part applies to all programs or activities conducted by the agency. ...
76 FR 65783 - Registration of Security-Based Swap Dealers and Major Security-Based Swap Participants
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... Act Rules and Forms A. Registration Application and Amendment 1. Proposed Rule 15Fb2-1 i. Form of Application ii. Senior Officer Certification iii. Electronic Filing iv. Standards for Granting or Denying Applications v. Request for Comment on Additional Registration Considerations 2. Amendments to Application...
20 CFR 416.310 - What makes an application a claim for benefits.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false What makes an application a claim for benefits. 416.310 Section 416.310 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.310 What makes an...
20 CFR 416.320 - Evidence of authority to sign an application for another.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Evidence of authority to sign an application for another. 416.320 Section 416.320 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.320 Evidence of...
20 CFR 416.310 - What makes an application a claim for benefits.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What makes an application a claim for benefits. 416.310 Section 416.310 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.310 What makes an...
20 CFR 416.320 - Evidence of authority to sign an application for another.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Evidence of authority to sign an application for another. 416.320 Section 416.320 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.320 Evidence of...
20 CFR 416.310 - What makes an application a claim for benefits.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false What makes an application a claim for benefits. 416.310 Section 416.310 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.310 What makes an...
20 CFR 416.310 - What makes an application a claim for benefits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false What makes an application a claim for benefits. 416.310 Section 416.310 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.310 What makes an...
20 CFR 416.320 - Evidence of authority to sign an application for another.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Evidence of authority to sign an application for another. 416.320 Section 416.320 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.320 Evidence of...
20 CFR 416.310 - What makes an application a claim for benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What makes an application a claim for benefits. 416.310 Section 416.310 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.310 What makes an...
20 CFR 416.320 - Evidence of authority to sign an application for another.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Evidence of authority to sign an application for another. 416.320 Section 416.320 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.320 Evidence of...
42 CFR 457.340 - Application for and enrollment in a separate child health program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... understanding and completing applications and in obtaining any required documentation. (b) Use of social security number. A State may require a social security number for each individual requesting services... responsibilities. A State must inform applicants at the time of application, in writing and orally if appropriate...
20 CFR 416.320 - Evidence of authority to sign an application for another.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Evidence of authority to sign an application for another. 416.320 Section 416.320 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.320 Evidence of...
SPOT: Optimization Tool for Network Adaptable Security
NASA Astrophysics Data System (ADS)
Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2014 CFR
2014-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2013 CFR
2013-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Defense Trade Controls to the Defense Security Service of the Department of Defense in accordance with the provisions of the Department of Defense National Industrial Security Program Operating Manual (unless such... a copy of the license to the applicant for the applicant's information. The Defense Security Service...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-02
... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-30804] Notice of Applications for... by writing to the Secretary, U.S. Securities and Exchange Commission, 100 F Street NE., Washington...
Coordinating UAV information for executing national security-oriented collaboration
NASA Astrophysics Data System (ADS)
Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan
2014-10-01
Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.
75 FR 21048 - Northern Lights Fund Trust, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-22
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29208; 812-13651] Northern Lights Fund Trust, et al.; Notice of Application April 16, 2010. AGENCY: Securities and Exchange... shareholder approval and would grant relief from certain disclosure requirements. Applicants: Northern Lights...
Application Security Automation
ERIC Educational Resources Information Center
Malaika, Majid A.
2011-01-01
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
20 CFR 416.1261 - Application of special resource provision.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Application of special resource provision. 416.1261 Section 416.1261 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1261 Application of special...
Telematic Problems of Unmanned Vehicles Positioning at Container Terminals and Warehouses
NASA Astrophysics Data System (ADS)
Kwasniowski, Stanisław; Zajac, Mateusz; Zajac, Paweł
This paper describes the issues of transshipment container terminals operations, in the light of the development of this kind of transport. An increase in handling requires an expansion of stacking yard and automation of handling and transport processes. The development in this area first and foremost depends on modern handling technologies and automatic identification systems. AGV trucks play a key role in in those systems. The role of universities is to promote innovative technologies. Paper [2] contains the status of intermodal terminals development in Poland, which was awarded the prize of the Minister of Infrastructure of Poland in the field of "organization and management." The paper contains a detailed description of the principles of positioning, control and propulsion of AGV vehicles. The content was developed to make it understandable to logisticians responsible for the implementation question in Poland.
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
Overview of Accelerator Applications for Security and Defense
Antolak, Arlyn J.
2015-01-01
Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.
2014-09-30
fingerprint sensor etc. Secure application execution Trust established outwards With normal world apps With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User
MEMS and MOEMS for national security applications
NASA Astrophysics Data System (ADS)
Scott, Marion W.
2003-01-01
Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.
24 CFR 891.435 - Security deposits.
Code of Federal Regulations, 2011 CFR
2011-04-01
... payments on security deposits. (2) Household (or family, as applicable) notification requirement. In order... Owner (or Borrower, as applicable) with a forwarding address or arrange to pick up the refund. (3) Use...
24 CFR 891.435 - Security deposits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... payments on security deposits. (2) Household (or family, as applicable) notification requirement. In order... Owner (or Borrower, as applicable) with a forwarding address or arrange to pick up the refund. (3) Use...
EoE (Eosinophilic Esophagitis)
... Sheet Q & A with Experts Patient Stories Social Security Disability Application Process For Kids For Teens Managing ... Q & A with Experts Health Information Sheet Social Security Disability Application Process For Family and Friends For ...
41 CFR 102-81.30 - What information must job applicants at child care centers reveal?
Code of Federal Regulations, 2011 CFR
2011-01-01
... job applicants at child care centers reveal? 102-81.30 Section 102-81.30 Public Contracts and Property... PROPERTY 81-SECURITY Security § 102-81.30 What information must job applicants at child care centers reveal... on the job application. Employment at a child care facility means any position that involves work...
Image-based electronic patient records for secured collaborative medical applications.
Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun
2005-01-01
We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davida, G.I.; Frankel, Y.; Matt, B.J.
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring securemore » hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.« less
How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.
Stites, Mark; Pianykh, Oleg S
2016-04-01
Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.
75 FR 15468 - Rydex Series Funds, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-29
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29179; File No. 812-13685] Rydex Series Funds, et al.; Notice of Application March 23, 2010. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application under section 6(c) of the Investment Company...
17 CFR 12.300 - Scope and applicability of rules.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Scope and applicability of rules. 12.300 Section 12.300 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS Rules Applicable to Formal Decisional Proceedings § 12.300 Scope and...
76 FR 48929 - American Capital, Ltd.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-09
... rights at the time of issuance may not exceed 25% of the BDC's outstanding voting securities, except that... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29744; File No. 812-13853... Investment Company Act of 1940 (the ``Act''). Summary of Application: Applicant, American Capital, Ltd...
78 FR 59383 - Principal Management Corporation, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-26
... sections 12(d)(1)(A) and (B) of the Act. Applicants: Principal Management Corporation (``PMC''), Principal... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30692; 812-14136] Principal Management Corporation, et al.; Notice of Application September 20, 2013. AGENCY: Securities and Exchange...
Homeland Security and Defense Applications
None
2018-01-16
Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.
Survey of Machine Learning Methods for Database Security
NASA Astrophysics Data System (ADS)
Kamra, Ashish; Ber, Elisa
Application of machine learning techniques to database security is an emerging area of research. In this chapter, we present a survey of various approaches that use machine learning/data mining techniques to enhance the traditional security mechanisms of databases. There are two key database security areas in which these techniques have found applications, namely, detection of SQL Injection attacks and anomaly detection for defending against insider threats. Apart from the research prototypes and tools, various third-party commercial products are also available that provide database activity monitoring solutions by profiling database users and applications. We present a survey of such products. We end the chapter with a primer on mechanisms for responding to database anomalies.
Assurance: the power behind PCASSO security.
Baker, D. B.; Masys, D. R.; Jones, R. L.; Barnhart, R. M.
1999-01-01
The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted. While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care. PMID:10566443
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... facility's involvement with classified information and may include a Facility Security Officer Orientation... procedures and duties applicable to the employee's job. (g) Refresher Briefings. The licensee or other.... (j) Records reflecting an individual's initial and refresher security orientations and security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... facility's involvement with classified information and may include a Facility Security Officer Orientation... procedures and duties applicable to the employee's job. (g) Refresher Briefings. The licensee or other.... (j) Records reflecting an individual's initial and refresher security orientations and security...
49 CFR 1540.205 - Procedures for security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...
37 CFR 5.1 - Applications and correspondence involving national security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...
17 CFR 202.6 - Adoption, revision, and rescission of rules and regulations of general application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Adoption, revision, and rescission of rules and regulations of general application. 202.6 Section 202.6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.6 Adoption, revision, and rescission of rules and regulations of...
ERIC Educational Resources Information Center
Hayajneh, Thaier Saleh
2009-01-01
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…
17 CFR 41.3 - Application for an exemptive order pursuant to section 4f(a)(4)(B) of the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... member of the National Association of Securities Dealers, Inc.) or equivalent self-regulatory... self-regulatory organization may submit an application for an order pursuant to this section on behalf... exemption; (4) Any provision(s) of the securities laws or rules, or of the rules of a securities self...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... their securities and do not propose to make a public offering or engage in business of any kind. Filing... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29263] Notice of Applications for...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-01
... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... public offering of its securities and does not propose to make a public offering or engage in business of... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29333] Notice of Applications for...
Speaker Verification Using SVM
2010-11-01
application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
Update on security plans to prevent bioterrorism attacks during agricultural bacilli programs
Robert A. Fusco
2003-01-01
In the aftermath of September 11, security in aerial application suppression programs utilizing Bacillus thuringiensis has become a critical concern for State pest control managers and aerial applicators.
76 FR 80430 - Rio Tinto plc and Rio Tinto Limited; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-23
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29889; 812-13777] Rio Tinto plc and Rio Tinto Limited; Notice of Application December 19, 2011. AGENCY: Securities and Exchange... Company Act of 1940 (the ``Act''). SUMMARY: Summary of Application: Rio Tinto plc (``RTP'') and Rio Tinto...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-01
... DEPARTMENT OF LABOR Employee Benefits Security Administration 29 CFR Part 2550 RIN 1210-AB08... Benefits Security Administration, Labor. ACTION: Notice of proposed extension of applicability dates... will more closely align the application of the two rules and ensure that parties have sufficient time...
75 FR 13803 - SeaCo Ltd.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-23
...] SeaCo Ltd.; Notice of Application March 17, 2010. AGENCY: Securities and Exchange Commission... (``Act''). SUMMARY: Summary of Application: SeaCo Ltd. (``SeaCo'') seeks an order under section 3(b)(2..., reinvesting, owning, holding or trading in securities. SeaCo is primarily engaged in the shipping container...
78 FR 70976 - Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30803; 812-14179] Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application November 21, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under...
49 CFR 1572.9 - Applicant information required for HME security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... (13) Passport number. This information is voluntary and may expedite the adjudication process for... information is voluntary and may expedite the adjudication process for applicants who are U.S. citizens born... adjudication process for applicants who have completed a TSA security threat assessment. (16) Whether the...
17 CFR 30.11 - Applicability of state law.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Applicability of state law. 30.11 Section 30.11 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS § 30.11 Applicability of state law. Pursuant to section 12(e)(2...
17 CFR 5.24 - Applicability of other parts of this chapter
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Applicability of other parts of this chapter 5.24 Section 5.24 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.24 Applicability of other parts of this chapter...
17 CFR 5.25 - Applicability of the Act.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Applicability of the Act. 5.25 Section 5.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.25 Applicability of the Act. Except as otherwise specified in this part and...
48 CFR 3025.7002-3 - Specific application of trade agreements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Specific application of trade agreements. 3025.7002-3 Section 3025.7002-3 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION 3025.7002-3 Specific application of...
48 CFR 3025.7002-3 - Specific application of trade agreements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Specific application of trade agreements. 3025.7002-3 Section 3025.7002-3 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION 3025.7002-3 Specific application of...
48 CFR 3025.7002-3 - Specific application of trade agreements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Specific application of trade agreements. 3025.7002-3 Section 3025.7002-3 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION 3025.7002-3 Specific application of...
48 CFR 3025.7002-3 - Specific application of trade agreements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Specific application of trade agreements. 3025.7002-3 Section 3025.7002-3 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION 3025.7002-3 Specific application of...
75 FR 38158 - Korea Finance Corporation; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-01
...Summary of Application: Applicant, a policy finance institution established by the government of the Republic of Korea (the ``Korean Government'') requests an order exempting it from all provisions of the Act in connection with the offer and sale of its debt securities in the United States (``Debt Securities'').
77 FR 16871 - Forward Funds, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-22
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29982; File No. 812-13996] Forward Funds, et al.; Notice of Application March 15, 2012. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application under section 6(c) of the Investment Company Act of 1940...
MYSEA: The Monterey Security Architecture
2009-01-01
Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized
Code of Federal Regulations, 2010 CFR
2010-10-01
... information requested by TSA concerning Security Threat Assessments. (viii) A statement acknowledging and ensuring that each individual will successfully complete a Security Threat Assessment under § 1549.111... Security Coordinator for an applicant successfully completes a security threat assessment, TSA will provide...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Strait, R.S.; Wagner, E.E.
1994-07-01
The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less
Interpreting international governance standards for health IT use within general medical practice.
Mahncke, Rachel J; Williams, Patricia A H
2014-01-01
General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.
Use of Computer-Generated Holograms in Security Hologram Applications
NASA Astrophysics Data System (ADS)
Bulanovs, A.; Bakanas, R.
2016-10-01
The article discusses the use of computer-generated holograms (CGHs) for the application as one of the security features in the relief-phase protective holograms. An improved method of calculating CGHs is presented, based on ray-tracing approach in the case of interference of parallel rays. Software is developed for the calculation of multilevel phase CGHs and their integration in the application of security holograms. Topology of calculated computer-generated phase holograms was recorded on the photoresist by the optical greyscale lithography. Parameters of the recorded microstructures were investigated with the help of the atomic-force microscopy (AFM) and scanning electron microscopy (SEM) methods. The results of the research have shown highly protective properties of the security elements based on CGH microstructures. In our opinion, a wide use of CGHs is very promising in the structure of complex security holograms for increasing the level of protection against counterfeit.
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Peterson, Christopher; Watzlaf, Valerie
2014-01-01
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of pertinent regulatory issues regarding these software applications. A case study format is used to highlight clinical applications of store and forward software features. Important considerations of successful implementation of store and forward applications are also identified and discussed.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
17 CFR 210.5-01 - Application of §§ 210.5-01 to 210.5-04.
Code of Federal Regulations, 2010 CFR
2010-04-01
... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Application of §§ 210.5-01 to 210.5-04. 210.5-01 Section 210.5-01 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
20 CFR 404.1903 - Negotiating totalization agreements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security system of general application in effect. The system shall be considered to be in effect if it is collecting social security taxes or paying social security benefits. ... Section 404.1903 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND...
Application distribution model and related security attacks in VANET
NASA Astrophysics Data System (ADS)
Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian
2013-03-01
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
Tagliaferri, Salvatore; Ippolito, Adelaide; Cuccaro, Patrizia; Annunziata, Maria Laura; Campanile, Marta; Di Lieto, Andrea
2013-07-01
Over the last 30 years, a great increase in the application of technologies in public health, with an undisputed impact on both the effectiveness of performance and the investment and management costs, has occurred. This evidence has induced the development of assessment tools to clarify the relationships among resources, outputs, and outcomes of technological innovations. This analysis was developed in order to examine the use of a telematic system for reporting remotely transmitted cardiotocographic traces, specifically (1) its impact on the health organization and on the appropriateness of the care setting used and (2) the efficiency of its adoption in a regional network. We adopted a case-control study on patients' medical records during the first 4 months of 2009, 2010, and 2011 and a cost analysis of resources used for the creation of a computerized telecardiotocography network connecting eight peripheral areas to the operations center. The case-control study showed a reduction in the average hospital stay days for high-risk patients (1.32) and for low-risk patient (1.7) with a total of cost savings of €89,628 for high-risk patients and €170,170 for low-risk patients. The cost savings of the regional network was €20,769.04. The adoption of a remote transmission system of cardiotocography provided a managerial and economic advantage in the reduction of inappropriate admissions for prepartum symptoms and an improvement in the admission indicators (hospital stay days).
Monitoring and telemedicine support in remote environments and in human space flight.
Cermack, M
2006-07-01
The common features of remote environments are geographical separation, logistic problems with health care delivery and with patient retrieval, extreme natural conditions, artificial environment, or combination of all. The exposure can have adverse effects on patients' physiology, on care providers' performance and on hardware functionality. The time to definite treatment may vary between hours as in orbital space flight, days for remote exploratory camp, weeks for polar bases and months to years for interplanetary exploration. The generic system architecture, used in any telematic support, consists of data acquisition, data-processing and storage, telecommunications links, decision-making facilities and the means of command execution. At the present level of technology, a simple data transfer and two-way voice communication could be established from any place on the earth, but the current use of mobile communication technologies for telemedicine applications is still low, either for logistic, economic and political reasons, or because of limited knowledge about the available technology and procedures. Criteria for selection of portable telemedicine terminals in remote terrestrial places, characteristics of currently available mobile telecommunication systems, and the concept of integrated monitoring of physiological and environmental parameters are mentioned in the first section of this paper. The second part describes some aspects of emergency medical support in human orbital spaceflight, the limits of telemedicine support in near-Earth space environment and mentions some open issues related to long-term exploratory missions beyond the low Earth orbit.
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
Water security for productive economies: Applying an assessment framework in southern Africa
NASA Astrophysics Data System (ADS)
Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian
2017-08-01
Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.
76 FR 33376 - Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29689; 812-13851] Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application June 1, 2011. AGENCY: Securities and... ``Adviser'') and Northern Lights Fund Trust (the ``Trust''). DATES: Filing Dates: The application was filed...
17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.
Code of Federal Regulations, 2011 CFR
2011-04-01
... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...
17 CFR 275.0-5 - Procedure with respect to applications and other matters.
Code of Federal Regulations, 2012 CFR
2012-04-01
... applications and other matters. 275.0-5 Section 275.0-5 Commodity and Securities Exchanges SECURITIES AND... with respect to applications and other matters. The procedure hereinbelow set forth will be followed... matter may be entered. The notice will also provide that any interested person may, within the period of...
17 CFR 275.0-5 - Procedure with respect to applications and other matters.
Code of Federal Regulations, 2014 CFR
2014-04-01
... applications and other matters. 275.0-5 Section 275.0-5 Commodity and Securities Exchanges SECURITIES AND... with respect to applications and other matters. The procedure hereinbelow set forth will be followed... matter may be entered. The notice will also provide that any interested person may, within the period of...
17 CFR 275.0-5 - Procedure with respect to applications and other matters.
Code of Federal Regulations, 2013 CFR
2013-04-01
... applications and other matters. 275.0-5 Section 275.0-5 Commodity and Securities Exchanges SECURITIES AND... with respect to applications and other matters. The procedure hereinbelow set forth will be followed... matter may be entered. The notice will also provide that any interested person may, within the period of...
17 CFR 275.0-5 - Procedure with respect to applications and other matters.
Code of Federal Regulations, 2011 CFR
2011-04-01
... applications and other matters. 275.0-5 Section 275.0-5 Commodity and Securities Exchanges SECURITIES AND... with respect to applications and other matters. The procedure hereinbelow set forth will be followed... matter may be entered. The notice will also provide that any interested person may, within the period of...
76 FR 75922 - AllianceBernstein Cap Fund, Inc., et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-05
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29876; File No. 812-13939] AllianceBernstein Cap Fund, Inc., et al.; Notice of Application November 29, 2011. AGENCY: Securities and... 12d1-2 under the Act to invest in certain financial instruments. APPLICANTS: AllianceBernstein Cap Fund...
14 CFR 1203.101 - Other applicable NASA regulations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...
14 CFR § 1203.101 - Other applicable NASA regulations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Other applicable NASA regulations. § 1203... INFORMATION SECURITY PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part... this part, “NASA Information Security Program Committee.” (c) NASA Procedural Requirements (NPR) 1600.2...
14 CFR 1203.101 - Other applicable NASA regulations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...
14 CFR 1203.101 - Other applicable NASA regulations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...
14 CFR 1203.101 - Other applicable NASA regulations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...
17 CFR 1.46 - Application and closing out of offsetting long and short positions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Application and closing out of offsetting long and short positions. 1.46 Section 1.46 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Miscellaneous § 1.46 Application...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
.... Each applicant also distributed preferred shares of Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to holders of applicants' Auction Rate Preferred Shares, DARTS, or Auction... distributed Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to the holders of...
78 FR 78417 - Forethought Variable Insurance Trust, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30840; File No. 812-14198] Forethought Variable Insurance Trust, et al.; Notice of Application December 19, 2013. AGENCY: Securities and Exchange Commission (the ``Commission''). ACTION: Notice of an application for an order under section 12(d)(1)(J) of the Investment Company...
78 FR 48729 - Aspiriant Global Equity Trust and Aspiriant, LLC; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30640; File No. 812-14155] Aspiriant Global Equity Trust and Aspiriant, LLC; Notice of Application August 5, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application under section 6(c) of the Investment Company Act of 1940 (``Act'')...
76 FR 55427 - Horizon Technology Finance Corporation, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-07
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29777; 812-13876] Horizon Technology Finance Corporation, et al.; Notice of Application August 31, 2011. AGENCY: Securities and Exchange Commission (Commission). ACTION: Notice of an application for an order under section 6(c) of the Investment Company Act of 1940 (the ``Act'...
17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.
Code of Federal Regulations, 2014 CFR
2014-04-01
... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...
17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.
Code of Federal Regulations, 2012 CFR
2012-04-01
... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...
17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.
Code of Federal Regulations, 2013 CFR
2013-04-01
... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...
17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.
Code of Federal Regulations, 2010 CFR
2010-04-01
... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...
Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna
2017-04-10
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INFORMATION POLICY AND GUIDELINES, IMPLEMENTING REGULATIONS § 806.2 Applicability. This rule supplements Executive Order 12065 within the Board with regard to national security information. It establishes general policies and certain procedures for the classification and declassification of information...
Public key infrastructure for DOE security research
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aiken, R.; Foster, I.; Johnston, W.E.
This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less
Facilitating Secure Sharing of Personal Health Data in the Cloud.
Thilakanathan, Danan; Calvo, Rafael A; Chen, Shiping; Nepal, Surya; Glozier, Nick
2016-05-27
Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors.
Metro Optical Networks for Homeland Security
NASA Astrophysics Data System (ADS)
Bechtel, James H.
Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
Code of Federal Regulations, 2011 CFR
2011-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Code of Federal Regulations, 2013 CFR
2013-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Code of Federal Regulations, 2012 CFR
2012-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
75 FR 73947 - Securities of Nonmember Insured Banks
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-30
..., DC, and should be addressed as follows: Accounting and Securities Disclosure Section, Division of..., Accounting and Securities Disclosure Section, Division of Supervision and Consumer Protection, 550 17th... comment. SUMMARY: The FDIC is revising its securities disclosure regulations applicable to state nonmember...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2013 CFR
2013-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2014 CFR
2014-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
Secure voice for mobile satellite applications
NASA Technical Reports Server (NTRS)
Vaisnys, Arvydas; Berner, Jeff
1990-01-01
The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.
The Enterprise 2.0 Concept: Challenges on Data and Information Security
NASA Astrophysics Data System (ADS)
Silva, Ana; Moreira, Fernando; Varajão, João
The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nauss, R.
1994-12-31
In this review we describe three integer programming applications involving fixed income securities. A bond trading model is presented that features a number of possible different objectives and collections of constraints including future interest rate scenarios. A mortgage backed security (MBS) financing model that accounts for potential defaults in the MBS is also presented. Finally we describe an approach to allocate collections of bank securities into three categories: hold to maturity, available for sale, or trading. Placement of securities in these categories affects the capital, net income, and liquidity of a bank according to new accounting rules promulgated by themore » Financial Accounting Standards Board.« less
Finite-Time Performance of Local Search Algorithms: Theory and Application
2010-06-10
security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official
A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.
Wang, Yuan-Gen; Zhu, Guopu; Kwong, Sam; Shi, Yun-Qing
2017-08-23
Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... the Standard Review Plan (SRP), concerning the physical security reviews of design certification... NRC staff with the physical security review of applications for design certifications, incorporate... NUCLEAR REGULATORY COMMISSION [NRC-2013-0225] Proposed Revision to Physical Security--Standard...
31 CFR 306.78 - Nontransferable securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.78.... SECURITIES Assignments by or in Behalf of Trustees and Similar Fiduciaries § 306.78 Nontransferable securities. The provisions of this subpart, so far as applicable, govern assignments of Treasury Bonds...
31 CFR 306.78 - Nontransferable securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.78.... SECURITIES Assignments by or in Behalf of Trustees and Similar Fiduciaries § 306.78 Nontransferable securities. The provisions of this subpart, so far as applicable, govern assignments of Treasury Bonds...
31 CFR 306.78 - Nontransferable securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.78.... SECURITIES Assignments by or in Behalf of Trustees and Similar Fiduciaries § 306.78 Nontransferable securities. The provisions of this subpart, so far as applicable, govern assignments of Treasury Bonds...
31 CFR 306.78 - Nontransferable securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.78.... SECURITIES Assignments by or in Behalf of Trustees and Similar Fiduciaries § 306.78 Nontransferable securities. The provisions of this subpart, so far as applicable, govern assignments of Treasury Bonds...
The application of data encryption technology in computer network communication security
NASA Astrophysics Data System (ADS)
Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-04-01
With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caskey, D.L.; Olascoaga, M.T.
1990-01-01
Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-24
... assets in Fixed Income Securities denominated in U.S. dollars. The Fund may invest in Money Market... shorter depending upon market conditions. The Fund may also invest in short-term Money Market Securities.... government securities, as applicable. Money Market Securities Assets not invested in Fixed Income Securities...
Investigating weaknesses in Android certificate security
NASA Astrophysics Data System (ADS)
Krych, Daniel E.; Lange-Maney, Stephen; McDaniel, Patrick; Glodek, William
2015-05-01
Android's application market relies on secure certificate generation to establish trust between applications and their users; yet, cryptography is often not a priority for application developers and many fail to take the necessary security precautions. Indeed, there is cause for concern: several recent high-profile studies have observed a pervasive lack of entropy on Web-systems leading to the factorization of private keys.1 Sufficient entropy, or randomness, is essential to generate secure key pairs and combat predictable key generation. In this paper, we analyze the security of Android certificates. We investigate the entropy present in 550,000 Android application certificates using the Quasilinear GCD finding algorithm.1 Our results show that while the lack of entropy does not appear to be as ubiquitous in the mobile markets as on Web-systems, there is substantial reuse of certificates only one third of the certificates in our dataset were unique. In other words, we find that organizations frequently reuse certificates for different applications. While such a practice is acceptable under Google's specifications for a single developer, we find that in some cases the same certificates are used for a myriad of developers, potentially compromising Android's intended trust relationships. Further, we observed duplicate certificates being used by both malicious and non-malicious applications. The top 3 repeated certificates present in our dataset accounted for a total of 11,438 separate APKs. Of these applications, 451, or roughly 4%, were identified as malicious by antivirus services.
eHealth and IMIA's Strategic Planning Process - IMIA conference introductory address.
Murray, Peter; Haux, Reinhold; Lorenzi, Nancy
2008-01-01
The International Medical Informatics Association (IMIA) is the only organization in health and biomedical informatics which is fully international in scope, bridging the academic, health practice, education, and health industry worlds through conferences, working groups, special interest groups and publications. Authored by the IMIA Interim Vice President for Strategic Planning Implementation and co-authored by the current IMIA President and the IMIA Past-President, the intention of this paper is to introduce IMIA's current strategic planning process and to set this process in relation to 'eHealth: Combining Health Telematics, Telemedicine, Biomedical Engineering and Bioinformatics to the Edge', the theme of this conference. From the viewpoint of an international organization such as IMIA, an eHealth strategy needs to be considered in a comprehensive way, including broadly stimulating high-quality health and biomedical informatics research and education, as well as providing support to bridging outcomes towards a new practice of health care in a changing world.
The use of PC based VR in clinical medicine: the VREPAR projects.
Riva, G; Bacchetta, M; Baruffi, M; Borgomainerio, E; Defrance, C; Gatti, F; Galimberti, C; Fontaneto, S; Marchi, S; Molinari, E; Nugues, P; Rinaldi, S; Rovetta, A; Ferretti, G S; Tonci, A; Wann, J; Vincelli, F
1999-01-01
Virtual reality (VR) is an emerging technology that alters the way individuals interact with computers: a 3D computer-generated environment in which a person can move about and interact as if he actually was inside it. Given to the high computational power required to create virtual environments, these are usually developed on expensive high-end workstations. However, the significant advances in PC hardware that have been made over the last three years, are making PC-based VR a possible solution for clinical assessment and therapy. VREPAR - Virtual Reality Environments for Psychoneurophysiological Assessment and Rehabilitation - are two European Community funded projects (Telematics for health - HC 1053/HC 1055 - http://www.psicologia.net) that are trying to develop a modular PC-based virtual reality system for the medical market. The paper describes the rationale of the developed modules and the preliminary results obtained.
LHCb experience with LFC replication
NASA Astrophysics Data System (ADS)
Bonifazi, F.; Carbone, A.; Perez, E. D.; D'Apice, A.; dell'Agnello, L.; Duellmann, D.; Girone, M.; Re, G. L.; Martelli, B.; Peco, G.; Ricci, P. P.; Sapunenko, V.; Vagnoni, V.; Vitlacil, D.
2008-07-01
Database replication is a key topic in the framework of the LHC Computing Grid to allow processing of data in a distributed environment. In particular, the LHCb computing model relies on the LHC File Catalog, i.e. a database which stores information about files spread across the GRID, their logical names and the physical locations of all the replicas. The LHCb computing model requires the LFC to be replicated at Tier-1s. The LCG 3D project deals with the database replication issue and provides a replication service based on Oracle Streams technology. This paper describes the deployment of the LHC File Catalog replication to the INFN National Center for Telematics and Informatics (CNAF) and to other LHCb Tier-1 sites. We performed stress tests designed to evaluate any delay in the propagation of the streams and the scalability of the system. The tests show the robustness of the replica implementation with performance going much beyond the LHCb requirements.
Telematic integration of health data: a practicable contribution.
Guerriero, Lorenzo; Ferdeghini, Ezio M; Viola, Silvia R; Porro, Ivan; Testi, Angela; Bedini, Remo
2011-09-01
The patients' clinical and healthcare data should virtually be available everywhere, both to provide a more efficient and effective medical approach to their pathologies, as well as to make public healthcare decision makers able to verify the efficacy and efficiency of the adopted healthcare processes. Unfortunately, customised solutions adopted by many local Health Information Systems in Italy make it difficult to share the stored data outside their own environment. In the last years, worldwide initiatives have aimed to overcome such sharing limitation. An important issue during the passage towards standardised, integrated information systems is the possible loss of previously collected data. The herein presented project realises a suitable architecture able to guarantee reliable, automatic, user-transparent storing and retrieval of information from both modern and legacy systems. The technical and management solutions provided by the project avoid data loss and overlapping, and allow data integration and organisation suitable for data-mining and data-warehousing analysis.
IVAN: Intelligent Van for the Distribution of Pharmaceutical Drugs
Moreno, Asier; Angulo, Ignacio; Perallos, Asier; Landaluce, Hugo; Zuazola, Ignacio Julio García; Azpilicueta, Leire; Astrain, José Javier; Falcone, Francisco; Villadangos, Jesús
2012-01-01
This paper describes a telematic system based on an intelligent van which is capable of tracing pharmaceutical drugs over delivery routes from a warehouse to pharmacies, without altering carriers' daily conventional tasks. The intelligent van understands its environment, taking into account its location, the assets and the predefined delivery route; with the capability of reporting incidences to carriers in case of failure according to the established distribution plan. It is a non-intrusive solution which represents a successful experience of using smart environments and an optimized Radio Frequency Identification (RFID) embedded system in a viable way to resolve a real industrial need in the pharmaceutical industry. The combination of deterministic modeling of the indoor vehicle, the implementation of an ad-hoc radiating element and an agile software platform within an overall system architecture leads to a competitive, flexible and scalable solution. PMID:22778659
78 FR 54298 - Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-03
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30680; 812-14178] Horizons ETFs Management (USA) LLC and Horizons ETF Trust; Notice of Application August 27, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the Investment Company Act of...
78 FR 29399 - ERNY Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-20
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30514; 812-14146] ERNY Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application May 13, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the Investment Company Act of 1940...
75 FR 71744 - Fifth Street Finance Corp., et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29500; 812-13698] Fifth Street Finance Corp., et al.; Notice of Application November 18, 2010. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the Investment Company Act of 1940 (the ``Act'') for...
The USEPA's National Homeland Security Research Center (NHSRC)Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle recently evaluated the performance of the Science Applications International Co...
32 CFR 2700.3 - Applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Introduction § 2700.3 Applicability. This Regulation supplements E.O. 12065 within OMSN with regard to National Security Information. In consonance with the authorities listed in § 2700...
NASA Astrophysics Data System (ADS)
Miret, Josep M.; Sebé, Francesc
Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.
Digital watermarking in telemedicine applications--towards enhanced data security and accessibility.
Giakoumaki, Aggeliki L; Perakis, Konstantinos; Tagaris, Anastassios; Koutsouris, Dimitris
2006-01-01
Implementing telemedical solutions has become a trend amongst the various research teams at an international level. Yet, contemporary information access and distribution technologies raise critical issues that urgently need to be addressed, especially those related to security. The paper suggests the use of watermarking in telemedical applications in order to enhance security of the transmitted sensitive medical data, familiarizes the users with a telemedical system and a watermarking module that have already been developed, and proposes an architecture that will enable the integration of the two systems, taking into account a variety of use cases and application scenarios.
[Application of password manager software in health care].
Ködmön, József
2016-12-01
When using multiple IT systems, handling of passwords in a secure manner means a potential source of problem. The most frequent issues are choosing the appropriate length and complexity, and then remembering the strong passwords. Password manager software provides a good solution for this problem, while greatly increasing the security of sensitive medical data. This article introduces a password manager software and provides basic information of the application. It also discusses how to select a really secure password manager software and suggests a practical application to efficient, safe and comfortable use for health care. Orv. Hetil., 2016, 157(52), 2066-2073.
Database security and encryption technology research and application
NASA Astrophysics Data System (ADS)
Zhu, Li-juan
2013-03-01
The main purpose of this paper is to discuss the current database information leakage problem, and discuss the important role played by the message encryption techniques in database security, As well as MD5 encryption technology principle and the use in the field of website or application. This article is divided into introduction, the overview of the MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements and application, this paper makes readers more detailed and clearly understood the principle, the importance in database security, and the use of MD5 encryption technology.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Information-Flow-Based Access Control for Web Browsers
NASA Astrophysics Data System (ADS)
Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu
The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.
Marketing Plan for Demonstration and Validation Assets
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.
Analyzing Cyber-Physical Threats on Robotic Platforms.
Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J
2018-05-21
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.
Analyzing Cyber-Physical Threats on Robotic Platforms †
2018-01-01
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403
School Violence: Physical Security.
ERIC Educational Resources Information Center
Utah State Office of Education, Salt Lake City.
This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...
14 CFR 135.125 - Aircraft security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aircraft security. 135.125 Section 135.125....125 Aircraft security. Certificate holders conducting operators conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter XII. [67 FR 8350, Feb. 22, 2002] ...
14 CFR 121.538 - Aircraft security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aircraft security. 121.538 Section 121.538..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.538 Aircraft security. Certificate holders conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter...
14 CFR 121.538 - Aircraft security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft security. 121.538 Section 121.538..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.538 Aircraft security. Certificate holders conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter...
14 CFR 135.125 - Aircraft security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aircraft security. 135.125 Section 135.125....125 Aircraft security. Certificate holders conducting operators conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter XII. [67 FR 8350, Feb. 22, 2002] ...
14 CFR 135.125 - Aircraft security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft security. 135.125 Section 135.125....125 Aircraft security. Certificate holders conducting operators conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter XII. [67 FR 8350, Feb. 22, 2002] ...
14 CFR 121.538 - Aircraft security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aircraft security. 121.538 Section 121.538..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.538 Aircraft security. Certificate holders conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter...
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
NASA Astrophysics Data System (ADS)
Hassan, Ahmed A.; Bahgat, Waleed M.
2010-01-01
Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.
45 CFR 164.302 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Applicability. 164.302 Section 164.302 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164...
45 CFR 164.302 - Applicability.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Applicability. 164.302 Section 164.302 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164...
45 CFR 164.302 - Applicability.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Applicability. 164.302 Section 164.302 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164...
49 CFR 1522.101 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.101 Applicability. This subpart governs the use of TSA-approved validation firms and validators to...
SEADE: Countering the Futility of Network Security
2015-10-01
guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The
38 CFR 3.153 - Claims filed with Social Security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2011-07-01 2011-07-01 false Claims filed with Social... Social Security. An application on a form jointly prescribed by the Secretary and the Commissioner of Social Security filed with the Social Security Administration on or after January 1, 1957, will be...
Security Aspects of an Enterprise-Wide Network Architecture.
ERIC Educational Resources Information Center
Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan
1999-01-01
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
10 CFR 2.903 - Protection of restricted data and national security information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230 and 270 [Release No. 33-9503; IC-30845...; Applications Regarding Joint Enterprises or Arrangements and Certain Profit-Sharing Plans AGENCY: Securities and Exchange Commission. ACTION: Final rule; technical amendments. SUMMARY: The Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... Financial Security Requirements for Brokers of Property and Freight Forwarders AGENCY: Federal Motor Carrier... security requirements applicable to property brokers and created new requirements for freight forwarders...., Washington, DC 20590- 0001, (202) 385-2367/2405 regarding financial security requirements or Kenneth Rodgers...
7 CFR 770.7 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed of...
7 CFR 770.7 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 770.7 Section 770.7 Agriculture... SPECIAL PROGRAMS INDIAN TRIBAL LAND ACQUISITION LOANS § 770.7 Security requirements. (a) The applicant will take appropriate action to obtain and provide security for the loan. (b) A mortgage or deed of...
7 CFR 1738.154 - Loan security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 11 2012-01-01 2012-01-01 false Loan security. 1738.154 Section 1738.154 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Direct Loan Terms § 1738.154 Loan security. (a) The... the applicant's property and revenues and such additional security as the Agency may require. The...
7 CFR 1738.154 - Loan security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 11 2013-01-01 2013-01-01 false Loan security. 1738.154 Section 1738.154 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Direct Loan Terms § 1738.154 Loan security. (a) The... the applicant's property and revenues and such additional security as the Agency may require. The...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
12 CFR 208.37 - Government securities sales practices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Government securities sales practices. 208.37... Securities-Related Activities § 208.37 Government securities sales practices. (a) Scope. This subpart is applicable to state member banks that have filed notice as, or are required to file notice as, government...
12 CFR 208.37 - Government securities sales practices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Government securities sales practices. 208.37... Securities-Related Activities § 208.37 Government securities sales practices. (a) Scope. This subpart is applicable to state member banks that have filed notice as, or are required to file notice as, government...