Sample records for securing remote procedure

  1. Remote secure proof of identity using biometrics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sengupta, S. K.; Pearson, P.; Strait, R.S.

    1997-06-10

    Biometric measurements derived from finger- or voiceprints, hand geometry, retinal vessel pattern and iris texture characteristics etc. can be identifiers of individuals. In each case, the measurements can be coded into a statistically unique bit-string for each individual. While in electronic commerce and other electronic transactions the proof of identity of an individual is provided by the use of either public key cryptography or biometric data, more secure applications can be achieved by employing both. However the former requires the use of exact bit patterns. An error correction procedure allows us to successfully combine the use of both to providemore » a general procedure for remote secure proof of identity using a generic biometric device. One such procedure has been demonstrated using a device based on hand geometry.« less

  2. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  3. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    NASA Astrophysics Data System (ADS)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  4. Security Concerns in Telecommuting within the Information Technology Industry

    ERIC Educational Resources Information Center

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  5. A Goal VPN Protection Profile for Protecting Sensitive Information

    DTIC Science & Technology

    2000-07-10

    security for the systems in which they are used. Nothing could be further from the truth . There are no perfect security solutions, and no...establishment/termination, failures, and errors); • provide for directly connected (local hard -wire connection) and remote (over the network) interfaces... the TOERU is left unattended procedures such as media encryption or secure storage of the hard drive, will be used to insure the protection of stored

  6. Obfuscated authentication systems, devices, and methods

    DOEpatents

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  7. E-Control: First Public Release of Remote Control Software for VLBI Telescopes

    NASA Technical Reports Server (NTRS)

    Neidhardt, Alexander; Ettl, Martin; Rottmann, Helge; Ploetz, Christian; Muehlbauer, Matthias; Hase, Hayo; Alef, Walter; Sobarzo, Sergio; Herrera, Cristian; Himwich, Ed

    2010-01-01

    Automating and remotely controlling observations are important for future operations in a Global Geodetic Observing System (GGOS). At the Geodetic Observatory Wettzell, in cooperation with the Max-Planck-Institute for Radio Astronomy in Bonn, a software extension to the existing NASA Field System has been developed for remote control. It uses the principle of a remotely accessible, autonomous process cell as a server extension for the Field System. The communication is realized for low transfer rates using Remote Procedure Calls (RPC). It uses generative programming with the interface software generator idl2rpc.pl developed at Wettzell. The user interacts with this system over a modern graphical user interface created with wxWidgets. For security reasons the communication is automatically tunneled through a Secure Shell (SSH) session to the telescope. There are already successful test observations with the telescopes at O Higgins, Concepcion, and Wettzell. At Wettzell the software is already used routinely for weekend observations. Therefore the first public release of the software is now available, which will also be useful for other telescopes.

  8. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... all computer products containing classified data in accordance with the requirements of DoD 5200.1-R... computer environments outside the data processing installation (such as, remote job entry stations... process classified material have adequate procedures and security for the purposes of this Regulation...

  9. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... all computer products containing classified data in accordance with the requirements of DoD 5200.1-R... computer environments outside the data processing installation (such as, remote job entry stations... process classified material have adequate procedures and security for the purposes of this Regulation...

  10. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... all computer products containing classified data in accordance with the requirements of DoD 5200.1-R... computer environments outside the data processing installation (such as, remote job entry stations... process classified material have adequate procedures and security for the purposes of this Regulation...

  11. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... all computer products containing classified data in accordance with the requirements of DoD 5200.1-R... computer environments outside the data processing installation (such as, remote job entry stations... process classified material have adequate procedures and security for the purposes of this Regulation...

  12. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... all computer products containing classified data in accordance with the requirements of DoD 5200.1-R... computer environments outside the data processing installation (such as, remote job entry stations... process classified material have adequate procedures and security for the purposes of this Regulation...

  13. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  14. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    PubMed Central

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff. PMID:26618034

  15. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    PubMed

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  16. Additional Security Considerations for Grid Management

    NASA Technical Reports Server (NTRS)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  17. Evaluating a Service-Oriented Architecture

    DTIC Science & Technology

    2007-09-01

    See the description on page 13. SaaS Software as a service ( SaaS ) is a software delivery model where customers don’t own a copy of the application... serviceability REST Representational State Transfer RIA rich internet application RPC remote procedure call SaaS software as a service SAML Security...Evaluating a Service -Oriented Architecture Phil Bianco, Software Engineering Institute Rick Kotermanski, Summa Technologies Paulo Merson

  18. [Experimental study of angiography using vascular interventional robot-2(VIR-2)].

    PubMed

    Tian, Zeng-min; Lu, Wang-sheng; Liu, Da; Wang, Da-ming; Guo, Shu-xiang; Xu, Wu-yi; Jia, Bo; Zhao, De-peng; Liu, Bo; Gao, Bao-feng

    2012-06-01

    To verify the feasibility and safety of new vascular interventional robot system used in vascular interventional procedures. Vascular interventional robot type-2 (VIR-2) included master-slave parts of body propulsion system, image navigation systems and force feedback system, the catheter movement could achieve under automatic control and navigation, force feedback was integrated real-time, followed by in vitro pre-test in vascular model and cerebral angiography in dog. Surgeon controlled vascular interventional robot remotely, the catheter was inserted into the intended target, the catheter positioning error and the operation time would be evaluated. In vitro pre-test and animal experiment went well; the catheter can enter any branch of vascular. Catheter positioning error was less than 1 mm. The angiography operation in animal was carried out smoothly without complication; the success rate of the operation was 100% and the entire experiment took 26 and 30 minutes, efficiency was slightly improved compared with the VIR-1, and the time what staff exposed to the DSA machine was 0 minute. The resistance of force sensor can be displayed to the operator to provide a security guarantee for the operation. No surgical complications. VIR-2 is safe and feasible, and can achieve the catheter remote operation and angiography; the master-slave system meets the characteristics of traditional procedure. The three-dimensional image can guide the operation more smoothly; force feedback device provides remote real-time haptic information to provide security for the operation.

  19. Robotic inspection for vehicle-borne contraband

    NASA Astrophysics Data System (ADS)

    Witus, Gary; Gerhart, Grant; Smuda, W.; Andrusz, H.

    2006-05-01

    Vehicle-borne smuggling is widespread because of the availability, flexibility and capacity of the cars and trucks. Inspecting vehicles at border crossings and checkpoints are key security elements. At the present time, most vehicle security inspections at home and abroad are conducted manually. Remotely operated vehicle inspection robots could be integrated into the operating procedures to improve throughput while reducing the workload burden on security personnel. The robotic inspection must be effective at detecting contraband and efficient at clearing the "clean" vehicles that make up the bulk of the traffic stream, while limiting the workload burden on the operators. In this paper, we present a systems engineering approach to robotic vehicle inspection. We review the tactics, techniques and procedures to interdict contraband. We present an operational concept for robotic vehicle inspection within this framework, and identify needed capabilities. We review the technologies currently available to meet these needs. Finally, we summarize the immediate potential and R&D challenges for effective contraband detection robots.

  20. Time Synchronization Prototype, Server Upgrade Procedure Support and Remote Software Development

    NASA Technical Reports Server (NTRS)

    Sanders, Shania R.

    2014-01-01

    Networks are roadways of communication that connect devices. Like all roadways, there are rules and regulations that govern whatever (information in this case) travels along them. One type of rule that is commonly used is called a protocol. More specifically, a protocol is a standard that specifies how data should be transmitted over a network. The project outlined in this document seeks to implement one protocol in particular, Precision Time Protocol, within the Kennedy Ground Control Subsystem network at Kennedy Space Center. This document also summarizes work completed for server upgrades, remote software developer training and how all three assignments demonstrated the importance of accountability and security.

  1. Design of Firmware Update Strategy in Tower Mounted Amplifier

    NASA Astrophysics Data System (ADS)

    Lv, Yi; Han, Shuqin

    With rapid development of radio communication, Tower mounted amplifier (TMA) that conform to AISG protocol will be increasingly applied. Remote firmware update function is essential for TMA. In this paper, a method about remote firmware update that conforms to AISG2.0 is proposed. In this paper, defect of traditional firmware storage is given, and the implementation procedure of firmware storing that based on internal flash of STR755 was introduced. According to corresponding specification in aisg2.0, the process of firmware download and activation are provided in detail. The key point of bootloader was given. Application result shows that the strategy is reliable and highly secure.

  2. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  3. Secure distribution for high resolution remote sensing images

    NASA Astrophysics Data System (ADS)

    Liu, Jin; Sun, Jing; Xu, Zheng Q.

    2010-09-01

    The use of remote sensing images collected by space platforms is becoming more and more widespread. The increasing value of space data and its use in critical scenarios call for adoption of proper security measures to protect these data against unauthorized access and fraudulent use. In this paper, based on the characteristics of remote sensing image data and application requirements on secure distribution, a secure distribution method is proposed, including users and regions classification, hierarchical control and keys generation, and multi-level encryption based on regions. The combination of the three parts can make that the same remote sensing images after multi-level encryption processing are distributed to different permission users through multicast, but different permission users can obtain different degree information after decryption through their own decryption keys. It well meets user access control and security needs in the process of high resolution remote sensing image distribution. The experimental results prove the effectiveness of the proposed method which is suitable for practical use in the secure transmission of remote sensing images including confidential information over internet.

  4. Secure remote synchronization and secure key distribution in electro-optic networks revealed by symmetries

    NASA Astrophysics Data System (ADS)

    Xu, Mingfeng; Pan, Wei; Zhang, Liyue

    2018-07-01

    Despite the intuition that synchronization of different nodes in coupled oscillator networks results from information exchange between them, it has recently been shown that remote nodes could be partially synchronous even when they are separated by intermediately unsynchronized nodes. Here based on electro-optic system, we report on a more stronger form of such synchronization pattern that is termed as secure remote synchronization, in which two remotely separated nodes could have identically synchronized dynamical behaviors while the rest of the network are both statistically and information-theoretically incoherent relative to the two synchronized nodes. The generalized form of mirror symmetry in the network structure is identified to be a key mechanism allowing for secure remote synchronization. Moreover, this synchronization mode is robust against a wild range of system parameters and noise perturbing the intermediary dynamics. The lack of information about the synchronized dynamics in the rest of the network suggests that our results could potentially lead to network-based solutions for secure key distribution and secure communication.

  5. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    PubMed Central

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  6. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  7. Estimating crop yields and crop evapotranspiration distributions from remote sensing and geospatial agricultural data

    NASA Astrophysics Data System (ADS)

    Smith, T.; McLaughlin, D.

    2017-12-01

    Growing more crops to provide a secure food supply to an increasing global population will further stress land and water resources that have already been significantly altered by agriculture. The connection between production and resource use depends on crop yields and unit evapotranspiration (UET) rates that vary greatly, over both time and space. For regional and global analyses of food security it is appropriate to treat yield and UET as uncertain variables conditioned on climatic and soil properties. This study describes how probability distributions of these variables can be estimated by combining remotely sensed land use and evapotranspiration data with in situ agronomic and soils data, all available at different resolutions and coverages. The results reveal the influence of water and temperature stress on crop yield at large spatial scales. They also provide a basis for stochastic modeling and optimization procedures that explicitly account for uncertainty in the environmental factors that affect food production.

  8. Land remote sensing commercialization: A status report

    NASA Technical Reports Server (NTRS)

    Bishop, W. P.; Heacock, E. L.

    1984-01-01

    The current offer by the United States Department of Commerce to transfer the U.S. land remote sensing program to the private sector is described. A Request for Proposals (RFP) was issued, soliciting offers from U.S. firms to provide a commercial land remote sensing satellite system. Proposals must address a complete system including satellite, communications, and ground data processing systems. Offerors are encouraged to propose to take over the Government LANDSAT system which consists of LANDSAT 4 and LANDSAT D'. Also required in proposals are the market development procedures and plans to ensure that commercialization is feasible and the business will become self-supporting at the earliest possible time. As a matter of Federal Policy, the solicitation is designed to protect both national security and foreign policy considerations. In keeping with these concerns, an offeror must be a U.S. Firm. Requirements for data quality, quantity, distribution and delivery are met by current operational procedures. It is the Government's desire that the Offeror be prepared to develop and operate follow-on systems without Government subsidies. However, to facilitate rapid commercialization, an offeror may elect to include in his proposal mechanisms for short term government financial assistance.

  9. Security warning system monitors up to fifteen remote areas simultaneously

    NASA Technical Reports Server (NTRS)

    Fusco, R. C.

    1966-01-01

    Security warning system consisting of 15 television cameras is capable of monitoring several remote or unoccupied areas simultaneously. The system uses a commutator and decommutator, allowing time-multiplexed video transmission. This security system could be used in industrial and retail establishments.

  10. DoD Program for Stability of Civilian Employment: Policies, Procedures, and Programs Manual

    DTIC Science & Technology

    1990-09-01

    employment outside the labor market area of the releasing activity and who elect to have the movement of household goods at the expense of the Federal...other local media . 2. Providing an informational service to the workforce, including remote serviced activities, to reinstatement eligibles, and to...program in which they are to be entered. Starting with the Social Security Number, each element of information on the form is preceded by a number in

  11. THE NEW DIMENSIONS OF REMOTE SENSING AND GLOBAL SECURITY

    EPA Science Inventory

    Remote sensing as a science and as a paradigm was borne from the critical need for battlefield intelligence and grew and thrived as one of the fundamental cornerstones of national security. To a great extent, the development ofmany aspects and accepted principals of remote sensin...

  12. Smart Cards and remote entrusting

    NASA Astrophysics Data System (ADS)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  13. Famine Early Warning Systems and Their Use of Satellite Remote Sensing Data

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Essam, Timothy; Leonard, Kenneth

    2011-01-01

    Famine early warning organizations have experience that has much to contribute to efforts to incorporate climate and weather information into economic and political systems. Food security crises are now caused almost exclusively by problems of food access, not absolute food availability, but the role of monitoring agricultural production both locally and globally remains central. The price of food important to the understanding of food security in any region, but it needs to be understood in the context of local production. Thus remote sensing is still at the center of much food security analysis, along with an examination of markets, trade and economic policies during food security analyses. Technology including satellite remote sensing, earth science models, databases of food production and yield, and modem telecommunication systems contributed to improved food production information. Here we present an econometric approach focused on bringing together satellite remote sensing and market analysis into food security assessment in the context of early warning.

  14. EMC problems on board the remote sensing and communications satellites equipped with electric propulsions

    NASA Astrophysics Data System (ADS)

    Plokhikh, A.; Vazhenin, N.; Soganova, G.

    Wide application of electric propulsions (EP) as attitude control and orbit correction thrusters for a numerous class of satellites (remote sensing and communications satellites including) imposes new problems before the developers in meeting the electromagnetic compatibility requirements on board these satellites. This is connected with the fact that any EP is a source of interference broad-band emission reaching, as a rule, frequency ranges used by on-board radio systems designed for remote sensing and communications. In this case, reliable joint operation should be secured for the highly sensitive on -board radio receiving systems and sensors of remote sensing systems on one hand and EP on the other. In view of this, analysis is rather actual for the influence of EP interference emission upon the parameters and characteristics of modern remote sensing and communications systems. Procedures and results of typical operating characteristics calculation for the radio systems with the presence of operating EP on board are discussed in the paper on the basis of systematic approach with the following characteristics being among them: signal-to-noise ratio, range, data transmission rate, error probability, etc. EP effect is taken into account by the statistical analysis for the results of joint influence of valid signal and interference produced by EP upon the quality indices of communication systems and paths of the sensors being the parts of remote sensing systems. Test data for the measured EP interference characteristics were used for qualitative assessments. All necessary measurements were made by authors on the basis of the test procedure developed by them for assessing self- em ission of EP under ground conditions that may be used as a base for the certification of such measurements. Analysis was made on the basis of test data obtained and calculation procedures developed by authors for the EP influence upon the qualitative characteristics of remote sensing and communications radio systems that revealed the presence of destructive effect resulting in substantial decrease in maximum range and data transmission rate, as well as reduction of sensitivity for the sensors of remote sensing systems. Recommendations are given on the basis of analysis made for the optimization of radio systems and calibration of their sensors at a presence of electric propulsions on board the satellites.

  15. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  16. A remote data access architecture for home-monitoring health-care applications.

    PubMed

    Lin, Chao-Hung; Young, Shuenn-Tsong; Kuo, Te-Son

    2007-03-01

    With the aging of the population and the increasing patient preference for receiving care in their own homes, remote home care is one of the fastest growing areas of health care in Taiwan and many other countries. Many remote home-monitoring applications have been developed and implemented to enable both formal and informal caregivers to have remote access to patient data so that they can respond instantly to any abnormalities of in-home patients. The aim of this technology is to give both patients and relatives better control of the health care, reduce the burden on informal caregivers and reduce visits to hospitals and thus result in a better quality of life for both the patient and his/her family. To facilitate their widespread adoption, remote home-monitoring systems take advantage of the low-cost features and popularity of the Internet and PCs, but are inherently exposed to several security risks, such as virus and denial-of-service (DoS) attacks. These security threats exist as long as the in-home PC is directly accessible by remote-monitoring users over the Internet. The purpose of the study reported in this paper was to improve the security of such systems, with the proposed architecture aimed at increasing the system availability and confidentiality of patient information. A broker server is introduced between the remote-monitoring devices and the in-home PCs. This topology removes direct access to the in-home PC, and a firewall can be configured to deny all inbound connections while the remote home-monitoring application is operating. This architecture helps to transfer the security risks from the in-home PC to the managed broker server, on which more advanced security measures can be implemented. The pros and cons of this novel architecture design are also discussed and summarized.

  17. A Study on the Commercialization of Space-Based Remote Sensing in the Twenty-First Century and Its Implications to United States National Security

    DTIC Science & Technology

    2011-06-01

    Remote sensing from space provides critical data for many commercial space applications. Due to global market demand, it has undergone tremendous...commercial space imaging capability in the future, remote sensing policy makers, systems engineers, and industry analysts must be aware of the implications to United States National Security....available dissemination and accessibility. The analysis results, together with the findings from a review of commercial programs, initiatives, and remote

  18. Scalable Trust of Next-Generation Management (STRONGMAN)

    DTIC Science & Technology

    2004-10-01

    remote logins might be policy controlled to allow only strongly encrypted IPSec tunnels to log in remotely, to access selected files, etc. The...and Angelos D. Keromytis. Drop-in Security for Distributed and Portable Computing Elements. Emerald Journal of Internet Research. Electronic...Security and Privacy, pp. 17-31, May 1999. [2] S. M. Bellovin. Distributed Firewalls. ; login : magazine, special issue on security, November 1999. [3] M

  19. Distributed computing testbed for a remote experimental environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butner, D.N.; Casper, T.A.; Howard, B.C.

    1995-09-18

    Collaboration is increasing as physics research becomes concentrated on a few large, expensive facilities, particularly in magnetic fusion energy research, with national and international participation. These facilities are designed for steady state operation and interactive, real-time experimentation. We are developing tools to provide for the establishment of geographically distant centers for interactive operations; such centers would allow scientists to participate in experiments from their home institutions. A testbed is being developed for a Remote Experimental Environment (REE), a ``Collaboratory.`` The testbed will be used to evaluate the ability of a remotely located group of scientists to conduct research on themore » DIII-D Tokamak at General Atomics. The REE will serve as a testing environment for advanced control and collaboration concepts applicable to future experiments. Process-to-process communications over high speed wide area networks provide real-time synchronization and exchange of data among multiple computer networks, while the ability to conduct research is enhanced by adding audio/video communication capabilities. The Open Software Foundation`s Distributed Computing Environment is being used to test concepts in distributed control, security, naming, remote procedure calls and distributed file access using the Distributed File Services. We are exploring the technology and sociology of remotely participating in the operation of a large scale experimental facility.« less

  20. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.

    PubMed

    Griggs, Kristen N; Ossipova, Olya; Kohlios, Christopher P; Baccarini, Alessandro N; Howson, Emily A; Hayajneh, Thaier

    2018-06-06

    As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI) generated by these devices, we propose utilizing blockchain-based smart contracts to facilitate secure analysis and management of medical sensors. Using a private blockchain based on the Ethereum protocol, we created a system where the sensors communicate with a smart device that calls smart contracts and writes records of all events on the blockchain. This smart contract system would support real-time patient monitoring and medical interventions by sending notifications to patients and medical professionals, while also maintaining a secure record of who has initiated these activities. This would resolve many security vulnerabilities associated with remote patient monitoring and automate the delivery of notifications to all involved parties in a HIPAA compliant manner.

  1. Remote video assessment for missile launch facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.; Stewart, W.A.

    1995-07-01

    The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less

  2. Understanding food security issues in remote Western Australian Indigenous communities.

    PubMed

    Pollard, Christina M; Nyaradi, Anett; Lester, Matthew; Sauer, Kay

    2014-08-01

    Food insecurity in remote Western Australian (WA) Indigenous communities. This study explored remote community store managers' views on issues related to improving food security in order to inform health policy. A census of all remote WA Indigenous community store managers was conducted in 2010. Telephone interviews sought managers' perceptions of community food insecurity, problems with their store, and potential policy options for improving the supply, accessibility, affordability and consumption of nutritious foods. Descriptive analyses were conducted using SPSS for Windows version 17.0. Managers stated that freight costs and irregular deliveries contributed to high prices and a limited range of foods. Poor store infrastructure, compromised cold chain logistics, and commonly occurring power outages affected food quality. Half of the managers said there was hunger in their community because people did not have enough money to buy food. The role of nutritionists beyond a clinical and educational role was not understood. Food security interventions in remote communities need to take into consideration issues such as freight costs, transport and low demand for nutritious foods. Store managers provide important local knowledge regarding the development and implementation of food security interventions. SO WHAT? Agencies acting to address the issue of food insecurity in remote WA Indigenous communities should heed the advice of community store managers that high food prices, poor quality and limited availability are mainly due to transport inefficiencies and freight costs. Improving healthy food affordability in communities where high unemployment and low household income abound is fundamental to improving food security, yet presents a significant challenge.

  3. Virtual blood bank

    PubMed Central

    Wong, Kit Fai

    2011-01-01

    Virtual blood bank is the computer-controlled, electronically linked information management system that allows online ordering and real-time, remote delivery of blood for transfusion. It connects the site of testing to the point of care at a remote site in a real-time fashion with networked computers thus maintaining the integrity of immunohematology test results. It has taken the advantages of information and communication technologies to ensure the accuracy of patient, specimen and blood component identification and to enhance personnel traceability and system security. The built-in logics and process constraints in the design of the virtual blood bank can guide the selection of appropriate blood and minimize transfusion risk. The quality of blood inventory is ascertained and monitored, and an audit trail for critical procedures in the transfusion process is provided by the paperless system. Thus, the virtual blood bank can help ensure that the right patient receives the right amount of the right blood component at the right time. PMID:21383930

  4. Legitimate data in remote monitoring.

    PubMed

    Schilling, J D

    2009-01-01

    An approach for ensuring legitimate data transfers of an individual within a remote healthcare solution. Biometric traits and networking are discussed for clarification of the approach. In this approach, a biometric solution is identified as a fingerprint scanner for use in a personal area network of the patient's home. Secure data exchange is acknowledged as a potential weakness in the transferring of patient data within this network. Some options are discussed to ensure security of data for the review by the caregiver. Example approaches regarding legitimacy are identified using a pulse oximeter [1], a blood pressure meter, and a weight scale as the remote patient devices in the remote healthcare solution.

  5. 49 CFR 193.2903 - Security procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...

  6. 49 CFR 193.2903 - Security procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...

  7. 49 CFR 193.2903 - Security procedures.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...

  8. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Securities trading policies and procedures. 12... RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 12.7 Securities trading policies and procedures. (a) Policies and procedures; reports of securities trading. A national bank effecting securities...

  9. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Securities trading policies and procedures. 12... RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 12.7 Securities trading policies and procedures. (a) Policies and procedures; reports of securities trading. A national bank effecting securities...

  10. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Securities trading policies and procedures. 12... RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 12.7 Securities trading policies and procedures. (a) Policies and procedures; reports of securities trading. A national bank effecting securities...

  11. 46 CFR 111.54-3 - Remote control.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Remote control. 111.54-3 Section 111.54-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Circuit Breakers § 111.54-3 Remote control. Remotely controlled circuit breakers must have local...

  12. 46 CFR 111.54-3 - Remote control.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Remote control. 111.54-3 Section 111.54-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Circuit Breakers § 111.54-3 Remote control. Remotely controlled circuit breakers must have local...

  13. 46 CFR 111.54-3 - Remote control.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Remote control. 111.54-3 Section 111.54-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Circuit Breakers § 111.54-3 Remote control. Remotely controlled circuit breakers must have local...

  14. 46 CFR 111.54-3 - Remote control.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Remote control. 111.54-3 Section 111.54-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Circuit Breakers § 111.54-3 Remote control. Remotely controlled circuit breakers must have local...

  15. 46 CFR 111.54-3 - Remote control.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Remote control. 111.54-3 Section 111.54-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Circuit Breakers § 111.54-3 Remote control. Remotely controlled circuit breakers must have local...

  16. A graphite oxide (GO)-based remote readable tamper evident seal

    DOE PAGES

    Cattaneo, Alessandro; Bossert, Jason Andrew; Guzman, Christian; ...

    2016-09-08

    Here, this paper presents a prototype of a remotely readable graphite oxide (GO) paper-based tamper evident seal. The proposed device combines the tunable electrical properties offered by reduced graphite oxide (RGO) with a compressive sampling scheme. The benefit of using RGO as a tamper evident seal material is the sensitivity of its electrical properties to the common mechanisms adopted to defeat tamper-evident seals. RGO’s electrical properties vary upon local stress or cracks induced by mechanical action (e.g., produced by shimming or lifting attacks). Further, modification of the seal’s electrical properties can result from the incidence of other defeat mechanisms, suchmore » as temperature changes, solvent treatment and steam application. The electrical tunability of RGO enables the engraving of a circuit on the area of the tamper evident seal intended to be exposed to malicious attacks. The operation of the tamper evident seal, as well as its remote communication functionality, is supervised by a microcontroller unit (MCU). The MCU uses the RGO-engraved circuitry to physically implement a compressive sampling acquisition procedure. The compressive sampling scheme provides the seal with self-authentication and self-state-of-health awareness capabilities. Finally, the prototype shows potential for use in low-power, embedded, remote-operation nonproliferation security related applications.« less

  17. Through the Looking Glass: Real-Time Video Using 'Smart' Technology Provides Enhanced Intraoperative Logistics.

    PubMed

    Baldwin, Andrew C W; Mallidi, Hari R; Baldwin, John C; Sandoval, Elena; Cohn, William E; Frazier, O H; Singh, Steve K

    2016-01-01

    In the setting of increasingly complex medical therapies and limited physician resources, the recent emergence of 'smart' technology offers tremendous potential for improved logistics, efficiency, and communication between medical team members. In an effort to harness these capabilities, we sought to evaluate the utility of this technology in surgical practice through the employment of a wearable camera device during cardiothoracic organ recovery. A single procurement surgeon was trained for use of an Explorer Edition Google Glass (Google Inc., Mountain View, CA) during the recovery process. Live video feed of each procedure was securely broadcast to allow for members of the home transplant team to remotely participate in organ assessment. Primary outcomes involved demonstration of technological feasibility and validation of quality assurance through group assessment. The device was employed for the recovery of four organs: a right single lung, a left single lung, and two bilateral lung harvests. Live video of the visualization process was remotely accessed by the home transplant team, and supplemented final verification of organ quality. In each case, the organs were accepted for transplant without disruption of standard procurement protocols. Media files generated during the procedures were stored in a secure drive for future documentation, evaluation, and education purposes without preservation of patient identifiers. Live video streaming can improve quality assurance measures by allowing off-site members of the transplant team to participate in the final assessment of donor organ quality. While further studies are needed, this project suggests that the application of mobile 'smart' technology offers not just immediate value, but the potential to transform our approach to the practice of medicine.

  18. Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.

    ERIC Educational Resources Information Center

    Webster, Peter

    2002-01-01

    Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)

  19. 33 CFR 117.42 - Remotely operated and automated drawbridges.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS General Requirements § 117.42 Remotely operated and... authorize a drawbridge to operate under an automated system or from a remote location. (b) If the request is... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Remotely operated and automated...

  20. Real-time inspection by submarine images

    NASA Astrophysics Data System (ADS)

    Tascini, Guido; Zingaretti, Primo; Conte, Giuseppe

    1996-10-01

    A real-time application of computer vision concerning tracking and inspection of a submarine pipeline is described. The objective is to develop automatic procedures for supporting human operators in the real-time analysis of images acquired by means of cameras mounted on underwater remotely operated vehicles (ROV) Implementation of such procedures gives rise to a human-machine system for underwater pipeline inspection that can automatically detect and signal the presence of the pipe, of its structural or accessory elements, and of dangerous or alien objects in its neighborhood. The possibility of modifying the image acquisition rate in the simulations performed on video- recorded images is used to prove that the system performs all necessary processing with an acceptable robustness working in real-time up to a speed of about 2.5 kn, widely greater than that the actual ROVs and the security features allow.

  1. Concept of Operations for the Next Generation Air Transportation System. Version 3.2

    DTIC Science & Technology

    2011-01-01

    Airside. Security Identification Display Area/Airport ( SIDA ) operations area, terminal perimeter, terminal airspace (security) • Landside. Terminal...Definition RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM Separation Management

  2. Evaluating the Use of Remote Sensing Data in the USAID Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Brickley, Elizabeth B.

    2011-01-01

    The US Agency for International Development (USAID) s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. Here we analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000-2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices and food access parameters in their analysis of food security problems. The reports display large scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data was used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10%, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  3. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  4. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  5. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  6. 75 FR 32360 - Proposed Information Collection; Comment Request; Licensing of Private Remote-Sensing Space Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... Collection; Comment Request; Licensing of Private Remote-Sensing Space Systems AGENCY: National Oceanic and.... Abstract NOAA has established requirements for the licensing of private operators of remote-sensing space... Land Remote- Sensing Policy Act of 1992 and with the national security and international obligations of...

  7. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  8. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  9. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  10. Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission

    NASA Astrophysics Data System (ADS)

    Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue

    This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.

  11. Remote sensing of global croplands for food security

    USGS Publications Warehouse

    Thenkabail, Prasad S.; Biradar, Chandrashekhar M.; Turral, Hugh; Lyon, John G.

    2009-01-01

    Increases in populations have created an increasing demand for food crops while increases in demand for biofuels have created an increase in demand for fuel crops. What has not increased is the amount of croplands and their productivity. These and many other factors such as decreasing water resources in a changing climate have created a crisis like situation in global food security. Decision makers in these situations need accurate information based on science. Remote Sensing of Global Croplands for Food Security provides a comprehensive knowledge base in use of satellite sensor-based maps and statistics that can be used to develop strategies for croplands (irrigated and rainfed) and their water use for food security.

  12. Implementation of the Web-based laboratory

    NASA Astrophysics Data System (ADS)

    Ying, Liu; Li, Xunbo

    2005-12-01

    With the rapid developments of Internet technologies, remote access and control via Internet is becoming a reality. A realization of the web-based laboratory (the W-LAB) was presented. The main target of the W-LAB was to allow users to easily access and conduct experiments via the Internet. While realizing the remote communication, a system, which adopted the double client-server architecture, was introduced. It ensures the system better security and higher functionality. The experimental environment implemented in the W-Lab was integrated by both virtual lab and remote lab. The embedded technology in the W-LAB system as an economical and efficient way to build the distributed infrastructural network was introduced. Furthermore, by introducing the user authentication mechanism in the system, it effectively secures the remote communication.

  13. Sandia National Laboratories: Directed-energy tech receives funding to

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research

  14. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  15. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  16. 47 CFR 36.157 - Host/remote message Cable and Wire Facilities (C&WF)-Category 4-apportionment procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Host/remote message Cable and Wire Facilities... TELECOMMUNICATIONS COMPANIES 1 Telecommunications Property Cable and Wire Facilities § 36.157 Host/remote message Cable and Wire Facilities (C&WF)—Category 4—apportionment procedures. (a) Host/Remote Message C&WF...

  17. 47 CFR 36.157 - Host/remote message Cable and Wire Facilities (C&WF)-Category 4-apportionment procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Host/remote message Cable and Wire Facilities... TELECOMMUNICATIONS COMPANIES 1 Telecommunications Property Cable and Wire Facilities § 36.157 Host/remote message Cable and Wire Facilities (C&WF)—Category 4—apportionment procedures. (a) Host/Remote Message C&WF...

  18. Transcontinental telementoring with pediatric surgeons: proof of concept and technical considerations.

    PubMed

    Ponsky, Todd A; Bobanga, Iuliana D; Schwachter, Marc; Stathos, Theodore H; Rosen, Michael; Parry, Robert; Nalugo, Margaret; Rothenberg, Steven S

    2014-12-01

    To evaluate different technologies that can facilitate telementoring in a variety of pediatric surgical procedures. Two different telementoring technologies were used to provide two-way audio and visual communication between experienced pediatric surgeon mentors located in another city and less experienced trainees performing a surgical procedure. The first technology consisted of store-bought equipment that connected the operating room laparoscope to a Skype™ (Microsoft, Redmond, WA) connection (used in 1 case), whereas the second was a proprietary telementoring robot, Karl Storz Endoscopy-America, Inc. VisitOR1(®) (Karl Storz GmbH & Co. KG, Tuttlingen, Germany) (used in 5 cases). The procedures included a video-assisted thoracic surgery lower lobectomy, a temporary and two permanent gastric stimulator placements, and two laparoscopic inguinal hernia repairs and were performed by pediatric surgeons (3 cases), a pediatric gastroenterologist (1 case), and a general surgeon (2 cases) under the guidance of pediatric surgeon mentors. All procedures were completed successfully in a time-efficient manner, without loss of transmission and without complications. Although the Skype technology was less costly, it lacked telestrator capacity and was not adequately secure. The VisitOR1 telementoring robot enabled high-resolution video communication, had telestrator capacity, and allowed pointing during the procedure. The mentors assisted with trocar placement, modifying the surgical technique, identifying planes of dissection, and indicating locations of device and suture placement. Telementoring is a useful adjunct in the field of pediatric surgery that can aid in the transfer of surgical skills remotely and shorten the time to implementation of new surgical techniques into practice. Optimal telementoring technology should have a secure wireless connection, high video resolution, and minimal bandwidth latency.

  19. Evaluating the Use of Remote Sensing Data in the U.S. Agency for International Development Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly Elizabeth; Brickley, Elizabeth B

    2012-01-01

    The U.S. Agency for International Development (USAID)'s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods, and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. We analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000 to 2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices, and food access parameters in their analysis of food security problems. The reports display large-scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data were used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10% of the time, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  20. Optical Power Transfer System for Powering a Remote Mobility System for Multiple Missions

    NASA Technical Reports Server (NTRS)

    Hogan, Bartholomew P. (Inventor); Stone, William C. (Inventor)

    2016-01-01

    An optical power transfer system for powering a remote mobility system for multiple missions comprising a high power source and a chilling station connected to a laser source. The laser source transmits a high optical energy to a beam switch assembly via an optical fiber. The beam switch assembly is optically connected to actively cooled fiber spoolers. Docking stations are adapted for securing the fiber spoolers until alternatively ready for use by a remote mobility system. The remote mobility system is optically connected to the fiber spoolers and has a receiving port adapted for securing the fiber spoolers thereon. The fiber spooler transmits the optical energy to a power conversion system which converts the optical energy received to another usable form of energy. More than one power source may be used where the remote mobility system transfers from one source to another while maintaining an operational radius to each source.

  1. Secure open cloud in data transmission using reference pattern and identity with enhanced remote privacy checking

    NASA Astrophysics Data System (ADS)

    Vijay Singh, Ran; Agilandeeswari, L.

    2017-11-01

    To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.

  2. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †

    PubMed Central

    Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V.

    2016-01-01

    There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. PMID:27023540

  3. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.

    PubMed

    Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V

    2016-03-24

    There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.

  4. An object-based storage model for distributed remote sensing images

    NASA Astrophysics Data System (ADS)

    Yu, Zhanwu; Li, Zhongmin; Zheng, Sheng

    2006-10-01

    It is very difficult to design an integrated storage solution for distributed remote sensing images to offer high performance network storage services and secure data sharing across platforms using current network storage models such as direct attached storage, network attached storage and storage area network. Object-based storage, as new generation network storage technology emerged recently, separates the data path, the control path and the management path, which solves the bottleneck problem of metadata existed in traditional storage models, and has the characteristics of parallel data access, data sharing across platforms, intelligence of storage devices and security of data access. We use the object-based storage in the storage management of remote sensing images to construct an object-based storage model for distributed remote sensing images. In the storage model, remote sensing images are organized as remote sensing objects stored in the object-based storage devices. According to the storage model, we present the architecture of a distributed remote sensing images application system based on object-based storage, and give some test results about the write performance comparison of traditional network storage model and object-based storage model.

  5. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  6. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  7. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  8. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  9. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  10. [A mobile sensor for remote detection of natural gas leakage].

    PubMed

    Zhang, Shuai; Liu, Wen-qing; Zhang, Yu-jun; Kan, Rui-feng; Ruan, Jun; Wang, Li-ming; Yu, Dian-qiang; Dong, Jin-ting; Han, Xiao-lei; Cui, Yi-ben; Liu, Jian-guo

    2012-02-01

    The detection of natural gas pipeline leak becomes a significant issue for body security, environmental protection and security of state property. However, the leak detection is difficult, because of the pipeline's covering many areas, operating conditions and complicated environment. A mobile sensor for remote detection of natural gas leakage based on scanning wavelength differential absorption spectroscopy (SWDAS) is introduced. The improved soft threshold wavelet denoising was proposed by analyzing the characteristics of reflection spectrum. And the results showed that the signal to noise ratio (SNR) was increased three times. When light intensity is 530 nA, the minimum remote sensitivity will be 80 ppm x m. A widely used SWDAS can make quantitative remote sensing of natural gas leak and locate the leak source precisely in a faster, safer and more intelligent way.

  11. Secure and lightweight network admission and transmission protocol for body sensor networks.

    PubMed

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Zhang, Pingxin

    2013-05-01

    A body sensor network (BSN) is a wireless network of biosensors and a local processing unit, which is commonly referred to as the personal wireless hub (PWH). Personal health information (PHI) is collected by biosensors and delivered to the PWH before it is forwarded to the remote healthcare center for further processing. In a BSN, it is critical to only admit eligible biosensors and PWH into the network. Also, securing the transmission from each biosensor to PWH is essential not only for ensuring safety of PHI delivery, but also for preserving the privacy of PHI. In this paper, we present the design, implementation, and evaluation of a secure network admission and transmission subsystem based on a polynomial-based authentication scheme. The procedures in this subsystem to establish keys for each biosensor are communication efficient and energy efficient. Moreover, based on the observation that an adversary eavesdropping in a BSN faces inevitable channel errors, we propose to exploit the adversary's uncertainty regarding the PHI transmission to update the individual key dynamically and improve key secrecy. In addition to the theoretical analysis that demonstrates the security properties of our system, this paper also reports the experimental results of the proposed protocol on resource-limited sensor platforms, which show the efficiency of our system in practice.

  12. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  13. An Additional Prior Retrieval Alters the Effects of a Retrieval-Extinction Procedure on Recent and Remote Fear Memory

    PubMed Central

    An, Xianli; Yang, Ping; Chen, Siguang; Zhang, Fenfen; Yu, Duonan

    2018-01-01

    Several studies have shown that the isolated retrieval of a consolidated fear memory can induce a labile phase, during which extinction training can prevent the reinstatement, a form of relapse in which fear response to a fear-provoking context returns when a mild shock is presented. However, fear memory retrieval may also have another opposing result: the enhancement of fear memory. This implies that the fear memory trace can be modified by a brief retrieval. Unclear is whether the fear-impairing effect of retrieval-extinction (RE) is altered by a prior brief retrieval. The present study investigated the responses of recent and remote fear memories to the RE procedure after the presentation of an additional prior retrieval (priRet). We found that a single RE procedure effectively blocked the reinstatement of 2-day recent contextual fear memory. The memory-impairing effect of the RE procedure on recent fear was not observed when priRet was presented 6 or 24 h before the RE procedure. In contrast to the 2-day recent memory, the RE procedure failed to block the reinstatement of 36-day remote fear memory but successfully disrupted the return of remote fear memory after priRet. This memory-disruptive effect on remote memory did not occur when priRet was performed in a novel context. Nimodipine administration revealed that the blockade of priRet-induced processes recovered the effects of the RE procedure on both recent and remote fear memories. Our findings suggest that the susceptibility of recent and remote fear memories to RE procedures can be altered by an additional retrieval. PMID:29358910

  14. An Additional Prior Retrieval Alters the Effects of a Retrieval-Extinction Procedure on Recent and Remote Fear Memory.

    PubMed

    An, Xianli; Yang, Ping; Chen, Siguang; Zhang, Fenfen; Yu, Duonan

    2017-01-01

    Several studies have shown that the isolated retrieval of a consolidated fear memory can induce a labile phase, during which extinction training can prevent the reinstatement, a form of relapse in which fear response to a fear-provoking context returns when a mild shock is presented. However, fear memory retrieval may also have another opposing result: the enhancement of fear memory. This implies that the fear memory trace can be modified by a brief retrieval. Unclear is whether the fear-impairing effect of retrieval-extinction (RE) is altered by a prior brief retrieval. The present study investigated the responses of recent and remote fear memories to the RE procedure after the presentation of an additional prior retrieval (priRet). We found that a single RE procedure effectively blocked the reinstatement of 2-day recent contextual fear memory. The memory-impairing effect of the RE procedure on recent fear was not observed when priRet was presented 6 or 24 h before the RE procedure. In contrast to the 2-day recent memory, the RE procedure failed to block the reinstatement of 36-day remote fear memory but successfully disrupted the return of remote fear memory after priRet. This memory-disruptive effect on remote memory did not occur when priRet was performed in a novel context. Nimodipine administration revealed that the blockade of priRet-induced processes recovered the effects of the RE procedure on both recent and remote fear memories. Our findings suggest that the susceptibility of recent and remote fear memories to RE procedures can be altered by an additional retrieval.

  15. Remote Sensing Laboratory - RSL

    ScienceCinema

    None

    2018-01-16

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  16. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  17. Remote Sensing Laboratory - RSL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip,more » maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.« less

  18. UAVs Being Used for Environmental Surveying

    ScienceCinema

    Chung, Sandra

    2017-12-09

    UAVs, are much more sophisticated than your typical remote-controlled plane. INL robotics and remote sensing experts have added state-of-the-art imaging and wireless technology to the UAVs to create intelligent remote surveillance craft that can rapidly survey a wide area for damage and track down security threats.

  19. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  20. Safe Grid

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.

  1. Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now

    Science.gov Websites

    Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  2. Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  3. Video movie making using remote procedure calls and 4BSD Unix sockets on Unix, UNICOS, and MS-DOS systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robertson, D.W.; Johnston, W.E.; Hall, D.E.

    1990-03-01

    We describe the use of the Sun Remote Procedure Call and Unix socket interprocess communication mechanisms to provide the network transport for a distributed, client-server based, image handling system. Clients run under Unix or UNICOS and servers run under Unix or MS-DOS. The use of remote procedure calls across local or wide-area networks to make video movies is addressed.

  4. 12 CFR 208.61 - Bank security procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...; the cost of the security devices; other security measures in effect at the banking office; and the... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Bank security procedures. 208.61 Section 208.61....61 Bank security procedures. (a) Authority, purpose, and scope. Pursuant to section 3 of the Bank...

  5. PPS GPS: What Is It? And How Do I Get It

    DTIC Science & Technology

    1994-06-01

    Positioning Service, Selective Availabilit B.PRICE CODIE 17. SECURITY CLASSIFICATION II. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20...the TEC Water Detection Response Team which operates in remote areas of the world. These activities, require the GPS receiver to be capable of removing

  6. Helping Hands: Using Augmented Reality to Provide Remote Guidance to Health Professionals.

    PubMed

    Mather, Carey; Barnett, Tony; Broucek, Vlasti; Saunders, Annette; Grattidge, Darren; Huang, Weidong

    2017-01-01

    Access to expert practitioners or geographic distance can compound the capacity for appropriate supervision of health professionals in the workplace. Guidance and support of clinicians and students to undertake new or infrequent procedures can be resource intensive. The Helping Hands remote augmented reality system is an innovation to support the development of, and oversee the acquisition of procedural skills through remote learning and teaching supervision while in clinical practice. Helping Hands is a wearable, portable, hands-free, low cost system comprised of two networked laptops, a head-mounted display worn by the recipient and a display screen used remotely by the instructor. Hand hygiene was used as the test procedure as it is a foundation skill learned by all health profession students. The technology supports unmediated remote gesture guidance by augmenting the object with the Helping Hands of a health professional. A laboratory-based study and field trial tested usability and feasibility of the remote guidance system. The study found the Helping Hands system did not compromise learning outcomes. This innovation has the potential to transform remote learning and teaching supervision by enabling health professionals and students opportunities to develop and improve their procedural performance at the workplace.

  7. 76 FR 30243 - Minimum Security Devices and Procedures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A. Description: The requirement that savings associations establish a written security program is necessitated by...

  8. FlySec: a risk-based airport security management system based on security as a service concept

    NASA Astrophysics Data System (ADS)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  9. Security for Multimedia Space Data Distribution over the Internet

    NASA Technical Reports Server (NTRS)

    Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)

    1995-01-01

    Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.

  10. A Comparative Study of Online Remote Proctored versus Onsite Proctored High-Stakes Exams

    ERIC Educational Resources Information Center

    Weiner, John A.; Hurtz, Gregory M.

    2017-01-01

    Advances in technology have spurred innovations in secure assessment delivery. One such innovation, remote online proctoring, has become increasingly sophisticated and is gaining wider consideration for high-stakes testing. However, there is an absence of published research examining remote online proctoring and its effects on test scores and the…

  11. 46 CFR 38.15-20 - Remote shutdowns-TB/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Remote shutdowns-TB/ALL. 38.15-20 Section 38.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS LIQUEFIED FLAMMABLE GASES Special Requirements § 38.15-20 Remote shutdowns—TB/ALL. (a) All machinery associated with cargo loading, unloading, or...

  12. 46 CFR 38.15-20 - Remote shutdowns-TB/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Remote shutdowns-TB/ALL. 38.15-20 Section 38.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS LIQUEFIED FLAMMABLE GASES Special Requirements § 38.15-20 Remote shutdowns—TB/ALL. (a) All machinery associated with cargo loading, unloading, or...

  13. 46 CFR 38.15-20 - Remote shutdowns-TB/ALL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Remote shutdowns-TB/ALL. 38.15-20 Section 38.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS LIQUEFIED FLAMMABLE GASES Special Requirements § 38.15-20 Remote shutdowns—TB/ALL. (a) All machinery associated with cargo loading, unloading, or...

  14. 46 CFR 38.15-20 - Remote shutdowns-TB/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Remote shutdowns-TB/ALL. 38.15-20 Section 38.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS LIQUEFIED FLAMMABLE GASES Special Requirements § 38.15-20 Remote shutdowns—TB/ALL. (a) All machinery associated with cargo loading, unloading, or...

  15. 46 CFR 38.15-20 - Remote shutdowns-TB/ALL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Remote shutdowns-TB/ALL. 38.15-20 Section 38.15-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS LIQUEFIED FLAMMABLE GASES Special Requirements § 38.15-20 Remote shutdowns—TB/ALL. (a) All machinery associated with cargo loading, unloading, or...

  16. Land Use and Land Cover Change Modeling Using Remote Sensing and Soft Computing Approach to Assess Sugarcane Expansion Impacts in Tropical Agriculture

    NASA Astrophysics Data System (ADS)

    Vicente, L. E.; Koga-Vicente, A.; Friedel, M. J.; Victoria, D.; Zullo, J., Jr.; Gomes, D.; Bayma-Silva, G.

    2014-12-01

    Agriculture is related with land-use/cover changes (LUCC) over large areas and, in recent years, increase in demand of ethanol fuel has been influence in expansion of areas occupied with corn and sugar cane, raw material for ethanol production. Nevertheless, there´s a concern regarding the impacts on food security, such as, decrease in areas planted with food crops. Considering that the LUCC is highly dynamic, the use of Remote Sensing is a tool for monitoring changes quickly and precisely in order to provide information for agricultural planning. In this work, Remote Sensing techniques were used to monitor the LUCC occurred in municipalities of São Paulo state- Brazil related with sugarcane crops expansion in order to (i) evaluate and quantify the previous land cover in areas of sugarcane crop expansion, and (ii) provide information to elaborate a future land cover scenario based on Self Organizing Map (SOM) approach. The land cover classification procedure was based on Landsat 5 TM images, obtained from the Global Land Survey. The Landsat images were then segmented into homogeneous objects, with represent areas on the ground with similar spatial and spectral characteristics. These objects are related to the distinct land cover types that occur in each municipality. The segmentation procedure resulted in polygons over the three time periods along twenty years (1990-2010). The land cover for each object was visually identified, based on its shape, texture and spectral characteristics. Land cover types considered were: sugarcane plantations, pasture lands, natural cover, forest plantation, permanent crop, short cycle crop, water bodies and urban areas. SOM technique was used to estimate the values for the future land cover scenarios for the selected municipalities, using the information of land change provided by the remote sensing and data from official sources.

  17. 20 CFR 422.130 - Claim procedure.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.130 Claim procedure. (a) General. The Social Security Administration provides facilities for the public to... station of the Social Security Administration, from the Division of Foreign Claims, Post Office Box 1756...

  18. 76 FR 15368 - Minimum Security Devices and Procedures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... establish a written security program is necessitated by the Bank Protection Act (12 U.S.C. 1881-1884), which...

  19. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  20. 10 CFR 35.610 - Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma stereotactic radiosurgery units. 35.610 Section 35.610 Energy NUCLEAR REGULATORY COMMISSION MEDICAL USE OF BYPRODUCT MATERIAL Photon Emitting Remote Afterloader Units...

  1. 10 CFR 35.610 - Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma stereotactic radiosurgery units. 35.610 Section 35.610 Energy NUCLEAR REGULATORY COMMISSION MEDICAL USE OF BYPRODUCT MATERIAL Photon Emitting Remote Afterloader Units...

  2. 10 CFR 35.610 - Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma stereotactic radiosurgery units. 35.610 Section 35.610 Energy NUCLEAR REGULATORY COMMISSION MEDICAL USE OF BYPRODUCT MATERIAL Photon Emitting Remote Afterloader Units...

  3. 10 CFR 35.610 - Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma stereotactic radiosurgery units. 35.610 Section 35.610 Energy NUCLEAR REGULATORY COMMISSION MEDICAL USE OF BYPRODUCT MATERIAL Photon Emitting Remote Afterloader Units...

  4. 10 CFR 35.610 - Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Safety procedures and instructions for remote afterloader units, teletherapy units, and gamma stereotactic radiosurgery units. 35.610 Section 35.610 Energy NUCLEAR REGULATORY COMMISSION MEDICAL USE OF BYPRODUCT MATERIAL Photon Emitting Remote Afterloader Units...

  5. Methods of Determining Playa Surface Conditions Using Remote Sensing

    DTIC Science & Technology

    1987-10-08

    NO. 11. TITLE (include Security Classification) METHODS OF DETERMINING PLAYA SURFACE CONDITIONS USING REMOTE SENSING 12. PERSONAL AUTHOR(S) J. PONDER...PLAYA SURFACE CONDITIONS USING REMOTE SENSING J. Ponder Henley U. S. Army Engineer Topographic Laboratories Fort Belvoir, Virginia 22060-5546 "ABSTRACT...geochemistry, hydrology and remote sensing but all of these are important to the understanding of these unique geomorphic features. There is a large body

  6. 46 CFR 160.151-49 - Approval of servicing facilities at remote sites.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... remote site, equipment needed for repair does not need to be available at that site. A facility must be... 46 Shipping 6 2011-10-01 2011-10-01 false Approval of servicing facilities at remote sites. 160.151-49 Section 160.151-49 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT...

  7. Early Warning of Food Security Crises in Urban Areas: The Case of Harare, Zimbabwe, 2007

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Funk, Christopher C.

    2008-01-01

    In 2007, the citizens of Harare, Zimbabwe began experiencing an intense food security crisis. The crisis, due to a complex mix of poor government policies, high inflation rates and production decline due to drought, resulted in a massive increase in the number of food insecure people in Harare. The international humanitarian aid response to this crisis was largely successful due to the early agreement among donors and humanitarian aid officials as to the size and nature of the problem. Remote sensing enabled an early and decisive movement of resources greatly assisting the delivery of food aid in a timely manner. Remote sensing data gave a clear and compelling assessment of significant crop production shortfalls, and provided donors of humanitarian assistance a single number around which they could come to agreement. This use of remote sensing data typifies how remote sensing may be used in early warning systems in Africa.

  8. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  9. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  10. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    NASA Astrophysics Data System (ADS)

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-11-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  11. A generalized architecture of quantum secure direct communication for N disjointed users with authentication.

    PubMed

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A

    2015-11-18

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  12. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  13. Remote Sensing for Food Security Monitoring in Afghanistan

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.

    2008-01-01

    Two decades of war have severely weakened Afghanistan s economy and infrastructure. Along with larger impacts on civil stability, education and health care, the current conflict in Afghanistan has resulted in widespread hunger and destitution. The 2005 National Risk and Vulnerability Assessment conducted by the United Nations found that 6.6 million Afghans do not meet their minimum food requirements and approximately 400,000 people each year are seriously affected by natural disasters, such as droughts, floods and extreme weather conditions. Given the poor security situation in the country, systems that will enable remote observations of variations of climate and their impacts on food production are critical for providing an appropriate and timely response. This chapter describes the remote sensing systems and food security analyses that the US Agency for International Development s Famine Early Warning Systems Network (FEWS NET) conducts in Afghanistan to monitor and provide information to international donors to ensure that adequate assistance is provided during this time of development and recovery.

  14. Glucoweb: a case study of secure, remote biomonitoring and communication.

    PubMed

    Nigrin, D J; Kohane, I S

    2000-01-01

    As the Internet begins to play a greater role in many healthcare processes, it is inevitable that remote monitoring of patients' physiological parameters over the Internet will become increasingly commonplace. Internet-based communication between patients and their healthcare providers has already become prevalent, and has gained significant attention in terms of confidentiality issues. However, transmission of data directly from patients' physiological biomonitoring devices over the Web has garnered significantly less focus, especially in the area of authentication and security. In this paper, we describe a prototype system called Glucoweb, which allows patients with diabetes mellitus to transmit their self-monitored blood glucose data directly from their personal glucometer device to their diabetes care provider over the Internet. No customized software is necessary on the patient's computer, only a Web browser and active Internet connection. We use this example to highlight key authentication and security measures that should be considered for devices that transmit healthcare data to remote locations.

  15. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  16. Technology for Waste Treatment at Remote Army Sites

    DTIC Science & Technology

    1986-09-01

    Management "AD-A.17 6 801 i echnology for Waste Treatment at Remote Army Sites by * Richard J. Scholze James E. Alleinan Steve R. Struss EdD. Smith This...62720 IA896 A 1039 IT TITLE (include Security Classification) Technology for Waste Treatment at Remote Army Sites (Unclassified) 12 PERSONAL...management human wastes 13 02 waste treatment remote sites I I wastes (sanitary engineering)~ 19 ABSTRACT (Continue on reverse if necessary and identify by

  17. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  18. Aerospace Communications Security Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to the intercom system for audio surveillance. Audio, video, and "black box" data were simultaneously streamed to the ground, where they were displayed to a Glenn audience of senior management and aviation security team members.

  19. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Procedures for security threat assessment. 1540.205 Section 1540.205 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION...

  20. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  1. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  2. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...

  3. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  4. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...

  5. 48 CFR 245.201-73 - Security classification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Security classification... Procedures 245.201-73 Security classification. Follow the procedures at PGI 245.201-73 for security classification. ...

  6. 48 CFR 245.201-73 - Security classification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Security classification... Procedures 245.201-73 Security classification. Follow the procedures at PGI 245.201-73 for security classification. ...

  7. 20 CFR 422.103 - Social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Social security numbers. 422.103 Section 422.103 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.103 Social security numbers. (a) General. The Social Security Administration (SSA) maintains a...

  8. 20 CFR 422.103 - Social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Social security numbers. 422.103 Section 422.103 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.103 Social security numbers. (a) General. The Social Security Administration (SSA) maintains a...

  9. 20 CFR 422.103 - Social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Social security numbers. 422.103 Section 422.103 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.103 Social security numbers. (a) General. The Social Security Administration (SSA) maintains a...

  10. 20 CFR 422.103 - Social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Social security numbers. 422.103 Section 422.103 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.103 Social security numbers. (a) General. The Social Security Administration (SSA) maintains a...

  11. 20 CFR 422.103 - Social security numbers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Social security numbers. 422.103 Section 422.103 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.103 Social security numbers. (a) General. The Social Security Administration (SSA) maintains a...

  12. REMOTE SENSING APPLICATIONS FOR SUSTAINABLE WATERSHED MANAGEMENT AND FOOD SECURITY

    EPA Science Inventory

    The integration of IKONOS satellite data, airborne color infrared remote sensing, visualization, and decision support tools is discussed, within the contexts of management techniques for minimizing non-point source pollution in inland waterways, such s riparian buffer restoration...

  13. Remote Sensing Information Gateway (RSIG3D) Fact Sheet

    EPA Pesticide Factsheets

    The Remote Sensing Information Gateway-3D (RSIG3D) is a free and downloadable application that provides easy and secure access to petabytes (millions of gigabytes) of atmospheric data that can be used to study complex air quality issues.

  14. Research Library

    Science.gov Websites

    Los Alamos National Laboratory Research Library Search Site submit Contact Us | Remote Access | Subject Guides Los Alamos National Laboratory Menu Contacts Remote Catalog About Awards Electronic Public Research Library: delivering essential knowledge services for national security sciences since 1947 Los

  15. 32 CFR 154.68 - Safeguarding procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Safeguarding procedures. 154.68 Section 154.68 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... Safeguarding procedures. Personnel security investigative reports and personnel security determination...

  16. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  17. Device for remote operation of electrical disconnect

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coleman, Jody Rustyn; Bobbitt, III, John Thomas

    Provided is a device for remote operation of an electrical disconnect. The device can include a handle clamp configured to be secured to an extending member of the electrical disconnect. The device can further include a case clamp configured to be secured to a rigid portion of the electrical disconnect. The device can further include a cable having an exterior sheath coaxially surrounding an inner cable. The inner cable can be coaxially slidable with respect to the exterior sheath. The inner cable can extend through an opening of the case clamp and be secured to the handle clamp. The devicemore » can further include an actuator configured to coaxially slide the inner cable such that the handle clamp is actuated towards the case clamp.« less

  18. A secure operational model for mobile payments.

    PubMed

    Chang, Tao-Ku

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  19. A Secure Operational Model for Mobile Payments

    PubMed Central

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service. PMID:25386607

  20. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

    PubMed Central

    Měsíček, Libor; Choi, Jongsun

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233

  1. Effect of security threats on primary care access in Logar province, Afghanistan.

    PubMed

    Morikawa, Masahiro J

    2008-01-01

    Security threats are a major concern for access to health care in many war-torn communities; however, there is little quantified data on actual access to care in rural communities during war. Kinderberg International e.V. provided primary care in rural Logar province, Afghanistan, for these three years in eight districts until they were integrated into the new health care structure led by the Ministry of Health in early 2005. We examined the number of patients visiting our clinic before and during the security threats related to the parliamentary election and subsequent national assembly in 2004. The number of patients declined in remote clinics while the number increased in central locations. This finding has an important practical implication: the monitoring of access to care should include remote clinics, otherwise it may potentially underestimate compromised access to health care due to security threats.

  2. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.

    PubMed

    Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  3. Remote pre-procedural ischemic stroke as the greatest risk in carotid‑stenting‑associated stroke and death: a single center's experience.

    PubMed

    Rašiová, Mária; Špak, Ľubomír; Farkašová, Ľudmila; Pataky, Štefan; Koščo, Martin; Hudák, Marek; Moščovič, Matej; Leško, Norbert

    2017-08-01

    The goal of carotid artery stenting (CAS) is to decrease the stroke risk in patients with carotid stenosis. This procedure carries an immediate risk of stroke and death and many patients do not benefit from it, especially asymptomatic patients. It is crucial to accurately select the patients who would benefit from carotid procedure, and to rule out those for whom the procedure might be hazardous. Remote ischemic stroke is a known risk factor for stroke recurrence during surgery. The aim of our study was to determine the periprocedural complication risk (within 30 days after CAS) associated with carotid stenting (stroke, death) in patients with and without remote pre-procedural ischemic stroke, to analyze periprocedural risk in other specific patient subgroups treated with CAS, and to determine the impact of observed variables on all-cause mortality during long-term follow-up. We conducted a retrospective review of prospectively collected data from all patients treated with protected CAS between June 20, 2008 and December 31, 2015. Patient age, gender, type of carotid stenosis (symptomatic versus asymptomatic), side of stenosis (right or left carotid artery), type of cerebral protection (proximal versus distal), presence of comorbidities (remote ischemic pre-procedural ischemic stroke, coronary artery disease, diabetes mellitus, peripheral artery disease), previous ipsilateral carotid endarterectomy (CEA), contralateral carotid occlusion (CCO) and previous contralateral CAS/CEA were analyzed to identify higher CAS risk and to determine the impact of these variables on all-cause mortality during follow-up. Survival data were obtained from the Health Care Surveillance Authority registry. Mean follow-up was 1054 days (interquartile range 547.3; 1454.8). Remote pre-procedural ischemic stroke was defined as any-territory ischemic stroke >6 months prior to CAS. Primary periprocedural endpoint incidence (stroke/death) in 502 patients was 3.8% (N.=19) of all patients, 5.4% (N.=10) of symptomatic patients and 2.8% (N.=9) of asymptomatic patients. The risk of periprocedural stroke/death was 3.4 times higher in patients with (N.=198) compared to patients without remote ischemic stroke (N.=304) (6.6% versus 2.0% of patients without remote ischemic stroke; P=0.008). Periprocedural stroke/death in symptomatic patients (N.=186) was non-significantly higher in patients with remote ischemic stroke (N.=76) compared with patients without remote ischemic stroke (N.=110) (7.9% versus 3.6%; P=0.206). Asymptomatic patients with remote ischemic stroke (N.=122) had a 5.6-time-higher periprocedural risk of stroke/death compared with asymptomatic patients without remote ischemic stroke (N.=194) (5.7% versus 1.0%; P=0.014). Patients ≥75 years (N.=83) had a 3.0-time-higher periprocedural risk of stroke/death compared with younger patients (N.=419) (8.4% versus 2.9%; P=0.015); a non-significant increase of periprocedural stroke/death was found in both symptomatic (N.=35) and asymptomatic (N.=48) elderly patients (11.4% versus 4.0%, P=0.078; and 6.3% versus 2.4%, P=0.124, respectively). Increased periprocedural risk of stroke/death was not documented in other analyzed patient subgroups. During long-term follow-up, a 1.5-time-higher mortality risk was found in patients with remote ischemic stroke compared with patients without remote ischemic stroke in multivariable analysis; other patient subgroups (except older versus younger patients) did not differ in long-term mortality following carotid stenting. In our experience, all patients with remote pre-procedural any-territory ischemic stroke belong to risky subgroup for periprocedural stroke death after CAS. All asymptomatic patients with remote ischemic stroke should not be treated with CAS. Remote ischemic stroke increases all-cause mortality in long-term follow-up after carotid stenting. Patients aged ≥75 years also have increased risk of periprocedural stroke and death after CAS. These factors should help us to be more selective when planning carotid procedures.

  4. Emergency Management of Tension Pneumothorax for Health Professionals on Remote Cat Island Bahamas

    PubMed Central

    Parsons, Michael; Francis, Leathe; Senoro, Cristian; Chriswell, Caroline; Saunders, Rose; Hollander, Charles

    2017-01-01

    Patients living in remote areas have higher rates of injury-related death than those living in cities. Rural and remote health professionals working in sparsely populated places, such as Cat Island Bahamas, may have scant resources for treating emergency conditions. Local health professionals must be prepared to rely solely upon clinical judgment to perform emergency “high-stakes low-frequency” procedures while also accurately and effectively communicating with distantly located receiving specialists. However, these health providers may not recently have performed or had the opportunity to practice such emergency procedures. Telesimulation may be a useful way to teach remote practitioners both emergency procedures and communication skills. This technical report describes a simulation exercise for teaching these skills. PMID:28775930

  5. Guidelines for Outsourcing Remote Access.

    ERIC Educational Resources Information Center

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  6. Concept of Operations for the Next Generation Air Transportation System, Version 2.0

    DTIC Science & Technology

    2007-06-13

    SIDA )/airport operations area (AOA), [R-110] terminal perimeter, terminal airspace (security) • Landside. Terminal public and commercial roadways and...Required Surveillance Performance RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM...impede airside operations? R-110 Research 6.4.2/C. 4.4.1 Airside: Security Identification Display Area ( SIDA )/AOA R&D needed to develop and

  7. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  8. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    ERIC Educational Resources Information Center

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  9. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    PubMed Central

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473

  10. Implementation of a community greenhouse in a remote, sub-Arctic First Nations community in Ontario, Canada: a descriptive case study.

    PubMed

    Skinner, K; Hanning, R M; Metatawabin, J; Tsuji, L J S

    2014-01-01

    Food insecurity is prevalent in northern communities in Canada and there is a movement to improve food security through both the re-vitalization of traditional harvesting practices as well as through sustainable agriculture initiatives. Gardening in northern communities can be difficult and may be aided by a community greenhouse. The objective of this project was to conduct a descriptive case study of the context and process surrounding the implementation of a community greenhouse in a remote, sub-Arctic First Nations community in Ontario, Canada. Data sources included semi-directed interviews with a purposive and snowball sample of key informants (n=14), direct observations (n=32 days), written documentation (n=107), and photo-documentation (n=621 total). Digital photographs were taken by both a university investigator during community visits and a community investigator throughout the entire project. The case study was carried out over 33 months; from early 2009 until October of 2011. Thematic data analyses were conducted and followed a categorical aggregation approach. Categories emerging from the data were appointed gardening-related themes: seasons, fertile ground, sustainability, gardeners, ownership, participant growth, and sunshine. Local champions were critical to project success. Uncertainty was expressed by several participants regarding ownership of the greenhouse; the local community members who championed the project had to emphasize, repeatedly, that it was community owned. Positive outcomes included the involvement of many community members, a host of related activities, and that the greenhouse has been a learning opportunity to gain knowledge about growing plants in a northern greenhouse setting. A strength of the project was that many children participated in greenhouse activities. Community and school greenhouse projects require local champions to be successful. It is important to establish guidelines around ownership of a greenhouse and suitable procedures for making the building accessible to everyone without compromising security. Implementing a greenhouse project can engage community members, including children, and provide a great learning opportunity for gardeners in a remote, northern community.

  11. 6 CFR 27.335 - Hearing procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Hearing procedures. 27.335 Section 27.335 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.335 Hearing procedures. (a) Any hearing shall be held as...

  12. 6 CFR 27.335 - Hearing procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Hearing procedures. 27.335 Section 27.335 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.335 Hearing procedures. (a) Any hearing shall be held as...

  13. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  14. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  15. 6 CFR 27.335 - Hearing procedures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Hearing procedures. 27.335 Section 27.335 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.335 Hearing procedures. (a) Any hearing shall be held as...

  16. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  17. 6 CFR 27.335 - Hearing procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Hearing procedures. 27.335 Section 27.335 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.335 Hearing procedures. (a) Any hearing shall be held as...

  18. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  19. 6 CFR 27.335 - Hearing procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Hearing procedures. 27.335 Section 27.335 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.335 Hearing procedures. (a) Any hearing shall be held as...

  20. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  1. NOAA's National Geodetic Survey Utilization of Aerial Sensors for Emergency Response Efforts

    NASA Technical Reports Server (NTRS)

    White, Stephen

    2007-01-01

    Remote Sensing Division has a Coastal Mapping program and a Airport Survey program and research and development that support both programs. NOAA/NGS/RSD plans to acquire remotely sensed data to support the agency's homeland security and emergency response requirements.

  2. Wind turbine remote control using Android devices

    NASA Astrophysics Data System (ADS)

    Rat, C. L.; Panoiu, M.

    2018-01-01

    This paper describes the remote control of a wind turbine system over the internet using an Android device, namely a tablet or a smartphone. The wind turbine workstation contains a LabVIEW program which monitors the entire wind turbine energy conversion system (WECS). The Android device connects to the LabVIEW application, working as a remote interface to the wind turbine. The communication between the devices needs to be secured because it takes place over the internet. Hence, the data are encrypted before being sent through the network. The scope was the design of remote control software capable of visualizing real-time wind turbine data through a secure connection. Since the WECS is fully automated and no full-time human operator exists, unattended access to the turbine workstation is needed. Therefore the device must not require any confirmation or permission from the computer operator in order to control it. Another condition is that Android application does not have any root requirements.

  3. Location-assured, multifactor authentication on smartphones via LTE communication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  4. 75 FR 52591 - Seventh Meeting: RTCA Special Committee 221: Aircraft Secondary Barriers and Alternative Flight...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-26

    ... Committee 221: Aircraft Secondary Barriers and Alternative Flight Deck Security Procedures AGENCY: Federal... Secondary Barriers and Alternative Flight Deck Security Procedures. SUMMARY: The FAA is issuing this notice... Alternative Flight Deck Security Procedures. DATES: The meeting will be held September 14-15, 2010. September...

  5. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Procedures for certification of approved products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... application for renewal must be made using the “Application for Certification of an Approved Product for...

  6. 76 FR 28888 - Amendment to Procedures for Holding Funds in Dormant Filing Fee Accounts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 202 [Release Nos. 33-9208; 34-64495; IC-29670] Amendment to Procedures for Holding Funds in Dormant Filing Fee Accounts AGENCY: Securities and Exchange Commission. ACTION: Final rule. SUMMARY: The Securities and Exchange Commission is amending its procedures...

  7. 12 CFR 615.5570 - Book-entry procedures for Federal Agricultural Mortgage Corporation Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry procedures for Federal Agricultural Mortgage Corporation Securities. 615.5570 Section 615.5570 Banks and Banking FARM CREDIT ADMINISTRATION... Federal Agricultural Mortgage Corporation Securities § 615.5570 Book-entry procedures for Federal...

  8. 12 CFR 615.5570 - Book-entry procedures for Federal Agricultural Mortgage Corporation Securities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Book-entry procedures for Federal Agricultural Mortgage Corporation Securities. 615.5570 Section 615.5570 Banks and Banking FARM CREDIT ADMINISTRATION... Federal Agricultural Mortgage Corporation Securities § 615.5570 Book-entry procedures for Federal...

  9. 12 CFR 615.5570 - Book-entry procedures for Federal Agricultural Mortgage Corporation Securities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Book-entry procedures for Federal Agricultural Mortgage Corporation Securities. 615.5570 Section 615.5570 Banks and Banking FARM CREDIT ADMINISTRATION... Federal Agricultural Mortgage Corporation Securities § 615.5570 Book-entry procedures for Federal...

  10. Crop identification technology assessment for remote sensing (CITARS). Volume 6: Data processing at the laboratory for applications of remote sensing

    NASA Technical Reports Server (NTRS)

    Bauer, M. E.; Cary, T. K.; Davis, B. J.; Swain, P. H.

    1975-01-01

    The results of classifications and experiments for the crop identification technology assessment for remote sensing are summarized. Using two analysis procedures, 15 data sets were classified. One procedure used class weights while the other assumed equal probabilities of occurrence for all classes. Additionally, 20 data sets were classified using training statistics from another segment or date. The classification and proportion estimation results of the local and nonlocal classifications are reported. Data also describe several other experiments to provide additional understanding of the results of the crop identification technology assessment for remote sensing. These experiments investigated alternative analysis procedures, training set selection and size, effects of multitemporal registration, spectral discriminability of corn, soybeans, and other, and analyses of aircraft multispectral data.

  11. Remote secure observing for the Faulkes Telescopes

    NASA Astrophysics Data System (ADS)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  12. Customization of home closed-loop insulin delivery in adult patients with type 1 diabetes, assisted with structured remote monitoring: the pilot WP7 Diabeloop study.

    PubMed

    Benhamou, Pierre Yves; Huneker, Erik; Franc, Sylvia; Doron, Maeva; Charpentier, Guillaume

    2018-06-01

    Improvement in closed-loop insulin delivery systems could result from customization of settings to individual needs and remote monitoring. This pilot home study evaluated the efficacy and relevance of this approach. A bicentric clinical trial was conducted for 3 weeks, using an MPC-based algorithm (Diabeloop Artificial Pancreas system) featuring five settings designed to modulate the reactivity of regulation. Remote monitoring was ensured by expert nurses with a web platform generating automatic Secured Information Messages (SIMs) and with a structured procedure. Endpoints were glucose metrics and description of impact of monitoring on regulation parameters. Eight patients with type 1 diabetes (six men, age 41.8 ± 11.4 years, HbA1c 7.7 ± 1.0%) were included. Time spent in the 70-180 mg/dl range was 70.2% [67.5; 76.9]. Time in hypoglycemia < 70 mg/dl was 2.9% [2.1; 3.4]. Eleven SIMs led to phone intervention. Original default settings were modified in all patients by the intervention of the nurses. This pilot trial suggests that the Diabeloop closed-loop system could be efficient regarding metabolic outcomes, whereas its telemedical monitoring feature could contribute to enhanced efficacy and safety. This study is registered at ClinicalTrials.gov with trial registration number NCT02987556.

  13. Extending IPsec for Efficient Remote Attestation

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Schulz, Steffen

    When establishing a VPN to connect different sites of a network, the integrity of the involved VPN endpoints is often a major security concern. Based on the Trusted Platform Module (TPM), available in many computing platforms today, remote attestation mechanisms can be used to evaluate the internal state of remote endpoints automatically. However, existing protocols and extensions are either unsuited for use with IPsec or impose considerable additional implementation complexity and protocol overhead.

  14. Remote FLS testing in the real world: ready for "prime time".

    PubMed

    Okrainec, Allan; Vassiliou, Melina; Jimenez, M Carolina; Henao, Oscar; Kaneva, Pepa; Matt Ritter, E

    2016-07-01

    Maintaining the existing FLS test centers requires considerable investment in human and financial resources. It can also be particularly challenging for those outside of North America to become certified due to the limited number of international test centers. Preliminary work suggests that it is possible to reliably score the FLS manual skills component remotely using low-cost videoconferencing technology. Significant work remains to ensure that testing procedures adhere to standards defined by SAGES for this approach to be considered equivalent to standard on-site testing. To validate the integrity and validity of the FLS manual skills examination administered remotely in a real-world environment according to FLS testing protocols and to evaluate participants' experience with the setting. Individuals with various levels of training from the University of Toronto completed a pre- and a post-test questionnaire. Participants presented to one of the two FLS testing rooms available for the study, each connected via Skype to a separate room with a FLS proctor who administered and scored the test remotely (RP). An on-site proctor (OP) was present in the room as a control. An invigilator was also present in the testing room to follow directions from the RP and ensure the integrity of test materials. Twenty-one participants were recruited, and 20 completed the test. There was no significant difference between scores by RP and OP. Interrater reliability between the RP and OP was excellent. One critical error was missed by the RP, but this would not have affected the test outcome. Participants reported being highly satisfied. We demonstrate that proctors located remotely can administer the FLS skills test in a secure and reliable fashion, with excellent interrater reliability compared to an on-site proctor. Remote proctoring of the FLS examination could become a strategy to increase certification rates while containing costs.

  15. Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations

    DTIC Science & Technology

    2011-03-01

    leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements...Detection with an Autonomous Micro UAV Mesh Network . In the near future police departments, fire brigades and other homeland security ...UAV-based sensor networks with respect to existing constraints and user requirements. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  16. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  17. Effect of quantum noise on deterministic joint remote state preparation of a qubit state via a GHZ channel

    NASA Astrophysics Data System (ADS)

    Wang, Ming-Ming; Qu, Zhi-Guo

    2016-11-01

    Quantum secure communication brings a new direction for information security. As an important component of quantum secure communication, deterministic joint remote state preparation (DJRSP) could securely transmit a quantum state with 100 % success probability. In this paper, we study how the efficiency of DJRSP is affected when qubits involved in the protocol are subjected to noise or decoherence. Taking a GHZ-based DJRSP scheme as an example, we study all types of noise usually encountered in real-world implementations of quantum communication protocols, i.e., the bit-flip, phase-flip (phase-damping), depolarizing and amplitude-damping noise. Our study shows that the fidelity of the output state depends on the phase factor, the amplitude factor and the noise parameter in the bit-flip noise, while the fidelity only depends on the amplitude factor and the noise parameter in the other three types of noise. And the receiver will get different output states depending on the first preparer's measurement result in the amplitude-damping noise. Our results will be helpful for improving quantum secure communication in real implementation.

  18. Eye Can See for Miles and Miles.

    ERIC Educational Resources Information Center

    School Planning & Management, 2002

    2002-01-01

    Describes how a New Hampshire school system eliminated internal school vandalism and bomb threats, and reduced the number of false alarms, by using video security software (WebEyeAlert security solution) that is accessible via a variety of methods from remote locations. (Author/EV)

  19. 76 FR 65366 - Amendments to Procedures for Certain Determinations and Decisions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2007-0092] RIN 0960-AG72 Amendments to Procedures for Certain Determinations and Decisions AGENCY: Social Security Administration... CONTACT: Joshua Silverman, Office of Regulations, Social Security Administration, 6401 Security Boulevard...

  20. 75 FR 9016 - Fifth Meeting: RTCA Special Committee 221: Aircraft Secondary Barriers and Alternative Flight...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-26

    ... 221: Aircraft Secondary Barriers and Alternative Flight Deck Security Procedures AGENCY: Federal... Secondary Barriers and Alternative Flight Deck Security Procedures. SUMMARY: The FAA is issuing this notice... Alternative Flight Deck Security Procedures. DATES: The meeting will be held March 16-17, 2010. March 16th...

  1. 76 FR 38741 - Tenth Meeting: RTCA Special Committee 221: Aircraft Secondary Barriers and Alternative Flight...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... 221: Aircraft Secondary Barriers and Alternative Flight Deck Security Procedures AGENCY: Federal... Secondary Barriers and Alternative Flight Deck Security Procedures. SUMMARY: The FAA is issuing this notice... Alternative Flight Deck Security Procedures. DATES: The meeting will be held July 19-20, from 9:00 a.m. to 5...

  2. 76 FR 22163 - Ninth Meeting: RTCA Special Committee 221: Aircraft Secondary Barriers and Alternative Flight...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-20

    ... 221: Aircraft Secondary Barriers and Alternative Flight Deck Security Procedures AGENCY: Federal... Secondary Barriers and Alternative Flight Deck Security Procedures. SUMMARY: The FAA is issuing this notice... Alternative Flight Deck Security Procedures. DATES: The meeting will be held May 10-11, 2011, from 9 a.m. to 5...

  3. 75 FR 29810 - Sixth Meeting: RTCA Special Committee 221: Aircraft Secondary Barriers and Alternative Flight...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... 221: Aircraft Secondary Barriers and Alternative Flight Deck Security Procedures. AGENCY: Federal... Secondary Barriers and Alternative Flight Deck Security Procedures. SUMMARY: The FAA is issuing this notice... Alternative Flight Deck Security Procedures. DATES: The meeting will be held June 15-16, 2010. June 15th from...

  4. 12 CFR 615.5560 - Book-entry Procedure for Farm Credit System Financial Assistance Corporation Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... OPERATIONS Farm Credit System Financial Assistance Corporation Securities § 615.5560 Book-entry Procedure for Farm Credit System Financial Assistance Corporation Securities. (a) The Farm Credit System Financial... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry Procedure for Farm Credit System...

  5. Climate Change, Nutrition and Food Security in Sub-Saharan Africa

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.

    2010-01-01

    Food security and nutrition in sub-Saharan Africa have long been affected by variations in the weather. Vulnerability to these hazards, along with economic shocks and an adverse political environment, is often uneven in a community. Some individuals and households are more susceptible to emergencies or crises than others, and thus determining who is most vulnerable are and how they are responding to a shock or crises is essential to understand the impact on food security. Daily, quantitative and global observations derived from satellite remote sensing instruments can contribute to understanding how food production has declined due to drought, flood or other weather-related hazard, but it can say nothing about the likelihood that the people living in that area are suffering food insecurity as a result. As Amartya Sen argued, a famine can occur even when there is an absolute surplus of food in a region. Thus organizations like the US Agency for International Development's Famine Early Warning Systems Network (FEWS NET) work to integrate biophysical and socio-economic indicators together with on-the ground assessments to estimate the food security consequences of a variety of events. Climate change is likely to restructure local, regional and global agricultural systems and commodity markets. Although remote sensing information has been used to identify seasonal production declines for the past two decades, new ways of using the data will need to be developed in order to understand, document and respond to the impact of climate change on food security as it is manifested in shorter term shocks. In this article, the contribution of remote sensing is explained, along with the other factors that affect food security

  6. 49 CFR 1503.203 - Investigations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... Chief Counsel, the Assistant Administrator for Security Operations, the Assistant Administrator for...

  7. 48 CFR 245.201-71 - Security classification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Security classification... Procedures 245.201-71 Security classification. Follow the procedures at PGI 245.201-71 for security classification. [76 FR 3537, Jan. 20, 2011. Redesignated and amended at 77 FR 76937, Dec. 31, 2012] ...

  8. 48 CFR 245.201-71 - Security classification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Security classification... Procedures 245.201-71 Security classification. Follow the procedures at PGI 245.201-71 for security classification. [76 FR 3537, Jan. 20, 2011. Redesignated and amended at 77 FR 76937, Dec. 31, 2012] ...

  9. A solar energy estimation procedure using remote sensing techniques. [watershed hydrologic models

    NASA Technical Reports Server (NTRS)

    Khorram, S.

    1977-01-01

    The objective of this investigation is to design a remote sensing-aided procedure for daily location-specific estimation of solar radiation components over the watershed(s) of interest. This technique has been tested on the Spanish Creek Watershed, Northern California, with successful results.

  10. Securely implementing remote access within health information management.

    PubMed

    Carroll, E T; Wright, S; Zakoworotny, C

    1998-03-01

    As technology changes, our definition of the workplace expands, and we no longer are limited to working at our desk in an office. The authors describe technologies that enable us to work from home or on the road and examine security regulations and precautions.

  11. Sandia National Laboratories: Malware Technical Exchange Meeting (MTEM)

    Science.gov Websites

    Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Against Malware Detection of Malware Malware Research Malware in Mobile Devices Malware Attack Trends Malware Malware Research Malware in Mobile Devices Malware Attack Trends Success Stories of COTS Products

  12. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    PubMed

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  13. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    PubMed Central

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  14. Remote object authentication: confidence model, cryptosystem and protocol

    NASA Astrophysics Data System (ADS)

    Lancrenon, Jean; Gillard, Roland; Fournel, Thierry

    2009-04-01

    This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric authentication to the case of remote morphometric object authentication. We use a different type of encryption technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages received by the server. We also describe the optical technology used to extract the morphometric templates.

  15. International Commercial Remote Sensing Practices and Policies: A Comparative Analysis

    NASA Astrophysics Data System (ADS)

    Stryker, Timothy

    In recent years, there has been much discussion about U.S. commercial remoteUnder the Act, the Secretary of Commerce sensing policies and how effectively theylicenses the operations of private U.S. address U.S. national security, foreignremote sensing satellite systems, in policy, commercial, and public interests.consultation with the Secretaries of Defense, This paper will provide an overview of U.S.State, and Interior. PDD-23 provided further commercial remote sensing laws,details concerning the operation of advanced regulations, and policies, and describe recentsystems, as well as criteria for the export of NOAA initiatives. It will also addressturnkey systems and/or components. In July related foreign practices, and the overall2000, pursuant to the authority delegated to legal context for trade and investment in thisit by the Secretary of Commerce, NOAA critical industry.iss ued new regulations for the industry. Licensing and Regulationsatellite systems. NOAA's program is The 1992 Land Remote Sensing Policy Act ("the Act"), and the 1994 policy on Foreign Access to Remote Sensing Space Capabilities (known as Presidential Decision Directive-23, or PDD-23) put into place an ambitious legal and policy framework for the U.S. Government's licensing of privately-owned, high-resolution satellite systems. Previously, capabilities afforded national security and observes the international obligations of the United States; maintain positive control of spacecraft operations; maintain a tasking record in conjunction with other record-keeping requirements; provide U.S. Government access to and use of data when required for national security or foreign policy purposes; provide for U.S. Government review of all significant foreign agreements; obtain U.S. Government approval for any encryption devices used; make available unenhanced data to a "sensed state" as soon as such data are available and on reasonable cost terms and conditions; make available unenhanced data as requested by the U.S. Government Archive; and, obtain a priori U.S. Government approval of all plans and procedures to deal with safe disposition of the satellite. Further information on NOAA's regulations and NOAA's licensing program is available at www.licensing.noaa.gov. Monitoring and Enforcement NOAA's enforcement mission is focused on the legislative mandate which states that the Secretary of Commerce has a continuing obligation to ensure that licensed imaging systems are operated lawfully to preserve the national security and foreign policies of the United States. NOAA has constructed an end-to-end monitoring and compliance program to review the activities of licensed companies. This program includes a pre- launch review, an operational baseline audit, and an annual comprehensive national security audit. If at any time there is suspicion or concern that a system is being operated unlawfully, a no-notice inspection may be initiated. setbacks, three U.S. companies are now operational, with more firms expected to become so in the future. While NOAA does not disclose specific systems capabilities for proprietary reasons, its current licensing resolution thresholds for general commercial availability are as follows: 0.5 meter Ground Sample Distance (GSD) for panchromatic systems, 2 meter GSD for multi-spectral systems, 3 meter Impulse Response (IPR) for Synthetic Aperture Radar systems, and 20 meter GSD for hyperspectral systems (with certain 8-meter hyperspectral derived products also licensed for commercial distribution). These thresholds are subject to change based upon foreign availability and other considerations. It should also be noted that license applications are reviewed and granted on a case-by-case basis, pursuant to each system's technology and concept of operations. In 2001, NOAA, along with the Department of Commerce's International Trade Administration, commissioned a study by the RAND Corporation to assess the risks faced by the U.S. commercial remote sensing satellite industry. In commissioning this study, NOAA's goal was to better understand the role that U.S. Government policies and regulations have in shaping the prospects for emerging commercial remote sensing satellite firms. The study assessed the risks against broader trends in the larger U.S. remote sensing industry and geospatial technology and effective policy implementation. The Department of Commerce is working with NOAA licensees to identify foreign actions which could restrict market access by U.S. firms, and seeking to provide a "level playing field" for U.S. service providers. The Department of Commerce has dedicated new resources to its licensing activities. In Fiscal Year 2002, the Department obtained 1.2 million in funding to support the NOAA program, through staff, equipment, technical support, constituent outreach, and market and policy studies. To better understand the market and make more well-informed licensing decisions, NOAA is participating in a broad-based market study effort under the direction of the American Society for Photogrammetry and Remote Sensing (ASPRS) and NASA's Commercial Remote Sensing Program. This study is providing long-term analysis of the commercial remote sensing industry. It is being supported by interviews with industry and government experts, a web-based survey, and a thorough review and analysis of related literature. The project should more clearly determine future remote sensing needs and requirements, and maximize the industry's baselines, standards, and socio-economic potential. NOAA, through its participation in this study, has gained important new insights into the status and future trends of this industry. The study's initial findings estimate 2001 industry revenue at 2 billion, growing at 13% per year, to an approximate level of 6 billion in 2010 (in constant, calendar year 2000 dollars). Currently, across all sectors, the most active market segments are in nati onal /glo bal security, mapping/geography, civil government, and have provided for appropriate measures for monitoring and compliance. This approach provides a valuable framework for companies, investors, customers, and foreign partners. The clearly-defined ground rules are designed to facilitate full private sector competition, innovation, and domestic and international market development. International market development remains a key issue for the U.S. Government and for U.S. industry in general. NOAA has learned of some interest by foreign governments in promulgating new laws and regulations to address this growing industry. However, to date, most governments have yet to publicize new commercial remote sensing laws or regulations. In some instances, data policies for commercial remote sensing have been developed, but only in the context of government-owned and operated systems, or private systems in which a government is the controlling shareholder. Other than some initial consultations and limited agreements between supplier nations, there has to date been little overall international coordination of commercial remote sensing policies and practices. The result has been an uncertain and non- uniform international business environment, which can cause difficulties for all commercial remote sensing operators. Related international market distortions inhibit the maturation of the industry and the normalization of business practices. This situation may make it more difficult for key stakeholders to make decisions on investments, purchases, regulatory affairs, and international partnerships. To put this growing industry on a more level footing, there should be further coordination

  16. 6 CFR 5.47 - Procedure in the event of an adverse ruling.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Procedure in the event of an adverse ruling. 5.47 Section 5.47 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5.47 Procedure in the event of...

  17. 6 CFR 5.47 - Procedure in the event of an adverse ruling.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Procedure in the event of an adverse ruling. 5.47 Section 5.47 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5.47 Procedure in the event of...

  18. 6 CFR 5.47 - Procedure in the event of an adverse ruling.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Procedure in the event of an adverse ruling. 5.47 Section 5.47 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5.47 Procedure in the event of...

  19. Remotely Monitored Sealing Array Software

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-09-12

    The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to last for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support activemore » tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.« less

  20. [Research progress on remote sensing of ecological and environmental changes in the Three Gorges Reservoir area, China].

    PubMed

    Teng, Ming-jun; Zeng, Li-xiong; Xiao, Wen-fa; Zhou, Zhi-xiang; Huang, Zhi-lin; Wang, Peng-cheng; Dian, Yuan-yong

    2014-12-01

    The Three Gorges Reservoir area (TGR area) , one of the most sensitive ecological zones in China, has dramatically changes in ecosystem configurations and services driven by the Three Gorges Engineering Project and its related human activities. Thus, understanding the dynamics of ecosystem configurations, ecological processes and ecosystem services is an attractive and critical issue to promote regional ecological security of the TGR area. The remote sensing of environment is a promising approach to the target and is thus increasingly applied to and ecosystem dynamics of the TGR area on mid- and macro-scales. However, current researches often showed controversial results in ecological and environmental changes in the TGR area due to the differences in remote sensing data, scale, and land-use/cover classification. Due to the complexity of ecological configurations and human activities, challenges still exist in the remote-sensing based research of ecological and environmental changes in the TGR area. The purpose of this review was to summarize the research advances in remote sensing of ecological and environmental changes in the TGR area. The status, challenges and trends of ecological and environmental remote-sensing in the TGR area were further discussed and concluded in the aspect of land-use/land-cover, vegetation dynamics, soil and water security, ecosystem services, ecosystem health and its management. The further researches on the remote sensing of ecological and environmental changes were proposed to improve the ecosystem management of the TGR area.

  1. Remote observing environment using a KVM-over-IP for the OAO 188 cm telescope

    NASA Astrophysics Data System (ADS)

    Yanagisawa, Kenshi; Inoue, Goki; Kuroda, Daisuke; Ukita, Nobuharu; Mizumoto, Yoshihiko; Izumiura, Hideyuki

    2016-08-01

    We have prepared remote observing environment for the 188 cm telescope at Okayama Astrophysical Observatory. A KVM-over-IP and a VPN gateway are employed as core devices, which offer reliable, secure and fast link between on site and remote sites. We have confirmed the KVM-over-IP has ideal characteristics for serving the remote observing environment; the use is simple for both users and maintainer; access from any platform is available; multiple and simultaneous access is possible; and maintenance load is small. We also demonstrated that the degradation of observing efficiency specific to the remote observing is negligibly small. The remote observing environment has fully opened since the semester 2016A, about 30% of the total observing time in the last semester was occupied by remote observing.

  2. 20 CFR 422.104 - Who can be assigned a social security number.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Who can be assigned a social security number. 422.104 Section 422.104 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.104 Who can be assigned a social security number. (a) Persons eligible for SSN...

  3. 20 CFR 422.104 - Who can be assigned a social security number.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Who can be assigned a social security number. 422.104 Section 422.104 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.104 Who can be assigned a social security number. (a) Persons eligible for SSN...

  4. 20 CFR 422.104 - Who can be assigned a social security number.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Who can be assigned a social security number. 422.104 Section 422.104 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.104 Who can be assigned a social security number. (a) Persons eligible for SSN...

  5. 20 CFR 422.104 - Who can be assigned a social security number.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Who can be assigned a social security number. 422.104 Section 422.104 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.104 Who can be assigned a social security number. (a) Persons eligible for SSN...

  6. 20 CFR 422.104 - Who can be assigned a social security number.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Who can be assigned a social security number. 422.104 Section 422.104 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.104 Who can be assigned a social security number. (a) Persons eligible for SSN...

  7. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Accessibility of Airport Facilities § 382.55 May carriers impose security screening procedures for passengers..., including those with disabilities, are subject to TSA security screening requirements at U.S. airports. In addition, passengers at foreign airports, including those with disabilities, may be subject to security...

  8. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Accessibility of Airport Facilities § 382.55 May carriers impose security screening procedures for passengers..., including those with disabilities, are subject to TSA security screening requirements at U.S. airports. In addition, passengers at foreign airports, including those with disabilities, may be subject to security...

  9. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Accessibility of Airport Facilities § 382.55 May carriers impose security screening procedures for passengers..., including those with disabilities, are subject to TSA security screening requirements at U.S. airports. In addition, passengers at foreign airports, including those with disabilities, may be subject to security...

  10. The Slow Control System of the Auger Fluorescence Detectors

    NASA Astrophysics Data System (ADS)

    Barenthien, N.; Bethge, C.; Daumiller, K.; Gemmeke, H.; Kampert, K.-H.; Wiebusch, C.

    2003-07-01

    The fluorescence detector (FD) of the Pierre Auger experiment [1] comprises 24 telescopes that will be situated in 4 remote buildings in the Pampa Amarilla. It is planned to run the fluorescence detectors in absence of operators on site. Therefore, the main task of the Slow Control System (SCS) is to ensure a secure remote operation of the FD system. The Slow Control System works autonomously and continuously monitors those parameters which may disturb a secure operation. Commands from the data-acquisition system or the remote operator are accepted only if they do not violate safety rules that depend on the actual experimental conditions (e.g. high-voltage, wind-sp eed, light, etc.). In case of malfunctions (power failure, communication breakdown, ...) the SCS performs an orderly shutdown and subsequent startup of the fluorescence detector system. The concept and the implementation of the Slow Control System are presented.

  11. Resilient off-grid microgrids: Capacity planning and N-1 security

    DOE PAGES

    Madathil, Sreenath Chalil; Yamangil, Emre; Nagarajan, Harsha; ...

    2017-06-13

    Over the past century the electric power industry has evolved to support the delivery of power over long distances with highly interconnected transmission systems. Despite this evolution, some remote communities are not connected to these systems. These communities rely on small, disconnected distribution systems, i.e., microgrids to deliver power. However, as microgrids often are not held to the same reliability standards as transmission grids, remote communities can be at risk for extended blackouts. To address this issue, we develop an optimization model and an algorithm for capacity planning and operations of microgrids that include N-1 security and other practical modelingmore » features like AC power flow physics, component efficiencies and thermal limits. Lastly, we demonstrate the computational effectiveness of our approach on two test systems; a modified version of the IEEE 13 node test feeder and a model of a distribution system in a remote community in Alaska.« less

  12. Resilient off-grid microgrids: Capacity planning and N-1 security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Madathil, Sreenath Chalil; Yamangil, Emre; Nagarajan, Harsha

    Over the past century the electric power industry has evolved to support the delivery of power over long distances with highly interconnected transmission systems. Despite this evolution, some remote communities are not connected to these systems. These communities rely on small, disconnected distribution systems, i.e., microgrids to deliver power. However, as microgrids often are not held to the same reliability standards as transmission grids, remote communities can be at risk for extended blackouts. To address this issue, we develop an optimization model and an algorithm for capacity planning and operations of microgrids that include N-1 security and other practical modelingmore » features like AC power flow physics, component efficiencies and thermal limits. Lastly, we demonstrate the computational effectiveness of our approach on two test systems; a modified version of the IEEE 13 node test feeder and a model of a distribution system in a remote community in Alaska.« less

  13. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  14. Remote-Controlled Rotorcraft Blade Vibration and Modal Analysis at Low Frequencies

    DTIC Science & Technology

    2016-02-01

    modal analysis, remote-controlled helicopter , remote-controlled rotorcraft, HUMS for rotorcraft 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...Experimental Setup 1 4. Results 4 4.1 Rotor Blade Acceleration 4 4.2 Modal Analysis: Using an Impact Hammer 7 4.3 Dynamic Response Revisited 8 5... Rotor blade response to shaker outputting 1-V sine wave at 100 Hz ....5 Fig. 6 Rotor blade response to shaker outputting 1-V sine sweep from 20- to 100

  15. 20 CFR 422.107 - Evidence requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ....107 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.107 Evidence requirements. (a) General. An applicant for an original social security number card must submit documentary evidence that the Commissioner of Social Security regards as convincing...

  16. 20 CFR 422.107 - Evidence requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....107 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.107 Evidence requirements. (a) General. An applicant for an original social security number card must submit documentary evidence that the Commissioner of Social Security regards as convincing...

  17. Satellite Technology Contribution to Water and Food Security

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  18. The Defense Message System and the U.S. Coast Guard

    DTIC Science & Technology

    1992-06-01

    these mail services, the Internet also provides a File Transfer Protocol (FTP) and remote login between host computers (TELNET) capabilities. 17 [Ref...the Joint Maritime Intelligence Element (JMIE), Zincdust, and Emerald . [Ref. 27] 4. Secure Data Network The Coast Guard’s Secure Data Network (SDN

  19. Improving proton therapy accessibility through seamless electronic integration of remote treatment planning sites.

    PubMed

    Belard, Arnaud; Dolney, Derek; Zelig, Tochner; McDonough, James; O'Connell, John

    2011-06-01

    Proton radiotherapy is a relatively scarce treatment modality in radiation oncology, with only nine centers currently operating in the United States. Funded by Public Law 107-248, the University of Pennsylvania and the Walter Reed Army Medical Center have developed a remote proton radiation therapy solution with the goals of improving access to proton radiation therapy for Department of Defense (DoD) beneficiaries while minimizing treatment delays and time spent away from home/work (time savings of up to 3 weeks per patient). To meet both Health Insurance Portability and Accountability Act guidelines and the more stringent security restrictions imposed by the DoD, our program developed a hybrid remote proton radiation therapy solution merging a CITRIX server with a JITIC-certified (Joint Interoperability Test Command) desktop videoconferencing unit. This conduit, thoroughly tested over a period of 6 months, integrates both institutions' radiation oncology treatment planning infrastructures into a single entity for DoD patients' treatment planning and delivery. This telemedicine solution enables DoD radiation oncologists and medical physicists the ability to (1) remotely access a proton therapy treatment planning platform, (2) transfer patient plans securely to the University of Pennsylvania patient database, and (3) initiate ad-hoc point-to-point and multipoint videoconferences to dynamically optimize and validate treatment plans. Our robust and secure remote treatment planning solution grants DoD patients not only access to a state-of-the-art treatment modality, but also participation in the treatment planning process by Walter Reed Army Medical Center radiation oncologists and medical physicists. This telemedicine system has the potential to lead to a greater integration of military treatment facilities and/or satellite clinics into regional proton therapy centers.

  20. A Framework for Resilient Remote Monitoring

    DTIC Science & Technology

    2014-08-01

    of low-level observables are availa- ble, audited , and recorded. This establishes the need for a re- mote monitoring framework that can integrate with...Security, WS-Policy, SAML, XML Signature, and XML Encryption. Pearson Higher Education, 2004. [3] OMG, “Common Secure Interoperability Protocol...www.darpa.mil/Our_Work/I2O/Programs/Integrated_Cyb er_Analysis_System_%28ICAS%29.aspx. [8] D. Miller and B. Pearson , Security information and event man

  1. Genesis: A Framework for Achieving Software Component Diversity

    DTIC Science & Technology

    2007-01-01

    correctly—the initial filters develop to fix the Hotmail vulnerability could be circumvented by using alternate character encodings4. Hence, we focus on...Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo, (March 2004); http://www.greymagic.com/security/advisories/gm005-mc/. 4...EyeonSecurity, Microsoft Passport Account Hijack Attack: Hacking Hotmail and More, Hacker’s Digest. 5. Y.-W. Huang et al., Web Application Security Assessment by

  2. A Low-Cost and Secure Solution for e-Commerce

    NASA Astrophysics Data System (ADS)

    Pasquet, Marc; Vacquez, Delphine; Rosenberger, Christophe

    We present in this paper a new architecture for remote banking and e-commerce applications. The proposed solution is designed to be low cost and provides some good guarantees of security for a client and his bank issuer. Indeed, the main problem for an issuer is to identify and authenticate one client (a cardholder) using his personal computer through the web when this client wants to access to remote banking services or when he wants to pay on a e-commerce site equipped with 3D-secure payment solution. The proposed solution described in this paper is MasterCard Chip Authentication Program compliant and was experimented in the project called SOPAS. The main contribution of this system consists in the use of a smartcard with a I2C bus that pilots a terminal only equipped with a screen and a keyboard. During the use of services, the user types his PIN code on the keyboard and all the security part of the transaction is performed by the chip of the smartcard. None information of security stays on the personal computer and a dynamic token created by the card is sent to the bank and verified by the front end. We present first the defined methodology and we analyze the main security aspects of the proposed solution.

  3. A review of physical security robotics at Sandia National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capablemore » of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.« less

  4. Lake Storage Measurements For Water Resources Management: Combining Remotely Sensed Water Levels and Surface Areas

    NASA Astrophysics Data System (ADS)

    Brakenridge, G. R.; Birkett, C. M.

    2013-12-01

    Presently operating satellite-based radar altimeters have the ability to monitor variations in surface water height for large lakes and reservoirs, and future sensors will expand observational capabilities to many smaller water bodies. Such remote sensing provides objective, independent information where in situ data are lacking or access is restricted. A USDA/NASA (http://www.pecad.fas.usda.gov/cropexplorer/global_reservoir/) program is performing operational altimetric monitoring of the largest lakes and reservoirs around the world using data from the NASA/CNES, NRL, and ESA missions. Public lake-level products from the Global Reservoir and Lake Monitor (GRLM) are a combination of archived and near real time information. The USDA/FAS utilizes the products for assessing international irrigation potential and for crop production estimates; other end-users study climate trends, observe anthropogenic effects, and/or are are involved in other water resources management and regional water security issues. At the same time, the Dartmouth Flood Observatory (http://floodobservatory.colorado.edu/), its NASA GSFC partners (http://oas.gsfc.nasa.gov/floodmap/home.html), and associated MODIS data and automated processing algorithms are providing public access to a growing GIS record of the Earth's changing surface water extent, including changes related to floods and droughts. The Observatory's web site also provide both archival and near real time information, and is based mainly on the highest spatial resolution (250 m) MODIS bands. Therefore, it is now possible to provide on an international basis reservoir and lake storage change measurements entirely from remote sensing, on a frequently updating basis. The volume change values are based on standard numerical procedures used for many decades for analysis of coeval lake area and height data. We provide first results of this combination, including prototype displays for public access and data retrieval of water storage volume changes. Ground-based data can, in some cases, test the remote sensing accuracy and precision. Data accuracy requirements vary for different applications: reservoir management for flood control, agriculture, or power generation may need more accurate and timely information than (for example) regional assessments of water and food security issues. Thus, the long-term goal for the hydrological sciences community should be to efficiently mesh both types of information and with as extensive geographic coverage as possible.

  5. 20 CFR 422.120 - Earnings reported without a social security number or with an incorrect employee name or social...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Earnings reported without a social security number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.120 Earnings...

  6. 20 CFR 422.120 - Earnings reported without a social security number or with an incorrect employee name or social...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Earnings reported without a social security number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.120 Earnings...

  7. 20 CFR 422.120 - Earnings reported without a social security number or with an incorrect employee name or social...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Earnings reported without a social security number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.120 Earnings...

  8. 20 CFR 422.120 - Earnings reported without a social security number or with an incorrect employee name or social...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Earnings reported without a social security number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.120 Earnings...

  9. 20 CFR 422.120 - Earnings reported without a social security number or with an incorrect employee name or social...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Earnings reported without a social security number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.120 Earnings...

  10. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...)(i) Standard: Security management process. Implement policies and procedures to prevent, detect... this subpart for the entity. (3)(i) Standard: Workforce security. Implement policies and procedures to...) Standard: Information access management. Implement policies and procedures for authorizing access to...

  11. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...)(i) Standard: Security management process. Implement policies and procedures to prevent, detect... this subpart for the entity. (3)(i) Standard: Workforce security. Implement policies and procedures to...) Standard: Information access management. Implement policies and procedures for authorizing access to...

  12. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  13. Synergy and sustainability in rural procedural medicine: views from the coalface.

    PubMed

    Swayne, Andrew; Eley, Diann S

    2010-02-01

    The practice of rural and remote medicine in Australia entails many challenges, including a broad casemix and the remoteness of specialist support. Many rural practitioners employ advanced procedural skills in anaesthetics, surgery, obstetrics and emergency medicine, but the use of these skills has been declining over the last 20 years. This study explored the perceptions of rural general practitioners (GPs) on the current and future situation of procedural medicine. The qualitative results of data from a mixed-method design are reported. Free-response survey comments and semistructured interview transcripts were analysed by a framework analysis for major themes. General practices in rural and remote Queensland. Rural GPs in Rural and Remote Metropolitan Classification 4-7 areas of Queensland. The perceptions of rural GPs on the current and future situation of rural procedural medicine. Major concerns from the survey focused on closure of facilities and downgrading of services, cost and time to keep up skills, increasing litigation issues and changing attitudes of the public. Interviews designed to draw out solutions to help rectify the perceived circumstances highlighted two major themes: 'synergy' between the support from medical teams and community in ensuring 'sustainability' of services. This article presents a model of rural procedural practice where synergy between staff, resources and support networks represents the optimal way to deliver a non-metropolitan procedural service. The findings serve to remind educators and policy-makers that future planning for sustainability of rural procedural services must be broad-based and comprehensive.

  14. The HEPiX Virtualisation Working Group: Towards a Grid of Clouds

    NASA Astrophysics Data System (ADS)

    Cass, Tony

    2012-12-01

    The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.

  15. Secure Payload Access to the International Space Station

    NASA Technical Reports Server (NTRS)

    Pitts, R. Lee; Reid, Chris

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  16. A secure EHR system based on hybrid clouds.

    PubMed

    Chen, Yu-Yi; Lu, Jun-Chao; Jan, Jinn-Ke

    2012-10-01

    Consequently, application services rendering remote medical services and electronic health record (EHR) have become a hot topic and stimulating increased interest in studying this subject in recent years. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. Sharing EHR information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. With the widespread use of EHR, building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructures for facilitating EHR sharing and EHR integration. In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.

  17. Internet-based remote consultations - general practitioner experience and attitudes in Norway and Germany.

    PubMed

    Kampik, Timotheus; Larsen, Frank; Bellika, Johan Gustav

    2015-01-01

    The objective of the study was to identify experiences and attitudes of German and Norwegian general practitioners (GPs) towards Internet-based remote consultation solutions supporting communication between GPs and patients in the context of the German and Norwegian healthcare systems. Interviews with four German and five Norwegian GPs were conducted. The results were qualitatively analyzed. All interviewed GPs stated they would like to make use of Internet-based remote consultations in the future. Current experiences with remote consultations are existent to a limited degree. No GP reported to use a comprehensive remote consultation solution. The main features GPs would like to see in a remote consultation solution include asynchronous exchange of text messages, video conferencing with text chat, scheduling of remote consultation appointments, secure login and data transfer and the integration of the remote consultation solution into the GP's EHR system.

  18. Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade

    NASA Astrophysics Data System (ADS)

    Graça, S.; Santos, J.; Manso, M. E.

    2004-10-01

    The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.

  19. Remote monitoring of Xpert® MTB/RIF testing in Mozambique: results of programmatic implementation of GxAlert.

    PubMed

    Cowan, J; Michel, C; Manhiça, I; Mutaquiha, C; Monivo, C; Saize, D; Beste, J; Creswell, J; Codlin, A J; Gloyd, S

    2016-03-01

    Electronic diagnostic tests, such as the Xpert® MTB/RIF assay, are being implemented in low- and middle-income countries (LMICs). However, timely information from these tests available via remote monitoring is underutilized. The failure to transmit real-time, actionable data to key individuals such as clinicians, patients, and national monitoring and evaluation teams may negatively impact patient care. To describe recently developed applications that allow for real-time, remote monitoring of Xpert results, and initial implementation of one of these products in central Mozambique. In partnership with the Mozambican National Tuberculosis Program, we compared three different remote monitoring tools for Xpert and selected one, GxAlert, to pilot and evaluate at five public health centers in Mozambique. GxAlert software was successfully installed on all five Xpert computers, and test results are now uploaded daily via a USB internet modem to a secure online database. A password-protected web-based interface allows real-time analysis of test results, and 1200 positive tests for tuberculosis generated 8000 SMS result notifications to key individuals. Remote monitoring of diagnostic platforms is feasible in LMICs. While promising, this effort needs to address issues around patient data ownership, confidentiality, interoperability, unique patient identifiers, and data security.

  20. 20 CFR 422.135 - Reports by beneficiaries.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....135 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures... of disability has been established are obligated to report to the Social Security Administration the... after the close of a taxable year, submit to the Social Security Administration and annual report of his...

  1. 49 CFR 1562.1 - Scope and definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...

  2. 49 CFR 1562.1 - Scope and definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...

  3. 49 CFR 1562.1 - Scope and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...

  4. 49 CFR 1562.1 - Scope and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...

  5. 49 CFR 1562.1 - Scope and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...

  6. Remote Excavation System technology evaluation report: Buried Waste Robotics Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1993-09-01

    This document describes the results from the Remote Excavation System demonstration and testing conducted at the Idaho National Engineering Laboratory during June and July 1993. The purpose of the demonstration was to ascertain the feasibility of the system for skimming soil and removing various types of buried waste in a safe manner and within all regulatory requirements, and to compare the performances of manual and remote operation of a backhoe. The procedures and goals of the demonstration were previously defined in The Remote Excavation System Test Plan, which served as a guideline for evaluating the various components of the systemmore » and discussed the procedures used to conduct the tests.« less

  7. HPC enabled real-time remote processing of laparoscopic surgery

    NASA Astrophysics Data System (ADS)

    Ronaghi, Zahra; Sapra, Karan; Izard, Ryan; Duffy, Edward; Smith, Melissa C.; Wang, Kuang-Ching; Kwartowitz, David M.

    2016-03-01

    Laparoscopic surgery is a minimally invasive surgical technique. The benefit of small incisions has a disadvantage of limited visualization of subsurface tissues. Image-guided surgery (IGS) uses pre-operative and intra-operative images to map subsurface structures. One particular laparoscopic system is the daVinci-si robotic surgical system. The video streams generate approximately 360 megabytes of data per second. Real-time processing this large stream of data on a bedside PC, single or dual node setup, has become challenging and a high-performance computing (HPC) environment may not always be available at the point of care. To process this data on remote HPC clusters at the typical 30 frames per second rate, it is required that each 11.9 MB video frame be processed by a server and returned within 1/30th of a second. We have implement and compared performance of compression, segmentation and registration algorithms on Clemson's Palmetto supercomputer using dual NVIDIA K40 GPUs per node. Our computing framework will also enable reliability using replication of computation. We will securely transfer the files to remote HPC clusters utilizing an OpenFlow-based network service, Steroid OpenFlow Service (SOS) that can increase performance of large data transfers over long-distance and high bandwidth networks. As a result, utilizing high-speed OpenFlow- based network to access computing clusters with GPUs will improve surgical procedures by providing real-time medical image processing and laparoscopic data.

  8. The Design of Data Disaster Recovery of National Fundamental Geographic Information System

    NASA Astrophysics Data System (ADS)

    Zhai, Y.; Chen, J.; Liu, L.; Liu, J.

    2014-04-01

    With the development of information technology, data security of information system is facing more and more challenges. The geographic information of surveying and mapping is fundamental and strategic resource, which is applied in all areas of national economic, defence and social development. It is especially vital to national and social interests when such classified geographic information is directly concerning Chinese sovereignty. Several urgent problems that needs to be resolved for surveying and mapping are how to do well in mass data storage and backup, establishing and improving the disaster backup system especially after sudden natural calamity accident, and ensuring all sectors rapidly restored on information system will operate correctly. For overcoming various disaster risks, protect the security of data and reduce the impact of the disaster, it's no doubt the effective way is to analysis and research on the features of storage and management and security requirements, as well as to ensure that the design of data disaster recovery system suitable for the surveying and mapping. This article analyses the features of fundamental geographic information data and the requirements of storage management, three site disaster recovery system of DBMS plan based on the popular network, storage and backup, data replication and remote switch of application technologies. In LAN that synchronous replication between database management servers and the local storage of backup management systems, simultaneously, remote asynchronous data replication between local storage backup management systems and remote database management servers. The core of the system is resolving local disaster in the remote site, ensuring data security and business continuity of local site. This article focuses on the following points: background, the necessity of disaster recovery system, the analysis of the data achievements and data disaster recovery plan. Features of this program is to use a hardware-based data hot backup, and remote online disaster recovery support for Oracle database system. The achievement of this paper is in summarizing and analysing the common characteristics of disaster of surveying and mapping business system requirements, while based on the actual situation of the industry, designed the basic GIS disaster recovery solutions, and we also give the conclusions about key technologies of RTO and RPO.

  9. Robotic Telecytology for Remote Cytologic Evaluation without an On-site Cytotechnologist or Cytopathologist: A Tale of Implementation and Review of Constraints

    PubMed Central

    Sirintrapun, Sahussapont Joseph; Rudomina, Dorota; Mazzella, Allix; Feratovic, Rusmir; Alago, William; Siegelbaum, Robert; Lin, Oscar

    2017-01-01

    Background: The first satellite center to offer interventional radiology procedures at Memorial Sloan Kettering Cancer Center opened in October 2014. Two of the procedures offered, fine needle aspirations and core biopsies, required rapid on-site cytologic evaluation of smears and biopsy touch imprints for cellular content and adequacy. The volume and frequency of such evaluations did not justify hiring on-site cytotechnologists, and therefore, a dynamic robotic telecytology (TC) solution was created. In this technical article, we present a detailed description of our implementation of robotic TC. Methods: Pathology devised the remote robotic TC solution after acknowledging that it would not be cost effective to staff cytotechnologists on-site at the satellite location. Sakura VisionTek was selected as our robotic TC solution. In addition to configuration of the dynamic robotic TC solution, pathology realized integrating the technology solution into operations would require a multidisciplinary effort and reevaluation of existing staffing and workflows. Results: Extensively described are the architectural framework and multidisciplinary process re-design, created to navigate the constraints of our technical, cultural, and organizational environment. Also reviewed are the benefits and challenges associated with available desktop sharing solutions, particularly accounting for information security concerns. Conclusions: Dynamic robotic TC is effective for immediate evaluations performed without on-site cytotechnology staff. Our goal is providing an extensive perspective of the implementation process, particularly technical, cultural, and operational constraints. Through this perspective, our template can serve as an extensible blueprint for other centers interested in implementing robotic TC without on-site cytotechnologists. PMID:28966832

  10. Robotic Telecytology for Remote Cytologic Evaluation without an On-site Cytotechnologist or Cytopathologist: A Tale of Implementation and Review of Constraints.

    PubMed

    Sirintrapun, Sahussapont Joseph; Rudomina, Dorota; Mazzella, Allix; Feratovic, Rusmir; Alago, William; Siegelbaum, Robert; Lin, Oscar

    2017-01-01

    The first satellite center to offer interventional radiology procedures at Memorial Sloan Kettering Cancer Center opened in October 2014. Two of the procedures offered, fine needle aspirations and core biopsies, required rapid on-site cytologic evaluation of smears and biopsy touch imprints for cellular content and adequacy. The volume and frequency of such evaluations did not justify hiring on-site cytotechnologists, and therefore, a dynamic robotic telecytology (TC) solution was created. In this technical article, we present a detailed description of our implementation of robotic TC. Pathology devised the remote robotic TC solution after acknowledging that it would not be cost effective to staff cytotechnologists on-site at the satellite location. Sakura VisionTek was selected as our robotic TC solution. In addition to configuration of the dynamic robotic TC solution, pathology realized integrating the technology solution into operations would require a multidisciplinary effort and reevaluation of existing staffing and workflows. Extensively described are the architectural framework and multidisciplinary process re-design, created to navigate the constraints of our technical, cultural, and organizational environment. Also reviewed are the benefits and challenges associated with available desktop sharing solutions, particularly accounting for information security concerns. Dynamic robotic TC is effective for immediate evaluations performed without on-site cytotechnology staff. Our goal is providing an extensive perspective of the implementation process, particularly technical, cultural, and operational constraints. Through this perspective, our template can serve as an extensible blueprint for other centers interested in implementing robotic TC without on-site cytotechnologists.

  11. Responsiveness of Food Security Reporting to Environmental Variability and Agricultural Production Deficits

    NASA Astrophysics Data System (ADS)

    Brickley, E. B.; Brown, M. E.

    2010-12-01

    This paper uses 1342 food security update reports from the US Agency for International Development (USAID)’s Famine Early Warning System Network (FEWS NET) in an analysis that focuses on the environmental, market, and livelihood influences on the food security in 17 countries in Africa from 2000-2009. A textual analysis was conducted using the reports as a primary data source to evaluate the responsiveness of food security analysis to environmental variability and food production deficits. The research shows that FEWS NET analysts demonstrate a consistent approach across all 17 countries as to the discussion and use of rainfall information, agricultural production, food prices and food access parameters. There are significant differences in the use of remote sensing and other technical information between East, West and Southern African country analysts, with satellite remote sensing of vegetation being used 28% of the time, rainfall imagery 84% and gridded crop models only 10% of the time. Significantly more discussion of biophysical information was seen during the rainy season than during the dry season, and different satellite products were used during periods of drought than periods of adequate moisture. As the demand for early warning information grows to more countries in different ecosystems, there is likely to be an increased need for the effective utilization of remote sensing, market, and livelihood data, and it is also probable that this information will be critical for improved policy-making regarding climate extremes in the future.

  12. 32 CFR 322.5 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...

  13. 32 CFR 322.5 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...

  14. 32 CFR 322.5 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...

  15. 32 CFR 322.5 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...

  16. Design of a secure remote management module for a software-operated medical device.

    PubMed

    Burnik, Urban; Dobravec, Štefan; Meža, Marko

    2017-12-09

    Software-based medical devices need to be maintained throughout their entire life cycle. The efficiency of after-sales maintenance can be improved by managing medical systems remotely. This paper presents how to design the remote access function extensions in order to prevent risks imposed by uncontrolled remote access. A thorough analysis of standards and legislation requirements regarding safe operation and risk management of medical devices is presented. Based on the formal requirements, a multi-layer machine design solution is proposed that eliminates remote connectivity risks by strict separation of regular device functionalities from remote management service, deploys encrypted communication links and uses digital signatures to prevent mishandling of software images. The proposed system may also be used as an efficient version update of the existing medical device designs.

  17. Online catalog access and distribution of remotely sensed information

    NASA Astrophysics Data System (ADS)

    Lutton, Stephen M.

    1997-09-01

    Remote sensing is providing voluminous data and value added information products. Electronic sensors, communication electronics, computer software, hardware, and network communications technology have matured to the point where a distributed infrastructure for remotely sensed information is a reality. The amount of remotely sensed data and information is making distributed infrastructure almost a necessity. This infrastructure provides data collection, archiving, cataloging, browsing, processing, and viewing for applications from scientific research to economic, legal, and national security decision making. The remote sensing field is entering a new exciting stage of commercial growth and expansion into the mainstream of government and business decision making. This paper overviews this new distributed infrastructure and then focuses on describing a software system for on-line catalog access and distribution of remotely sensed information.

  18. 49 CFR 1503.421 - Streamlined civil penalty procedures for certain security violations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Assessment of Civil Penalties by TSA § 1503.421 Streamlined civil penalty procedures for certain security violations. (a) Notice of violation. TSA, at the... violations described in the section and as otherwise provided by the Administrator. TSA may serve a Notice of...

  19. Landscape ecological security assessment based on projection pursuit in Pearl River Delta.

    PubMed

    Gao, Yang; Wu, Zhifeng; Lou, Quansheng; Huang, Huamei; Cheng, Jiong; Chen, Zhangli

    2012-04-01

    Regional landscape ecological security is an important issue for ecological security, and has a great influence on national security and social sustainable development. The Pearl River Delta (PRD) in southern China has experienced rapid economic development and intensive human activities in recent years. This study, based on landscape analysis, provides a method to discover the alteration of character among different landscape types and to understand the landscape ecological security status. Based on remotely sensed products of the Landsat 5 TM images in 1990 and the Landsat 7 ETM+ images in 2005, landscape classification maps of nine cities in the PRD were compiled by implementing Remote Sensing and Geographic Information System technology. Several indices, including aggregation, crush index, landscape shape index, Shannon's diversity index, landscape fragile index, and landscape security adjacent index, were applied to analyze spatial-temporal characteristics of landscape patterns in the PRD. A landscape ecological security index based on these outcomes was calculated by projection pursuit using genetic algorithm. The landscape ecological security of nine cities in the PRD was thus evaluated. The main results of this research are listed as follows: (1) from 1990 to 2005, the aggregation index, crush index, landscape shape index, and Shannon's diversity index of nine cities changed little in the PRD, while the landscape fragile index and landscape security adjacent index changed obviously. The landscape fragile index of nine cities showed a decreasing trend; however, the landscape security adjacent index has been increasing; (2) from 1990 to 2005, landscape ecology of the cities of Zhuhai and Huizhou maintained a good security situation. However, there was a relatively low value of ecological security in the cities of Dongguan and Foshan. Except for Foshan and Guangzhou, whose landscape ecological security situation were slightly improved, the cities had reduced values in landscape ecological security, with the most decreased number 0.52 in Zhaoqing. Results of this study offer important information for regional eco-construction and natural resource exploitation.

  20. Security breaches: tips for assessing and limiting your risks.

    PubMed

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  1. 76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...

  2. A data protection scheme for a remote vital signs monitoring healthcare service.

    PubMed

    Gritzalis, D; Lambrinoudakis, C

    2000-01-01

    Personal and medical data processed by Healthcare Information Systems must be protected against unauthorized access, modification and withholding. Security measures should be selected to provide the required level of protection in a cost-efficient manner. This is only feasible if specific characteristics of the information system are examined on a basis of a risk analysis methodology. This paper presents the results of a risk analysis, based on the CRAMM methodology, for a healthcare organization offering a patient home-monitoring service through the transmission of vital signs, focusing on the identified security needs and the proposed countermeasures. The architectural and functional models of this service were utilized for identifying and valuating the system assets, the associated threats and vulnerabilities, as well as for assessing the impact on the patients and on the service provider, should the security of any of these assets is affected. A set of adequate organizational, administrative and technical countermeasures is described for the remote vital signs monitoring service, thus providing the healthcare organization with a data protection framework that can be utilized for the development of its own security plan.

  3. Ground Truth Sampling and LANDSAT Accuracy Assessment

    NASA Technical Reports Server (NTRS)

    Robinson, J. W.; Gunther, F. J.; Campbell, W. J.

    1982-01-01

    It is noted that the key factor in any accuracy assessment of remote sensing data is the method used for determining the ground truth, independent of the remote sensing data itself. The sampling and accuracy procedures developed for nuclear power plant siting study are described. The purpose of the sampling procedure was to provide data for developing supervised classifications for two study sites and for assessing the accuracy of that and the other procedures used. The purpose of the accuracy assessment was to allow the comparison of the cost and accuracy of various classification procedures as applied to various data types.

  4. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    PubMed Central

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906

  5. Secure encapsulation and publication of biological services in the cloud computing environment.

    PubMed

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, P. W.

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  7. 20 CFR 422.210 - Judicial review.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Procedures of the Office of... Social Security Act, or of health services to be provided by a health maintenance organization without...) of the Act). The Social Security Act does not provide for a right to judicial review of a final...

  8. 6 CFR 21.13 - Procedure for effecting compliance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Procedure for effecting compliance. 21.13 Section 21.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL...

  9. 6 CFR 21.13 - Procedure for effecting compliance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Procedure for effecting compliance. 21.13 Section 21.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL...

  10. 6 CFR 21.13 - Procedure for effecting compliance.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Procedure for effecting compliance. 21.13 Section 21.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL...

  11. 6 CFR 21.13 - Procedure for effecting compliance.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Procedure for effecting compliance. 21.13 Section 21.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL...

  12. 6 CFR 21.13 - Procedure for effecting compliance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Procedure for effecting compliance. 21.13 Section 21.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL...

  13. 32 CFR 1292.5 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures. 1292.5 Section 1292.5 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.5 Procedures. (a) Security regulations and orders will be...

  14. 32 CFR 1292.5 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Procedures. 1292.5 Section 1292.5 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.5 Procedures. (a) Security regulations and orders will be...

  15. 32 CFR 1292.5 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Procedures. 1292.5 Section 1292.5 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.5 Procedures. (a) Security regulations and orders will be...

  16. 32 CFR 1292.5 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Procedures. 1292.5 Section 1292.5 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.5 Procedures. (a) Security regulations and orders will be...

  17. 32 CFR 1292.5 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Procedures. 1292.5 Section 1292.5 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.5 Procedures. (a) Security regulations and orders will be...

  18. 17 CFR 39.3 - Procedures for registration.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Procedures for registration. 39.3 Section 39.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES... procedures. An organization desiring to be registered as a derivatives clearing organization shall file...

  19. 49 CFR 1503.201 - Reports of violations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Reports of violations. 1503.201 Section 1503.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Investigative Procedures §...

  20. Integrated Remote Sensing Modalities for Classification at a Legacy Test Site

    NASA Astrophysics Data System (ADS)

    Lee, D. J.; Anderson, D.; Craven, J.

    2016-12-01

    Detecting, locating, and characterizing suspected underground nuclear test sites is of interest to the worldwide nonproliferation monitoring community. Remote sensing provides both cultural and surface geological information over a large search area in a non-intrusive manner. We have characterized a legacy nuclear test site at the Nevada National Security Site (NNSS) using an aerial system based on RGB imagery, light detection and ranging, and hyperspectral imaging. We integrate these different remote sensing modalities to perform pattern recognition and classification tasks on the test site. These tasks include detecting cultural artifacts and exotic materials. We evaluate if the integration of different remote sensing modalities improves classification performance.

  1. 77 FR 35464 - Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0029] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...

  2. 78 FR 45010 - Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-25

    ...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0030] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...

  3. 31 CFR 306.111 - Procedure for applying for relief.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or... some other person, the capacity in which he represents the owner. (b) The identity of the security by...

  4. 31 CFR 306.111 - Procedure for applying for relief.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or defacement of a... person, the capacity in which he represents the owner. (b) The identity of the security by title of loan...

  5. 6 CFR 9.32 - Penalty procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Penalty procedures. 9.32 Section 9.32 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Penalties and... provisions of the Program Fraud and Civil Remedies Act, 31 U.S.C. 3803 (except subsection (c)), 3804, 3805...

  6. 77 FR 25188 - Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-27

    ... general aviation (GA) aircraft operators who wish to fly into and/or out of Ronald Reagan Washington.... Information Collection Requirement Title: Enhanced Security Procedures at Ronald Reagan Washington National...] Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security Procedures at Ronald...

  7. 32 CFR Appendix A to Part 223 - Procedures for Identifying and Controlling DoD UCNI

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures, including security plans, procedures, and equipment, for the physical protection of DoD... stand-alone personal computers, or shared-logic work processing systems, if protection from unauthorized... and security by increasing significantly the likelihood of the illegal production of nuclear weapons...

  8. 76 FR 70830 - Proposed Information Collection (Procedures, and Security for Government Financing) Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... (Procedures, and Security for Government Financing) Activity; Comment Request AGENCY: Office of Management... contract payments and to determine if the contractor has adequate security to warrant payment in advance... correspondence. During the comment period, comments may be viewed online through FDMS. FOR FURTHER INFORMATION...

  9. 20 CFR 422.108 - Criminal penalties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.108... connection with earnings records or for wrongful use or misrepresentation in connection with social security numbers, pursuant to section 208 of the Social Security Act and sections of title 18 U.S.C. (42 U.S.C. 408...

  10. Development of a highly automated system for the remote evaluation of individual tree parameters

    Treesearch

    Richard Pollock

    2000-01-01

    A highly-automated procedure for remotely estimating individual tree location, crown diameter, species class, and height has been developed. This procedure will involve the use of a multimodal airborne sensing system that consists of a digital frame camera, a scanning laser rangefinder, and a position and orientation measurement system. Data from the multimodal sensing...

  11. Mathematic modeling of the Earth's surface and the process of remote sensing

    NASA Technical Reports Server (NTRS)

    Balter, B. M.

    1979-01-01

    It is shown that real data from remote sensing of the Earth from outer space are not best suited to the search for optimal procedures with which to process such data. To work out the procedures, it was proposed that data synthesized with the help of mathematical modeling be used. A criterion for simularity to reality was formulated. The basic principles for constructing methods for modeling the data from remote sensing are recommended. A concrete method is formulated for modeling a complete cycle of radiation transformations in remote sensing. A computer program is described which realizes the proposed method. Some results from calculations are presented which show that the method satisfies the requirements imposed on it.

  12. Information Security - Data Loss Prevention Procedure

    EPA Pesticide Factsheets

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  13. Network-based reading system for lung cancer screening CT

    NASA Astrophysics Data System (ADS)

    Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio

    2006-03-01

    This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.

  14. Development of a Spectropolarimetric Remote Sensing Capability

    DTIC Science & Technology

    2013-03-01

    34Review of passive imaging polarimetry for remote sensing applications," Appl. Opt. 45, 5453-5469 (2006). [8] D. B. Chenault, "Infrared...Annen, “Hyperspectral IR polarimetry with application in demining and unexploded ordnance detection,” SPIE Vol. 3534 (1998). [30] Pesses, M... Polarimetry , Fourier Transform Spectrometer, DOLP, Spectropolarimetry, Stokes 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18

  15. Remote Wiping and Secure Deletion on Mobile Devices: A Review.

    PubMed

    Leom, Ming Di; Choo, Kim-Kwang Raymond; Hunt, Ray

    2016-11-01

    Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users-and their businesses-to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. © 2016 American Academy of Forensic Sciences.

  16. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1978-10-12

    passengers and over one million pieces of carry-on baggage daily. A major revision of the regulation that established basic airport security requirements...Crimes- Prevented - The number of hijacking attempts or other crimes against civil aviation prevented or deterred by airline and airport security procedures...from doing so by airline and airport security procedures. This makes a total of 74 possible hijackings or related crimes that may have been prevented

  17. Remote monitoring and security alert based on motion detection using mobile

    NASA Astrophysics Data System (ADS)

    Suganya Devi, K.; Srinivasan, P.

    2016-03-01

    Background model does not have any robust solution and constitutes one of the main problems in surveillance systems. The aim of the paper is to provide a mobile based security to a remote monitoring system through a WAP using GSM modem. It is most designed to provide durability and versatility for a wide variety of indoor and outdoor applications. It is compatible with both narrow and band networks and provides simultaneous image detection. The communicator provides remote control, event driven recording, including pre-alarm and post-alarm and image motion detection. The web cam allowing them to be mounted either to a ceiling or wall without requiring bracket, with the use of web cam. We could continuously monitoring status in the client system through the web. If any intruder arrives in the client system, server will provide an alert to the mobile (what we are set in the message that message send to the authorized person) and the client can view the image using WAP.

  18. Resource analysis applications in Michigan. [NASA remote sensing

    NASA Technical Reports Server (NTRS)

    Schar, S. W.; Enslin, W. R.; Sattinger, I. J.; Robinson, J. G.; Hosford, K. R.; Fellows, R. S.; Raad, J. H.

    1974-01-01

    During the past two years, available NASA imagery has been applied to a broad spectrum of problems of concern to Michigan-based agencies. These demonstrations include the testing of remote sensing for the purposes of (1) highway corridor planning and impact assessments, (2) game management-area information bases, (3) multi-agency river basin planning, (4) timber resource management information systems, (5) agricultural land reservation policies, and (6) shoreline flooding damage assessment. In addition, cost accounting procedures have been developed for evaluating the relative costs of utilizing remote sensing in land cover and land use analysis data collection procedures.

  19. Rapid Building Assessment Project

    DTIC Science & Technology

    2014-05-01

    Efficiency Buildings Hub EISA Energy Independence Security Act EPRI The Electric Power and Research Institute ESTCP Environmental Security Technology...Ordinary Least Squares PG&E Pacific Gas & Electric R&D research and development RBA Remote Building Analytics REST representational state...utilities across North America and Europe. Requiring only hourly utility electric meter data, the building type, and address, FirstFuel can produce a

  20. 32 CFR 155.6 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Procedures. 155.6 Section 155.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY... Secretary of Defense or the head of another Department or Agency determines that the hearing procedures and...

  1. 32 CFR 155.6 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Procedures. 155.6 Section 155.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY... Secretary of Defense or the head of another Department or Agency determines that the hearing procedures and...

  2. 32 CFR 155.6 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Procedures. 155.6 Section 155.6 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY... Secretary of Defense or the head of another Department or Agency determines that the hearing procedures and...

  3. 12 CFR 1250.2 - Procedural requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requirements. (a) Procedures. An Enterprise shall implement procedures reasonably designed to ensure for any loan that is secured by improved real estate or a mobile home located in an area that has been... amended and purchased by the Enterprise, the building or mobile home and any personal property securing...

  4. 17 CFR 166.5 - Dispute settlement procedures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Dispute settlement procedures. 166.5 Section 166.5 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION CUSTOMER PROTECTION RULES § 166.5 Dispute settlement procedures. (a) Definitions. (1) The term claim or grievance as...

  5. Some Defence Applications of Civilian Remote Sensing Satellite Images

    DTIC Science & Technology

    1993-11-01

    This report is on a pilot study to demonstrate some of the capabilities of remote sensing in intelligence gathering. A wide variety of issues, both...colour images. The procedure will be presented in a companion report. Remote sensing , Satellite imagery, Image analysis, Military applications, Military intelligence.

  6. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  7. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  8. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  9. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  10. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  11. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  12. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  13. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  14. 17 CFR 248.30 - Procedures to safeguard customer records and information; disposal of consumer report information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...

  15. 17 CFR 248.30 - Procedures to safeguard customer records and information; disposal of consumer report information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P, S-AM, AND S... administrative, technical, and physical safeguards for the protection of customer records and information. These...

  16. 17 CFR 248.30 - Procedures to safeguard customer records and information; disposal of consumer report information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...

  17. 17 CFR 248.30 - Procedures to safeguard customer records and information; disposal of consumer report information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...

  18. 17 CFR 248.30 - Procedures to safeguard customer records and information; disposal of consumer report information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...

  19. An automatic calibration procedure for remote eye-gaze tracking systems.

    PubMed

    Model, Dmitri; Guestrin, Elias D; Eizenman, Moshe

    2009-01-01

    Remote gaze estimation systems use calibration procedures to estimate subject-specific parameters that are needed for the calculation of the point-of-gaze. In these procedures, subjects are required to fixate on a specific point or points at specific time instances. Advanced remote gaze estimation systems can estimate the optical axis of the eye without any personal calibration procedure, but use a single calibration point to estimate the angle between the optical axis and the visual axis (line-of-sight). This paper presents a novel automatic calibration procedure that does not require active user participation. To estimate the angles between the optical and visual axes of each eye, this procedure minimizes the distance between the intersections of the visual axes of the left and right eyes with the surface of a display while subjects look naturally at the display (e.g., watching a video clip). Simulation results demonstrate that the performance of the algorithm improves as the range of viewing angles increases. For a subject sitting 75 cm in front of an 80 cm x 60 cm display (40" TV) the standard deviation of the error in the estimation of the angles between the optical and visual axes is 0.5 degrees.

  20. Monitoring Items in Real Time to Enhance CAT Security

    ERIC Educational Resources Information Center

    Zhang, Jinming; Li, Jie

    2016-01-01

    An IRT-based sequential procedure is developed to monitor items for enhancing test security. The procedure uses a series of statistical hypothesis tests to examine whether the statistical characteristics of each item under inspection have changed significantly during CAT administration. This procedure is compared with a previously developed…

  1. 20 CFR 422.710 - Procedures SSA will follow.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 422.710 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Use of SSA Telephone Lines § 422.710 Procedures SSA will follow. SSA component(s) that plan to listen-in to or record... written certification of need to the Commissioner of Social Security or designee at least 30 days before...

  2. 20 CFR 422.710 - Procedures SSA will follow.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 422.710 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Use of SSA Telephone Lines § 422.710 Procedures SSA will follow. SSA component(s) that plan to listen-in to or record... written certification of need to the Commissioner of Social Security or designee at least 30 days before...

  3. 17 CFR 141.8 - Procedures for salary offset.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Procedures for salary offset. 141.8 Section 141.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SALARY OFFSET § 141.8 Procedures for salary offset. (a) Deductions to liquidate an employee's debt will be by...

  4. Acceptance test procedure bldg. 271-U remote monitoring of project W-059 B-Plant canyon exhaust system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MCDANIEL, K.S.

    1999-09-01

    The test procedure provides for verifying indications and alarms The test procedure provides for verifying indications and alarms associated with the B Plant Canyon Ventilation System as they are being displayed on a remote monitoring workstation located in building 271-U. The system application software was installed by PLCS Plus under contract from B&W Hanford Company. The application software was installed on an existing operator workstation in building 271U which is owned and operated by Bechtel Hanford Inc.

  5. Airport Remote Tower Sensor Systems

    NASA Technical Reports Server (NTRS)

    Maluf, David A.; Gawdiak, Yuri; Leidichj, Christopher; Papasin, Richard; Tran, Peter B.; Bass, Kevin

    2006-01-01

    Networks of video cameras, meteorological sensors, and ancillary electronic equipment are under development in collaboration among NASA Ames Research Center, the Federal Aviation Administration (FAA), and the National Oceanic Atmospheric Administration (NOAA). These networks are to be established at and near airports to provide real-time information on local weather conditions that affect aircraft approaches and landings. The prototype network is an airport-approach-zone camera system (AAZCS), which has been deployed at San Francisco International Airport (SFO) and San Carlos Airport (SQL). The AAZCS includes remotely controlled color video cameras located on top of SFO and SQL air-traffic control towers. The cameras are controlled by the NOAA Center Weather Service Unit located at the Oakland Air Route Traffic Control Center and are accessible via a secure Web site. The AAZCS cameras can be zoomed and can be panned and tilted to cover a field of view 220 wide. The NOAA observer can see the sky condition as it is changing, thereby making possible a real-time evaluation of the conditions along the approach zones of SFO and SQL. The next-generation network, denoted a remote tower sensor system (RTSS), will soon be deployed at the Half Moon Bay Airport and a version of it will eventually be deployed at Los Angeles International Airport. In addition to remote control of video cameras via secure Web links, the RTSS offers realtime weather observations, remote sensing, portability, and a capability for deployment at remote and uninhabited sites. The RTSS can be used at airports that lack control towers, as well as at major airport hubs, to provide synthetic augmentation of vision for both local and remote operations under what would otherwise be conditions of low or even zero visibility.

  6. 42 CFR 488.64 - Remote facility variances for utilization review requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 5 2014-10-01 2014-10-01 false Remote facility variances for utilization review requirements. 488.64 Section 488.64 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... PROCEDURES Special Requirements § 488.64 Remote facility variances for utilization review requirements. (a...

  7. 42 CFR 488.64 - Remote facility variances for utilization review requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 5 2012-10-01 2012-10-01 false Remote facility variances for utilization review requirements. 488.64 Section 488.64 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... PROCEDURES Special Requirements § 488.64 Remote facility variances for utilization review requirements. (a...

  8. 42 CFR 488.64 - Remote facility variances for utilization review requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 5 2011-10-01 2011-10-01 false Remote facility variances for utilization review requirements. 488.64 Section 488.64 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... PROCEDURES Special Requirements § 488.64 Remote facility variances for utilization review requirements. (a...

  9. 42 CFR 488.64 - Remote facility variances for utilization review requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 5 2013-10-01 2013-10-01 false Remote facility variances for utilization review requirements. 488.64 Section 488.64 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... PROCEDURES Special Requirements § 488.64 Remote facility variances for utilization review requirements. (a...

  10. 19 CFR 143.42 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... (CONTINUED) SPECIAL ENTRY PROCEDURES Remote Location Filing § 143.42 Definitions. The following definitions... E: (a) Remote Location Filing (RLF)—“RLF” is an elective method of making entry by which a customs... from a remote location other than where the goods are being entered. (Importers filing on their own...

  11. Beyond the Blueprints: Enhancing Access to Materials in Remote Storage

    ERIC Educational Resources Information Center

    Kruger, Betsy

    2003-01-01

    For most research libraries, remote storage of significant portions of their print collections has become an economic necessity. Historically, user objections to remote storage have focused on access-related issues: i.e., lack of browsability, cumbersome requesting procedures, lengthy retrieval times, and lack of content information about…

  12. 19 CFR 143.42 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... (CONTINUED) SPECIAL ENTRY PROCEDURES Remote Location Filing § 143.42 Definitions. The following definitions... E: (a) Remote Location Filing (RLF)—“RLF” is an elective method of making entry by which a customs... from a remote location other than where the goods are being entered. (Importers filing on their own...

  13. 19 CFR 143.42 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... (CONTINUED) SPECIAL ENTRY PROCEDURES Remote Location Filing § 143.42 Definitions. The following definitions... E: (a) Remote Location Filing (RLF)—“RLF” is an elective method of making entry by which a customs... from a remote location other than where the goods are being entered. (Importers filing on their own...

  14. 19 CFR 143.42 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... (CONTINUED) SPECIAL ENTRY PROCEDURES Remote Location Filing § 143.42 Definitions. The following definitions... E: (a) Remote Location Filing (RLF)—“RLF” is an elective method of making entry by which a customs... from a remote location other than where the goods are being entered. (Importers filing on their own...

  15. 19 CFR 143.42 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... (CONTINUED) SPECIAL ENTRY PROCEDURES Remote Location Filing § 143.42 Definitions. The following definitions... E: (a) Remote Location Filing (RLF)—“RLF” is an elective method of making entry by which a customs... from a remote location other than where the goods are being entered. (Importers filing on their own...

  16. Two Stage Sibling Cycle Compressor/Expander.

    DTIC Science & Technology

    1994-02-01

    documents, follow the procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1 -R, Information Security Program Regulation...procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For...Spae Piston rotation periodically connects channels from expansion/ compresion ces to ports P1Port B2 Heat Exchangers B Piston moves Ports Process Al

  17. SELF-CENTERING POSITIVE LOCKING GRAPNEL

    DOEpatents

    Hopper, C.G.

    1961-07-01

    A grapnel used for remotely securing a load to be hoisted is described. The grapnel of the invention is generally conical in shape with a plurality of semi-open bores laterally disposed about the device. The bores meet at the apex of the grapnel and there provde a securing pocket for a spherical member. A load provided with a rigid support rod having a spherical member at its end can be secured by directing the spherical member down one of the bores and into the securing pocket. The major advantsges of the invention reside in the self- centering and positive locking features.

  18. Food Security, Decision Making and the Use of Remote Sensing in Famine Early Warning Systems

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.

    2008-01-01

    Famine early warning systems use remote sensing in combination with socio-economic and household food economy analysis to provide timely and rigorous information on emerging food security crises. The Famine Early Warning Systems Network (FEWS NET) is the US Agency for International Development's decision support system in 20 African countries, as well as in Guatemala, Haiti and Afghanistan. FEWS NET provides early and actionable policy guidance for the US Government and its humanitarian aid partners. As we move into an era of climate change where weather hazards will become more frequent and severe, understanding how to provide quantitative and actionable scientific information for policy makers using biophysical data is critical for an appropriate and effective response.

  19. CHEMICAL/BIOLOGICAL-CAPABLE RPA THREATS AND NATIONAL SECURITY IMPLICATIONS

    DTIC Science & Technology

    2016-02-07

    iv Abstract The technological landscape of the 21st century is evolving at an ever-increasing pace . Autonomous remotely piloted...chemical and biological conventions must occur to address existing coverage gaps in an effort to keep pace with the ongoing advances of science and...21st century is evolving at an ever-increasing pace . Autonomous remotely piloted aircrafts (RPAs) continue to become increasingly sophisticated in

  20. Weird Project: E-Health Service Improvement Using WiMAX

    NASA Astrophysics Data System (ADS)

    Cimmino, Antonio; Casali, Fulvio; Mambretti, Cinzia

    Today the major obstacle to massive deployment of telemedicine applications are the security issues related to the exchange of real time information between different elements that are not at fixed locations. WiMAX, the new standard for wireless communications, is one of the most promising technologies for broadband access in a fixed and mobile environment and it is expected to overcome the above mentioned obstacle. The FP6-WEIRD [1] (WiMax Extension to Isolated Remote Data networks) project has: analysed how this technology can guarantee secure real time data transmission between mobile elements, built some successful demonstrations and paved the way to future commercial applications. This paper in particular describes: main promising e-health applications that WiMax would enable; the technological highlights and the main challenges that WiMax has to face in e-health applications such as accounting, privacy, security, data integrity; the way in which the WEIRD project 0 has studied the wireless access to medical communities and equipment in remote or impervious areas. 0 0; some envisaged implementations.

  1. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  2. A Hybrid Authentication and Authorization Process for Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less

  3. Toward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach

    PubMed Central

    Tan, Robin; Perkowski, Marek

    2017-01-01

    Electrocardiogram (ECG) signals sensed from mobile devices pertain the potential for biometric identity recognition applicable in remote access control systems where enhanced data security is demanding. In this study, we propose a new algorithm that consists of a two-stage classifier combining random forest and wavelet distance measure through a probabilistic threshold schema, to improve the effectiveness and robustness of a biometric recognition system using ECG data acquired from a biosensor integrated into mobile devices. The proposed algorithm is evaluated using a mixed dataset from 184 subjects under different health conditions. The proposed two-stage classifier achieves a total of 99.52% subject verification accuracy, better than the 98.33% accuracy from random forest alone and 96.31% accuracy from wavelet distance measure algorithm alone. These results demonstrate the superiority of the proposed algorithm for biometric identification, hence supporting its practicality in areas such as cloud data security, cyber-security or remote healthcare systems. PMID:28230745

  4. Toward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach.

    PubMed

    Tan, Robin; Perkowski, Marek

    2017-02-20

    Electrocardiogram (ECG) signals sensed from mobile devices pertain the potential for biometric identity recognition applicable in remote access control systems where enhanced data security is demanding. In this study, we propose a new algorithm that consists of a two-stage classifier combining random forest and wavelet distance measure through a probabilistic threshold schema, to improve the effectiveness and robustness of a biometric recognition system using ECG data acquired from a biosensor integrated into mobile devices. The proposed algorithm is evaluated using a mixed dataset from 184 subjects under different health conditions. The proposed two-stage classifier achieves a total of 99.52% subject verification accuracy, better than the 98.33% accuracy from random forest alone and 96.31% accuracy from wavelet distance measure algorithm alone. These results demonstrate the superiority of the proposed algorithm for biometric identification, hence supporting its practicality in areas such as cloud data security, cyber-security or remote healthcare systems.

  5. Modeling tropical land-use and land-cover change related to sugarcane crops using remote sensing and soft computing techniques

    NASA Astrophysics Data System (ADS)

    Vicente, L. E.; Koga-Vicente, A.; Friedel, M. J.; Zullo, J.; Victoria, D.; Gomes, D.; Bayma, G.

    2013-12-01

    Agriculture is closely related to land-use/cover changes (LUCC). The increase in demand for ethanol necessitates the expansion of areas occupied by corn and sugar cane. In São Paulo state, the conversion of this land raises concern for impacts on food security, such as the decrease in traditional food crop production areas. We used remote sensing data to train and evaluate future land-cover scenarios using a machine-learning algorithm. The land cover classification procedure was based on Landsat 5 TM images, obtained from the Global Land Survey, covering three time periods over twenty years (1990 - 2010). Landsat images were segmented into homogeneous objects, which represent areas on the ground with similar spatial and spectral characteristics. These objects are related to the distinct land cover types that occur in each municipality. Based on the object shape, texture and spectral characteristics, land use/cover was visually identified, considering the following classes: sugarcane plantations, pasture lands, natural cover, forest plantation, permanent crop, short cycle crop, water bodies and urban areas. Results for the western regions of São Paulo state indicate that sugarcane crop area advanced mostly upon pasture areas with few areas of food crops being replaced by sugarcane.

  6. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  7. Study on Remote Monitoring System of Crossing and Spanning Tangent Tower

    NASA Astrophysics Data System (ADS)

    Chen, Da-bing; Zhang, Nai-long; Zhang, Meng-ge; Wang, Ze-hua; Zhang, Yan

    2017-05-01

    In order to grasp the vibration state of overhead transmission line and ensure the operational security of transmission line, the remote monitoring system of crossing and spanning tangent tower was studied. By use of this system, the displacement, velocity and acceleration of the tower, and the local weather data are collected automatically, displayed on computer of remote monitoring centre through wireless network, real-time collection and transmission of vibration signals are realized. The applying results show that the system is excellent in reliability and accuracy and so on. The system can be used to remote monitoring of transmission tower of UHV power transmission lines and in large spanning areas.

  8. State Education Department: Security over Pupil Evaluation Program and Program Evaluation Test Materials Needs Improvement. Report 91-S-2.

    ERIC Educational Resources Information Center

    New York State Office of the Comptroller, Albany.

    Findings of an audit of the New York State Education Department's procedures to maintain security over Pupil Evaluation Program (PEP) and Program Evaluation Test (PET) examination materials are presented in this report. The audit sought to determine whether the department's security procedures adequately prevented unauthorized access to exam…

  9. 6 CFR 5.46 - Procedure when response to demand is required prior to receiving instructions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Procedure when response to demand is required prior to receiving instructions. 5.46 Section 5.46 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5...

  10. Multispectral Remote Sensing of the Earth and Environment Using KHawk Unmanned Aircraft Systems

    NASA Astrophysics Data System (ADS)

    Gowravaram, Saket

    This thesis focuses on the development and testing of the KHawk multispectral remote sensing system for environmental and agricultural applications. KHawk Unmanned Aircraft System (UAS), a small and low-cost remote sensing platform, is used as the test bed for aerial video acquisition. An efficient image geotagging and photogrammetric procedure for aerial map generation is described, followed by a comprehensive error analysis on the generated maps. The developed procedure is also used for generation of multispectral aerial maps including red, near infrared (NIR) and colored infrared (CIR) maps. A robust Normalized Difference Vegetation index (NDVI) calibration procedure is proposed and validated by ground tests and KHawk flight test. Finally, the generated aerial maps and their corresponding Digital Elevation Models (DEMs) are used for typical application scenarios including prescribed fire monitoring, initial fire line estimation, and tree health monitoring.

  11. 49 CFR 1503.635 - Evidence.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... present the party's case or defense by oral, documentary, or demonstrative evidence, to submit rebuttal...

  12. Computer User's Guide to the Protection of Information Resources. NIST Special Publication 500-171.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…

  13. Defence and security applications of quantum cascade lasers

    NASA Astrophysics Data System (ADS)

    Grasso, Robert J.

    2016-09-01

    Quantum Cascade Lasers (QCL) have seen tremendous recent application in the realm of Defence and Security. And, in many instances replacing traditional solid state lasers as the source of choice for Countermeasures, Remote Sensing, In-situ Sensing, Through-Barrier Sensing, and many others. Following their development and demonstration in the early 1990's, QCL's reached some maturity and specific defence and security application prior to 2005; with much initial development fostered by DARPA initiatives in the US, dstl, MoD, and EOARD funding initiatives in the UK, and University level R&D such as those by Prof Manijeh Razeghi at Northwestern University [1], and Prof Ted Masselink at Humboldt University [2]. As QCL's provide direct mid-IR laser output for electrical input, they demonstrate high quantum efficiency compared with diode pumped solid state lasers with optical parametric oscillators (OPOs) to generate mid-Infrared output. One particular advantage of QCL's is their very broad operational bandwidth, extending from the terahertz to the near-infrared spectral regions. Defence and Security areas benefiting from QCL's include: Countermeasures, Remote Sensing, Through-the-Wall Sensing, and Explosive Detection. All information used to construct this paper obtained from open sources.

  14. A web-based remote radiation treatment planning system using the remote desktop function of a computer operating system: a preliminary report.

    PubMed

    Suzuki, Keishiro; Hirasawa, Yukinori; Yaegashi, Yuji; Miyamoto, Hideki; Shirato, Hiroki

    2009-01-01

    We developed a web-based, remote radiation treatment planning system which allowed staff at an affiliated hospital to obtain support from a fully staffed central institution. Network security was based on a firewall and a virtual private network (VPN). Client computers were installed at a cancer centre, at a university hospital and at a staff home. We remotely operated the treatment planning computer using the Remote Desktop function built in to the Windows operating system. Except for the initial setup of the VPN router, no special knowledge was needed to operate the remote radiation treatment planning system. There was a time lag that seemed to depend on the volume of data traffic on the Internet, but it did not affect smooth operation. The initial cost and running cost of the system were reasonable.

  15. 17 CFR 39.4 - Procedures for implementing derivatives clearing organization rules and clearing new products.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Procedures for implementing derivatives clearing organization rules and clearing new products. 39.4 Section 39.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.4 Procedures for...

  16. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  17. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  18. Making Our Buildings Safer: Security Management and Equipment Issues.

    ERIC Educational Resources Information Center

    Clark, James H.

    1997-01-01

    Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…

  19. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  20. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  1. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  2. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  3. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  4. Scheduling for anesthesia at geographic locations remote from the operating room.

    PubMed

    Dexter, Franklin; Wachtel, Ruth E

    2014-08-01

    Providing general anesthesia at locations away from the operating room, called remote locations, poses many medical and scheduling challenges. This review discusses how to schedule procedures at remote locations to maximize anesthesia productivity (see Video, Supplemental Digital Content 1). Anesthesia labour productivity can be maximized by assigning one or more 8-h or 10-h periods of allocated time every 2 weeks dedicated specifically to each remote specialty that has enough cases to fill those periods. Remote specialties can then schedule their cases themselves into their own allocated time. Periods of allocated time (called open, unblocked or first come first served time) can be used by remote locations that do not have their own allocated time. Unless cases are scheduled sequentially into allocated time, there will be substantial extra underutilized time (time during which procedures are not being performed and personnel sit idle even though staffing has been planned) and a concomitant reduction in percent productivity. Allocated time should be calculated on the basis of usage. Remote locations with sufficient hours of cases should be allocated time reserved especially for them in which to schedule their cases, with a maximum waiting time of 2 weeks, to achieve an average wait of 1 week.

  5. Online Remote Sensing Interface

    NASA Technical Reports Server (NTRS)

    Lawhead, Joel

    2007-01-01

    BasinTools Module 1 processes remotely sensed raster data, including multi- and hyper-spectral data products, via a Web site with no downloads and no plug-ins required. The interface provides standardized algorithms designed so that a user with little or no remote-sensing experience can use the site. This Web-based approach reduces the amount of software, hardware, and computing power necessary to perform the specified analyses. Access to imagery and derived products is enterprise-level and controlled. Because the user never takes possession of the imagery, the licensing of the data is greatly simplified. BasinTools takes the "just-in-time" inventory control model from commercial manufacturing and applies it to remotely-sensed data. Products are created and delivered on-the-fly with no human intervention, even for casual users. Well-defined procedures can be combined in different ways to extend verified and validated methods in order to derive new remote-sensing products, which improves efficiency in any well-defined geospatial domain. Remote-sensing products produced in BasinTools are self-documenting, allowing procedures to be independently verified or peer-reviewed. The software can be used enterprise-wide to conduct low-level remote sensing, viewing, sharing, and manipulating of image data without the need for desktop applications.

  6. Snowpack ground-truth manual

    NASA Technical Reports Server (NTRS)

    Jones, E. B.

    1983-01-01

    As remote sensing increasingly becomes more of an operational tool in the field of snow management and snow hydrology, there is need for some degree of standardization of ""snowpack ground truth'' techniques. This manual provides a first step in standardizing these procedures and was prepared to meet the needs of remote sensing researchers in planning missions requiring ground truth as well as those providing the ground truth. Focus is on ground truth for remote sensors primarily operating in the microwave portion of the electromagnetic spectrum; nevertheless, the manual should be of value to other types of sensor programs. This first edition of ground truth procedures must be updated as new or modified techniques are developed.

  7. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2013-10-01 2013-10-01 false Armed security officer requirements. 1562.29...

  9. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2014-10-01 2014-10-01 false Armed security officer requirements. 1562.29...

  10. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2012-10-01 2012-10-01 false Armed security officer requirements. 1562.29...

  11. 42 CFR 488.64 - Remote facility variances for utilization review requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Remote facility variances for utilization review... PROCEDURES Special Requirements § 488.64 Remote facility variances for utilization review requirements. (a... such facility or direct responsibility for the care of the patients being reviewed or, in the case of a...

  12. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  13. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  14. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  15. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  16. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  17. A procedure for automated land use mapping using remotely sensed multispectral scanner data

    NASA Technical Reports Server (NTRS)

    Whitley, S. L.

    1975-01-01

    A system of processing remotely sensed multispectral scanner data by computer programs to produce color-coded land use maps for large areas is described. The procedure is explained, the software and the hardware are described, and an analogous example of the procedure is presented. Detailed descriptions of the multispectral scanners currently in use are provided together with a summary of the background of current land use mapping techniques. The data analysis system used in the procedure and the pattern recognition software used are functionally described. Current efforts by the NASA Earth Resources Laboratory to evaluate operationally a less complex and less costly system are discussed in a separate section.

  18. Remote sensing and geographically based information systems

    NASA Technical Reports Server (NTRS)

    Cicone, R. C.

    1977-01-01

    A structure is proposed for a geographically-oriented computer-based information system applicable to the analysis of remote sensing digital data. The structure, intended to answer a wide variety of user needs, would permit multiple views of the data, provide independent management of data security, quality and integrity, and rely on automatic data filing. Problems in geographically-oriented data systems, including those related to line encoding and cell encoding, are considered.

  19. Radio frequency security system, method for a building facility or the like, and apparatus and methods for remotely monitoring the status of fire extinguishers

    DOEpatents

    Runyon, Larry [Richland, WA; Gunter, Wayne M [Richland, WA; Gilbert, Ronald W [Gilroy, CA

    2006-07-25

    A system for remotely monitoring the status of one or more fire extinguishers includes means for sensing at least one parameter of each of the fire extinguishers; means for selectively transmitting the sensed parameters along with information identifying the fire extinguishers from which the parameters were sensed; and means for receiving the sensed parameters and identifying information for the fire extinguisher or extinguishers at a common location. Other systems and methods for remotely monitoring the status of multiple fire extinguishers are also provided.

  20. Summary of 1971 water remote sensing investigations

    NASA Technical Reports Server (NTRS)

    Tilton, E. L., III

    1972-01-01

    The Earth Resources Laboratory sea remote sensing program has concentrated on project planning, data acquisition procedures, and data preparation techniques to establish a firm procedural basis for the program. Most of these procedural elements were established and proven during the three missions conducted in 1971. It is anticipated that the program in 1972 will see the analysis completed on the Mississippi Sound series and the first series of Eastern Gulf experiments allowing increased emphasis to be given to more intensive technique development studies, the interrelationship of parameters for the measurement and prediction of water circulation, and the demonstration of the application of these techniques.

  1. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  2. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  3. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  4. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  5. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  6. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  7. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  8. Shuttle remote manipulator system mission preparation and operations

    NASA Technical Reports Server (NTRS)

    Smith, Ernest E., Jr.

    1989-01-01

    The preflight planning, analysis, procedures development, and operations support for the Space Transportation System payload deployment and retrieval missions utilizing the Shuttle Remote Manipulator System are summarized. Analysis of the normal operational loads and failure induced loads and motion are factored into all procedures. Both the astronaut flight crews and the Mission Control Center flight control teams receive considerable training for standard and mission specific operations. The real time flight control team activities are described.

  9. Secure data aggregation in heterogeneous and disparate networks using stand off server architecture

    NASA Astrophysics Data System (ADS)

    Vimalathithan, S.; Sudarsan, S. D.; Seker, R.; Lenin, R. B.; Ramaswamy, S.

    2009-04-01

    The emerging global reach of technology presents myriad challenges and intricacies as Information Technology teams aim to provide anywhere, anytime and anyone access, for service providers and customers alike. The world is fraught with stifling inequalities, both from an economic as well as socio-political perspective. The net result has been large capability gaps between various organizational locations that need to work together, which has raised new challenges for information security teams. Similar issues arise, when mergers and acquisitions among and between organizations take place. While integrating remote business locations with mainstream operations, one or more of the issues including the lack of application level support, computational capabilities, communication limitations, and legal requirements cause a serious impediment thereby complicating integration while not violating the organizations' security requirements. Often resorted techniques like IPSec, tunneling, secure socket layer, etc. may not be always techno-economically feasible. This paper addresses such security issues by introducing an intermediate server between corporate central server and remote sites, called stand-off-server. We present techniques such as break-before-make connection, break connection after transfer, multiple virtual machine instances with different operating systems using the concept of a stand-off-server. Our experiments show that the proposed solution provides sufficient isolation for the central server/site from attacks arising out of weak communication and/or computing links and is simple to implement.

  10. Secure communication of static information by electronic means

    DOEpatents

    Gritton, Dale G.

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  11. Remote sensing utility in a disaster struck urban environment

    NASA Technical Reports Server (NTRS)

    Rush, M.; Holguin, A.; Vernon, S.

    1974-01-01

    A project to determine the ways in which remote sensing can contribute to solutions of urban public health problems in time of natural disaster is discussed. The objectives of the project are to determine and describe remote sensing standard operating procedures for public health assistance during disaster relief operations which will aid the agencies and organizations involved in disaster intervention. Proposed tests to determine the validity of the remote sensing system are reported.

  12. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    PubMed

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  13. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  14. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  15. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  18. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    PubMed

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into community governance structures with adequate resourcing is an imperative.

  19. Privacy and security compliance in the E-healthcare marketplace.

    PubMed

    Lutes, M

    2000-03-01

    Complying with security and privacy regulations proposed by HHS in response to the Health Insurance Portability and Accountability Act (HIPAA) will require healthcare managers to address both internal and external business interactions and initiatives. The proposed regulations mandate certain procedures regarding administration, physical safeguards, technical security for data integrity and confidentiality, and technical security against unauthorized access. In particular, the proposed regulations require organizations to contractually ensure that vendors adhere to the regulations. Healthcare organizations also must implement training procedures for staff members who have contact with protected health information and designate a privacy officer to guard against improper disclosure of such information. Documented policies for organizational decision making are vital to an organization's efforts to implement procedures for compliance with the regulations.

  20. Potential benefits of remote sensing: Theoretical framework and empirical estimate

    NASA Technical Reports Server (NTRS)

    Eisgruber, L. M.

    1972-01-01

    A theoretical framwork is outlined for estimating social returns from research and application of remote sensing. The approximate dollar magnitude is given of a particular application of remote sensing, namely estimates of corn production, soybeans, and wheat. Finally, some comments are made on the limitations of this procedure and on the implications of results.

  1. Identification of cognitive factors related to remote work performance using closed circuit TV displays

    NASA Technical Reports Server (NTRS)

    Clarke, M. M.; Garin, J.

    1981-01-01

    Operator perceptual cognitive styles as predictors of remote task performance were identified. Remote tasks which require the use of servo controlled master/slave manipulators and closed circuit television for teleoperator repair and maintenance of nuclear fuel recycling systems are examined. A useful procedure for identifying such perceptual styles is described.

  2. Remote observations with FLUOR and the CHARA Array

    NASA Astrophysics Data System (ADS)

    Merand, Antoine; Birlan, Mirel; Lelu de Brach, Remi; Coudé du Foresto, Vincent

    2004-10-01

    Two years ago, the FLUOR interferometric beam combiner moved from IOTA (Infrared Optical Telescopes Array, Mount Hopkins, AZ) to the Center for High Angular Resolution Astronomy (CHARA) Array (Mount Wilson, CA). Apart from offering the largest baselines in the northern hemisphere, this array can be fully operated remotely to allow observations from a distant place. We present here the automations added to the FLUOR hardware, as well as software modifications made in order to allow us to observe from Paris Observatory. We required the remote service to be as reactive as local observations, implying frequent communications between the instrument and the remote observer. We took particular attention to the available bandwidth and reactivity imposed by the secured connection (Virtual Private Network). The first tests are presented.

  3. 40 CFR 11.5 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Procedures. 11.5 Section 11.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS...” shall be directed to: Director, Security and Inspection Division, Environmental Protection Agency...

  4. 48 CFR 3009.570-3 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Procedures. 3009.570-3 Section 3009.570-3 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Organizational and...

  5. FRR: fair remote retrieval of outsourced private medical records in electronic health networks.

    PubMed

    Wang, Huaqun; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep

    2014-08-01

    Cloud computing is emerging as the next-generation IT architecture. However, cloud computing also raises security and privacy concerns since the users have no physical control over the outsourced data. This paper focuses on fairly retrieving encrypted private medical records outsourced to remote untrusted cloud servers in the case of medical accidents and disputes. Our goal is to enable an independent committee to fairly recover the original private medical records so that medical investigation can be carried out in a convincing way. We achieve this goal with a fair remote retrieval (FRR) model in which either t investigation committee members cooperatively retrieve the original medical data or none of them can get any information on the medical records. We realize the first FRR scheme by exploiting fair multi-member key exchange and homomorphic privately verifiable tags. Based on the standard computational Diffie-Hellman (CDH) assumption, our scheme is provably secure in the random oracle model (ROM). A detailed performance analysis and experimental results show that our scheme is efficient in terms of communication and computation. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Security Implications of OPC, OLE, DCOM, and RPC in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2006-01-01

    OPC is a collection of software programming standards and interfaces used in the process control industry. It is intended to provide open connectivity and vendor equipment interoperability. The use of OPC technology simplifies the development of control systems that integrate components from multiple vendors and support multiple control protocols. OPC-compliant products are available from most control system vendors, and are widely used in the process control industry. OPC was originally known as OLE for Process Control; the first standards for OPC were based on underlying services in the Microsoft Windows computing environment. These underlying services (OLE [Object Linking and Embedding],more » DCOM [Distributed Component Object Model], and RPC [Remote Procedure Call]) have been the source of many severe security vulnerabilities. It is not feasible to automatically apply vendor patches and service packs to mitigate these vulnerabilities in a control systems environment. Control systems using the original OPC data access technology can thus inherit the vulnerabilities associated with these services. Current OPC standardization efforts are moving away from the original focus on Microsoft protocols, with a distinct trend toward web-based protocols that are independent of any particular operating system. However, the installed base of OPC equipment consists mainly of legacy implementations of the OLE for Process Control protocols.« less

  7. 49 CFR 1510.5 - Imposition of security service fees.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Imposition of security service fees. 1510.5... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE FEES § 1510.5 Imposition of security service fees. (a) Each direct air...

  8. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  9. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  10. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  11. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  12. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  13. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  14. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  15. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  16. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  17. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  18. 49 CFR 179.3 - Procedure for securing approval.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Executive Director—Tank Car Safety, AAR, for consideration by its Tank Car Committee and other appropriate... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS SPECIFICATIONS FOR TANK CARS Introduction, Approvals and Reports § 179.3 Procedure for securing approval. (a) Application...

  19. A Proactive Approach to Building Security.

    ERIC Educational Resources Information Center

    Winters, Sharon

    1994-01-01

    Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…

  20. 17 CFR 8.08 - Disciplinary committee.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Disciplinary committee. 8.08 Section 8.08 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.08 Disciplinary...

  1. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  2. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  3. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests...

  4. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  5. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  6. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  7. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  8. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  9. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  10. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  11. The Cooking and Pneumonia Study (CAPS) in Malawi: Implementation of Remote Source Data Verification

    PubMed Central

    Weston, William; Smedley, James; Bennett, Andrew; Mortimer, Kevin

    2016-01-01

    Background Source data verification (SDV) is a data monitoring procedure which compares the original records with the Case Report Form (CRF). Traditionally, on-site SDV relies on monitors making multiples visits to study sites requiring extensive resources. The Cooking And Pneumonia Study (CAPS) is a 24- month village-level cluster randomized controlled trial assessing the effectiveness of an advanced cook-stove intervention in preventing pneumonia in children under five in rural Malawi (www.capstudy.org). CAPS used smartphones to capture digital images of the original records on an electronic CRF (eCRF). In the present study, descriptive statistics are used to report the experience of electronic data capture with remote SDV in a challenging research setting in rural Malawi. Methods At three monthly intervals, fieldworkers, who were employed by CAPS, captured pneumonia data from the original records onto the eCRF. Fieldworkers also captured digital images of the original records. Once Internet connectivity was available, the data captured on the eCRF and the digital images of the original records were uploaded to a web-based SDV application. This enabled SDV to be conducted remotely from the UK. We conducted SDV of the pneumonia data (occurrence, severity, and clinical indicators) recorded in the eCRF with the data in the digital images of the original records. Result 664 episodes of pneumonia were recorded after 6 months of follow-up. Of these 664 episodes, 611 (92%) had a finding of pneumonia in the original records. All digital images of the original records were clear and legible. Conclusion Electronic data capture using eCRFs on mobile technology is feasible in rural Malawi. Capturing digital images of the original records in the field allows remote SDV to be conducted efficiently and securely without requiring additional field visits. We recommend these approaches in similar settings, especially those with health endpoints. PMID:27355447

  12. The Cooking and Pneumonia Study (CAPS) in Malawi: Implementation of Remote Source Data Verification.

    PubMed

    Weston, William; Smedley, James; Bennett, Andrew; Mortimer, Kevin

    2016-01-01

    Source data verification (SDV) is a data monitoring procedure which compares the original records with the Case Report Form (CRF). Traditionally, on-site SDV relies on monitors making multiples visits to study sites requiring extensive resources. The Cooking And Pneumonia Study (CAPS) is a 24- month village-level cluster randomized controlled trial assessing the effectiveness of an advanced cook-stove intervention in preventing pneumonia in children under five in rural Malawi (www.capstudy.org). CAPS used smartphones to capture digital images of the original records on an electronic CRF (eCRF). In the present study, descriptive statistics are used to report the experience of electronic data capture with remote SDV in a challenging research setting in rural Malawi. At three monthly intervals, fieldworkers, who were employed by CAPS, captured pneumonia data from the original records onto the eCRF. Fieldworkers also captured digital images of the original records. Once Internet connectivity was available, the data captured on the eCRF and the digital images of the original records were uploaded to a web-based SDV application. This enabled SDV to be conducted remotely from the UK. We conducted SDV of the pneumonia data (occurrence, severity, and clinical indicators) recorded in the eCRF with the data in the digital images of the original records. 664 episodes of pneumonia were recorded after 6 months of follow-up. Of these 664 episodes, 611 (92%) had a finding of pneumonia in the original records. All digital images of the original records were clear and legible. Electronic data capture using eCRFs on mobile technology is feasible in rural Malawi. Capturing digital images of the original records in the field allows remote SDV to be conducted efficiently and securely without requiring additional field visits. We recommend these approaches in similar settings, especially those with health endpoints.

  13. Use of remote sensing techniques for inventorying and planning utilization of land resources in South Dakota

    NASA Technical Reports Server (NTRS)

    Myers, V. I.; Frazee, C. J.; Rusche, A. E.; Moore, D. G.; Nelson, G. D.; Westin, F. C.

    1974-01-01

    The basic procedures for interpreting remote sensing imagery to rapidly develop general soils and land use inventories were developed and utilized in Pennington County, South Dakota. These procedures and remote sensing data products were illustrated and explained to many user groups, some of whom are interested in obtaining similar data. The general soils data were integrated with land soils data supplied by the county director of equalization to prepare a land value map. A computer print-out of this map indicating a land value for each quarter section is being used in tax reappraisal of Pennington County. The land use data provided the land use planners with the present use of land in Pennington County. Additional uses of remote sensing applications are also discussed including tornado damage assessment, hail damage evaluation, and presentation of soil and land value information on base maps assembled from ERTS-1 imagery.

  14. Remote hearing aid fitting: Tele-audiology in the context of Brazilian Public Policy

    PubMed Central

    Penteado, Silvio Pires; Ramos, Sueli de Lima; Battistella, Linamara Rizzo; Marone, Silvio Antonio Monteiro; Bento, Ricardo Ferreira

    2012-01-01

    Summary Introduction: Currently, the Brazilian government has certificated nearly 140 specialized centers in hearing aid fittings through the Brazilian National Health System (SUS). Remote fitting through the Internet can allow a broader and more efficient coverage with a higher likelihood of success for patients covered by the SUS, as they can receive fittings from their own homes instead of going to the few and distant specialized centers. Aim: To describe a case of remote fitting between 2 cities, with revision of the literature. Method: Computer gears, a universal interface, and hearing aids were used. Case study: An audiologist located in a specialized center introduced a new hearing aid and its fitting procedure to a remote center (200 km away). The specialized center helped the remote center in fitting a hearing aid in 2 patients, and performed fitting in one of its own patients. The whole process was done through the Internet with audio and video in real time. Results: Three patients were fitted remotely. Three audiologists were remotely trained on how to fit the hearing aids. Conclusions: Remote fitting of hearing aids is possible through the Internet, as well as further supplying technical training to a remote center about the fitting procedures. Such a technological approach can help the government advance public policies on hearing rehabilitation, as patients can be motivated about maintaining their use of hearing aids with the option to ask for help in the comfort of their own homes. PMID:25991960

  15. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  16. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  17. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  18. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  19. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  20. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  1. The Sophia-Antipolis Conference: General presentation and basic documents. [remote sensing for agriculture, forestry, water resources, and environment management in France

    NASA Technical Reports Server (NTRS)

    1980-01-01

    The procedures and techniques used in NASA's aerospace technology transfer program are reviewed for consideration in establishing priorities and bases for joint action by technicians and users of remotely sensed data in France. Particular emphasis is given to remote sensing in agriculture, forestry, water resources, environment management, and urban research.

  2. Implementation of space satellite remote sensing programs in developing countries (Ecuador)

    NASA Technical Reports Server (NTRS)

    Segovia, A.

    1982-01-01

    The current state of space satellite remote sensing programs in developing countries is discussed. Sensors being utilized and results obtained are described. Requirements are presented for the research of resources in developing countries. It is recommended that a work procedure be developed for the use of satellite remote sensing data tailored to the necessities of the different countries.

  3. Remote-sensing applications as utilized in Florida's coastal zone management program

    NASA Technical Reports Server (NTRS)

    Worley, D. R.

    1975-01-01

    Land use maps were developed from photomaps obtained by remote sensing in order to develop a comprehensive state plan for the protection, development, and zoning of coastal regions. Only photographic remote sensors have been used in support of the coastal council's planning/management methodology. Standard photointerpretation and cartographic application procedures for map compilation were used in preparing base maps.

  4. 77 FR 22365 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-13

    ... either Streaming Quote Traders (``SQTs'') \\4\\, Remote Streaming Quote Traders (``RSQTs'') \\5\\ or non...\\ Prior to the amendment Commentary .01 required that in order for an ROT (other than an RSQT or a Remote... Commentary .13, Options Floor Procedure Advice B- 3 currently requires an ROT (other than an RSQT or a Remote...

  5. Remote Operations of Laser Guide Star Systems: Gemini Observatory.

    NASA Astrophysics Data System (ADS)

    Oram, Richard J.; Fesquet, Vincent; Wyman, Robert; D'Orgeville, Celine

    2011-03-01

    The Gemini North telescope, equipped with a 14W laser, has been providing Laser Guide Star Adaptive Optics (LGS AO) regular science queue observations for worldwide astronomers since February 2007. The new 55W laser system for MCAO was installed on the Gemini South telescope in May 2010. In this paper, we comment on how Gemini Observatory developed regular remote operation of the Laser Guide Star Facility and high-power solid-state laser as routine normal operations. Fully remote operation of the LGSF from the Hilo base facility HBF was initially trialed and then optimized and became the standard operating procedure (SOP) for LGS operation in December 2008. From an engineering perspective remote operation demands stable, well characterized and base-lined equipment sets. In the effort to produce consistent, stable and controlled laser parameters (power, wavelength and beam quality) we completed a failure mode effect analysis of the laser system and sub systems that initiated a campaign of hardware upgrades and procedural improvements to the routine maintenance operations. Finally, we provide an overview of normal operation procedures during LGS runs and present a snapshot of data accumulated over several years that describes the overall LGS AO observing efficiency at the Gemini North telescope.

  6. 15 CFR 701.4 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...

  7. 50 CFR 540.3 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... and Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.3 Procedures. (a) Mandatory... all requests for national security information in its custody to the Federal agency that classified it...-existence of a document requested under the Freedom of Information Act or the mandatory review provisions of...

  8. 50 CFR 540.3 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.3 Procedures. (a) Mandatory... all requests for national security information in its custody to the Federal agency that classified it...-existence of a document requested under the Freedom of Information Act or the mandatory review provisions of...

  9. 76 FR 61563 - Voluntary Surrender of Certificate of Registration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-05

    ... 21 CFR Part 1301 Administrative practice and procedure, Drug traffic control, Security measures. 21 CFR Part 1309 Administrative practice and procedure, Drug traffic control, Exports, Imports, Security... DEPARTMENT OF JUSTICE Drug Enforcement Administration 21 CFR Parts 1301 and 1309 [Docket No. DEA...

  10. 15 CFR 701.4 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...

  11. 15 CFR 701.4 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...

  12. 15 CFR 701.4 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS REPORTING OF OFFSETS AGREEMENTS IN SALES OF WEAPON SYSTEMS OR DEFENSE-RELATED ITEMS TO FOREIGN COUNTRIES OR FOREIGN FIRMS § 701.4 Procedures. (a) Reporting period. The Department of Commerce publishes a notice in the...

  13. 17 CFR 8.20 - Final decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision. 8.20 Section 8.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.20 Final decision. Each...

  14. 49 CFR 1503.205 - Records, documents, and reports.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Records, documents, and reports. 1503.205 Section 1503.205 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Investigative...

  15. Provision of healthcare in a remote base of operations in southern Chad.

    PubMed

    Hickey, J P

    2010-09-01

    The Irish Defence Forces maintained a presence in south eastern Chad under the authority of the United Nations Security Council from January 2008 until May 2010, operating in a peace support role as the lead contingent in a multinational battalion. In September 2009 the task of establishing a forward operating base in a remote location within the area of operations was ordered by mission headquarters. Irish and Finnish troops duly deployed and began the task of establishing a safe and secure base from which to operate. This involved securing the location, installing accommodation, electricity, lighting and facilities for ablutions, removing natural hazards, establishing secure communications and ensuring rapid access and egress in the event of hostile contact or emergency. The incidence of disease at this location was low, with the notable exception of a limited outbreak of gastroenteritis. The high standard of engineering work carried out around the camp, especially the latrines, washing facilities and other hygiene measures, significantly contributed to minimising the transmission of infectious disease. The past experiences of the Defence Forces in Congo, Lebanon, East Timor, Eritrea and Liberia have led to a high standard of forward planning and logistical awareness within the organisation which served personnel well in this latest mission. Copyright © 2010 Elsevier Ltd. All rights reserved.

  16. What are the determinants of food security among regional and remote Western Australian children?

    PubMed

    Godrich, Stephanie L; Davies, Christina R; Darby, Jill; Devine, Amanda

    2017-01-22

    To explore how determinants of food security affect children in regional and remote Western Australia (WA), across food availability, access and utilisation dimensions. The Determinants of Food Security framework guided the thematic analysis (using NVivo 10) of semi-structured interviews with 20 key informants. Food availability factors included availability, price, promotion, quality, location of outlets and variety. Food access factors included social support, financial resources, transport to food outlets, distance to food outlets and mobility. Food utilisation factors included nutrition knowledge and skills, children's food preferences, storage facilities, preparation and cooking facilities and time to purchase food. Key food availability recommendations include increasing local food supply options. Food access recommendations include ensuring equitable formal social support and empowering informal support options. Food utilisation recommendations include prioritising food literacy programs focusing on quick, healthy food preparation and budgeting skills. Implications for public health: Policymakers should invest in local food supply options, equitable social support services and experiential food literacy programs. Practitioners should focus child/parent programs on improving attitude, knowledge and skills. © 2017 Public Health Association of Australia.

  17. Secure telemonitoring system for delivering telerehabilitation therapy to enhance children's communication function to home.

    PubMed

    Parmanto, Bambang; Saptono, Andi; Murthi, Raymond; Safos, Charlotte; Lathan, Corinna E

    2008-11-01

    A secure telemonitoring system was developed to transform CosmoBot system, a stand-alone speech-language therapy software, into a telerehabilitation system. The CosmoBot system is a motivating, computer-based play character designed to enhance children's communication skills and stimulate verbal interaction during the remediation of speech and language disorders. The CosmoBot system consists of the Mission Control human interface device and Cosmo's Play and Learn software featuring a robot character named Cosmo that targets educational goals for children aged 3-5 years. The secure telemonitoring infrastructure links a distant speech-language therapist and child/parents at home or school settings. The result is a telerehabilitation system that allows a speech-language therapist to monitor children's activities at home while providing feedback and therapy materials remotely. We have developed the means for telerehabilitation of communication skills that can be implemented in children's home settings. The architecture allows the therapist to remotely monitor the children after completion of the therapy session and to provide feedback for the following session.

  18. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  19. The feasibility of remote-controlled assistance as a search tool for patient education.

    PubMed

    Lin, I K; Bray, B E; Smith, J A; Lange, L L

    2001-01-01

    Patients often desire more information about their conditions than they receive during a physician office visit. To address the patient's information needs, a touchscreen information kiosk was implemented. Results from the first prototype identified interface, security, and technical issues. Misspelling of search terms was identified as the most observable cause of search failure. An experimental remote control assistance feature was added in the second prototype. The feature allowed a medical librarian to provide real-time remote help during searches by taking control of the patient's computer. Remote assistance improved patient satisfaction, increased ease of use, and raised document retrieval rate (86.7% vs. 56.7%). Both patients and librarians found the application useful. Reasons included its convenience and flexibility, opportunity for direct patient contact, ability to teach through direct demonstration, and complementing the librarian's role as an information gateway. The project demonstrated the feasibility of applying remote control technology to patient education.

  20. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  1. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  2. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  3. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  4. 17 CFR 300.503 - Voidable securities transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to... right of the Securities Investor Protection Corporation, in a direct payment procedure under section 10... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Voidable securities...

  5. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  6. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  7. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  8. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s or business associate's workforce in relation to the protection of that information...

  9. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  10. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  11. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  12. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s or business associate's workforce in relation to the protection of that information...

  13. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain...

  14. STS-100 Onboard Photograph-International Space Station Remote Manipulator System

    NASA Technical Reports Server (NTRS)

    2001-01-01

    This is a Space Shuttle STS-100 mission onboard photograph. Astronaut Scott Parazynski totes a Direct Current Switching Unit while anchored on the end of the Canadian-built Remote Manipulator System (RMS) robotic arm. The RMS is in the process of moving Parazynski to the exterior of the Destiny laboratory (right foreground), where he will secure the spare unit, a critical part of the station's electrical system, to the stowage platform in case future crews will need it. Also in the photograph are the Italian-built Raffaello multipurpose Logistics Module (center) and the new Canadarm2 (lower right) or Space Station Remote Manipulator System.

  15. Fault-tolerant Remote Quantum Entanglement Establishment for Secure Quantum Communications

    NASA Astrophysics Data System (ADS)

    Tsai, Chia-Wei; Lin, Jason

    2016-07-01

    This work presents a strategy for constructing long-distance quantum communications among a number of remote users through collective-noise channel. With the assistance of semi-honest quantum certificate authorities (QCAs), the remote users can share a secret key through fault-tolerant entanglement swapping. The proposed protocol is feasible for large-scale distributed quantum networks with numerous users. Each pair of communicating parties only needs to establish the quantum channels and the classical authenticated channels with his/her local QCA. Thus, it enables any user to communicate freely without point-to-point pre-establishing any communication channels, which is efficient and feasible for practical environments.

  16. Proceedings of the National Conference on Energy Resource Management. Volume 1: Techniques, Procedures and Data Bases

    NASA Technical Reports Server (NTRS)

    Brumfield, J. O. (Editor); Schiffman, Y. M. (Editor)

    1982-01-01

    Topics dealing with the integration of remotely sensed data with geographic information system for application in energy resources management are discussed. Associated remote sensing and image analysis techniques are also addressed.

  17. Remote sensing applications of wildland fire and air quality in China

    Treesearch

    John J. Qu; Xianjun Hao; Yongqiang Liu; Allen R. Riebau; Haoruo Yi; Xianlin Qin

    2009-01-01

    As one of the most populous and geographically largest countries, China faces many problems including industrial growth, economic sustainability, food security, climate change, and air pollution. Interwoven with these challenges,...

  18. Safety and security in acute admission psychiatric wards in Ireland and London: a comparative study.

    PubMed

    Cowman, Seamus; Bowers, Len

    2009-05-01

    The comparative element of this study is to describe safety and security measures in psychiatric acute admission wards in the Republic of Ireland and London; to describe differences and similarities in terms of safety and security patterns in the Republic of Ireland and London; and to make recommendations on safety and security to mental health services management and psychiatric nurses. Violence is a serious problem in psychiatric services and staff experience significant psychological reactions to being assaulted. Health and Safety Authorities in the UK and Ireland have expressed concern about violence and assault in healthcare, however, there remains a lack of clarity on matters of procedure and policy pertaining to safety and security in psychiatric hospitals. A descriptive survey research design was employed. Questionnaires were circulated to all acute wards in London and in Ireland and the resulting data compared. A total of 124 psychiatric wards from London and 43 wards from Ireland were included in this study and response rates of 70% (London) and 86% (Ireland) were obtained. Differences and similarities in safety and security practices were identified between London and Ireland, with Irish wards having generally higher and more intensive levels of security. There is a lack of coherent policy and procedure in safety and security measures across psychiatric acute admission wards in the Republic of Ireland and London. Given the trends in European Union (EU) regulation, there is a strong argument for the publication of acceptable minimum guidelines for safety and security in mental health services across the EU. There must be a concerted effort to ensure that all policy and procedure in safety and security is founded on evidence and best practice. Mental health managers must establish a review of work safety and security procedures and practices. Risk assessment and environmental audits of all mental health clinical environments should be mandatory.

  19. 33 CFR 26.08 - Exemption procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Exemption procedures. 26.08 Section 26.08 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL VESSEL... redelegated to the Assistant Commandant for Marine Safety, Security and Environmental Protection, U.S. Coast...

  20. 33 CFR 26.08 - Exemption procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Exemption procedures. 26.08 Section 26.08 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL VESSEL... redelegated to the Assistant Commandant for Marine Safety, Security and Environmental Protection, U.S. Coast...

Top