Sample records for security archive electronic

  1. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  2. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  3. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  4. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  5. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  6. Electronic signatures for long-lasting storage purposes in electronic archives.

    PubMed

    Pharow, Peter; Blobel, Bernd

    2005-03-01

    Communication and co-operation in healthcare and welfare require a certain set of trusted third party (TTP) services describing both status and relation of communicating principals as well as their corresponding keys and attributes. Additional TTP services are needed to provide trustworthy information about dynamic issues of communication and co-operation such as time and location of processes, workflow relations, and system behaviour. Legal and ethical requirements demand securely stored patient information and well-defined access rights. Among others, electronic signatures based on asymmetric cryptography are important means for securing the integrity of a message or file as well as for accountability purposes including non-repudiation of both origin and receipt. Electronic signatures along with certified time stamps or time signatures are especially important for electronic archives in general, electronic health records (EHR) in particular, and especially for typical purposes of long-lasting storage. Apart from technical storage problems (e.g. lifetime of the storage devices, interoperability of retrieval and presentation software), this paper identifies mechanisms of e.g. re-signing and re-stamping of data items, files, messages, sets of archived items or documents, archive structures, and even whole archives.

  7. Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving

    NASA Astrophysics Data System (ADS)

    Porekar, Jan; Klobučar, Tomaž; Šaljič, Svetlana; Gabrijelčič, Dušan

    We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future.

  8. Electronic patient record and archive of records in Cardio.net system for telecardiology.

    PubMed

    Sierdziński, Janusz; Karpiński, Grzegorz

    2003-01-01

    In modern medicine the well structured patient data set, fast access to it and reporting capability become an important question. With the dynamic development of information technology (IT) such question is solved via building electronic patient record (EPR) archives. We then obtain fast access to patient data, diagnostic and treatment protocols etc. It results in more efficient, better and cheaper treatment. The aim of the work was to design a uniform Electronic Patient Record, implemented in cardio.net system for telecardiology allowing the co-operation among regional hospitals and reference centers. It includes questionnaires for demographic data and questionnaires supporting doctor's work (initial diagnosis, final diagnosis, history and physical, ECG at the discharge, applied treatment, additional tests, drugs, daily and periodical reports). The browser is implemented in EPR archive to facilitate data retrieval. Several tools for creating EPR and EPR archive were used such as: XML, PHP, Java Script and MySQL. The separate question is the security of data on WWW server. The security is ensured via Security Socket Layer (SSL) protocols and other tools. EPR in Cardio.net system is a module enabling the co-work of many physicians and the communication among different medical centers.

  9. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  10. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  11. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  12. Picture archiving and communication in radiology.

    PubMed

    Napoli, Marzia; Nanni, Marinella; Cimarra, Stefania; Crisafulli, Letizia; Campioni, Paolo; Marano, Pasquale

    2003-01-01

    After over 80 years of exclusive archiving of radiologic films, at present, in Radiology, digital archiving is increasingly gaining ground. Digital archiving allows a considerable reduction in costs and space saving, but most importantly, immediate or remote consultation of all examinations and reports in the hospital clinical wards, is feasible. The RIS system, in this case, is the starting point of the process of electronic archiving which however is the task of PACS. The latter can be used as radiologic archive in accordance with the law provided that it is in conformance with some specifications as the use of optical long-term storage media or with electronic track of change. PACS archives, in a hierarchical system, all digital images produced by each diagnostic imaging modality. Images and patient data can be retrieved and used for consultation or remote consultation by the reporting radiologist who requires images and reports of previous radiologic examinations or by the referring physician of the ward. Modern PACS owing to the WEB server allow remote access to extremely simplified images and data however ensuring the due regulations and access protections. Since the PACS enables a simpler data communication within the hospital, security and patient privacy should be protected. A secure and reliable PACS should be able to minimize the risk of accidental data destruction, and should prevent non authorized access to the archive with adequate security measures in relation to the acquired knowledge and based on the technological advances. Archiving of data produced by modern digital imaging is a problem now present also in small Radiology services. The technology is able to readily solve problems which were extremely complex up to some years ago as the connection between equipment and archiving system owing also to the universalization of the DICOM 3.0 standard. The evolution of communication networks and the use of standard protocols as TCP/IP can minimize problems of data and image remote transmission within the healthcare enterprise as well as over the territory. However, new problems are appearing as that of digital data security profiles and of the different systems which should ensure it. Among these, algorithms of electronic signature should be mentioned. In Italy they are validated by law and therefore can be used in digital archives in accordance with the law.

  13. The Final Barrier: Security Consideration in Restricted Access Reading Rooms.

    ERIC Educational Resources Information Center

    Strassberg, Richard

    1997-01-01

    Examines an effective response to library or archive theft and vandalism of valuable materials: the restricted access reading room. Discusses the need for an alert staff, user identification, restriction of carry-in items, electronic surveillance, record keeping, limits to quantities of collection materials, exiting procedure, photocopying, theft…

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guyer, H.B.; McChesney, C.A.

    The overall primary Objective of HDAR is to create a repository of historical personnel security documents and provide the functionality needed for archival and retrieval use by other software modules and application users of the DISS/ET system. The software product to be produced from this specification is the Historical Document Archival and Retrieval Subsystem The product will provide the functionality to capture, retrieve and manage documents currently contained in the personnel security folders in DOE Operations Offices vaults at various locations across the United States. The long-term plan for DISS/ET includes the requirement to allow for capture and storage ofmore » arbitrary, currently undefined, clearance-related documents that fall outside the scope of the ``cradle-to-grave`` electronic processing provided by DISS/ET. However, this requirement is not within the scope of the requirements specified in this document.« less

  15. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  16. Security Considerations for Archives: Rare Book, Manuscript, and Other Special Collections.

    ERIC Educational Resources Information Center

    Cupp, Christian M.

    The first of six sections in this guide to security for special collections in archives and libraries discusses the importance of security and the difficulty of preventing theft of archival materials. The second section, which focuses on planning, recommends an inservice training program for staff, a planned communications network between library…

  17. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  18. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  19. Information Assurance Tasks Supporting the Processing of Electronic Records Archives

    DTIC Science & Technology

    2007-03-01

    3 Table 2. OpenVPN evaluation results...........................................................................................10 iv 1...operation of necessary security features and compare the network performance under OpenVPN (openvpn.net) operation with the network performance under no...VPN operation (non-VPN) in a gigabit network environment. The reason for selecting OpenVPN product was based on the previous findings of Khanvilkar

  20. Archives of Transformation: A Case Study of the International Women's Network against Militarism's Archival System

    ERIC Educational Resources Information Center

    Cachola, Ellen-Rae Cabebe

    2014-01-01

    This dissertation describes the International Women's Network Against Militarism's (IWNAM) political epistemology of security from an archival perspective, and how they create community archives to evidence this epistemology. This research examines records created by Women for Genuine Security (WGS) and Women's Voices Women Speak (WVWS), U.S. and…

  1. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    ERIC Educational Resources Information Center

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  2. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...

  3. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...

  4. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records....m. to 12:00 noon. ADDRESSES: National Archives and Records Administration, 700 Pennsylvania Avenue...

  5. The electronic Rothamsted Archive (e-RA), an online resource for data from the Rothamsted long-term experiments.

    PubMed

    Perryman, Sarah A M; Castells-Brooke, Nathalie I D; Glendining, Margaret J; Goulding, Keith W T; Hawkesford, Malcolm J; Macdonald, Andy J; Ostler, Richard J; Poulton, Paul R; Rawlings, Christopher J; Scott, Tony; Verrier, Paul J

    2018-05-15

    The electronic Rothamsted Archive, e-RA (www.era.rothamsted.ac.uk) provides a permanent managed database to both securely store and disseminate data from Rothamsted Research's long-term field experiments (since 1843) and meteorological stations (since 1853). Both historical and contemporary data are made available via this online database which provides the scientific community with access to a unique continuous record of agricultural experiments and weather measured since the mid-19 th century. Qualitative information, such as treatment and management practices, plans and soil information, accompanies the data and are made available on the e-RA website. e-RA was released externally to the wider scientific community in 2013 and this paper describes its development, content, curation and the access process for data users. Case studies illustrate the diverse applications of the data, including its original intended purposes and recent unforeseen applications. Usage monitoring demonstrates the data are of increasing interest. Future developments, including adopting FAIR data principles, are proposed as the resource is increasingly recognised as a unique archive of data relevant to sustainable agriculture, agroecology and the environment.

  6. An open, interoperable, and scalable prehospital information technology network architecture.

    PubMed

    Landman, Adam B; Rokos, Ivan C; Burns, Kevin; Van Gelder, Carin M; Fisher, Roger M; Dunford, James V; Cone, David C; Bogucki, Sandy

    2011-01-01

    Some of the most intractable challenges in prehospital medicine include response time optimization, inefficiencies at the emergency medical services (EMS)-emergency department (ED) interface, and the ability to correlate field interventions with patient outcomes. Information technology (IT) can address these and other concerns by ensuring that system and patient information is received when and where it is needed, is fully integrated with prior and subsequent patient information, and is securely archived. Some EMS agencies have begun adopting information technologies, such as wireless transmission of 12-lead electrocardiograms, but few agencies have developed a comprehensive plan for management of their prehospital information and integration with other electronic medical records. This perspective article highlights the challenges and limitations of integrating IT elements without a strategic plan, and proposes an open, interoperable, and scalable prehospital information technology (PHIT) architecture. The two core components of this PHIT architecture are 1) routers with broadband network connectivity to share data between ambulance devices and EMS system information services and 2) an electronic patient care report to organize and archive all electronic prehospital data. To successfully implement this comprehensive PHIT architecture, data and technology requirements must be based on best available evidence, and the system must adhere to health data standards as well as privacy and security regulations. Recent federal legislation prioritizing health information technology may position federal agencies to help design and fund PHIT architectures.

  7. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION 36 CFR Part 1260 [FDMS NARA-11-0001] RIN 3095-AB64 Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule...

  8. Managing an Archive of Images

    NASA Technical Reports Server (NTRS)

    Andres, Vince; Walter, David; Hallal, Charles; Jones, Helene; Callac, Chris

    2004-01-01

    The SSC Multimedia Archive is an automated electronic system to manage images, acquired both by film and digital cameras, for the Public Affairs Office (PAO) at Stennis Space Center (SSC). Previously, the image archive was based on film photography and utilized a manual system that, by today s standards, had become inefficient and expensive. Now, the SSC Multimedia Archive, based on a server at SSC, contains both catalogs and images for pictures taken both digitally and with a traditional, film-based camera, along with metadata about each image. After a "shoot," a photographer downloads the images into the database. Members of the PAO can use a Web-based application to search, view and retrieve images, approve images for publication, and view and edit metadata associated with the images. Approved images are archived and cross-referenced with appropriate descriptions and information. Security is provided by allowing administrators to explicitly grant access privileges to personnel to only access components of the system that they need to (i.e., allow only photographers to upload images, only PAO designated employees may approve images).

  9. 75 FR 51854 - Privacy Act of 1974: Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... schedules of the United States Securities and Exchange Commission and as approved by the National Archives... of Trading and Markets, U.S. Securities and Exchange Commission, 100 F Street, NE., Washington, DC... schedules of the United States Securities and Exchange Commission and as approved by the National Archives...

  10. Security and Privacy in a DACS.

    PubMed

    Delgado, Jaime; Llorente, Silvia; Pàmies, Martí; Vilalta, Josep

    2016-01-01

    The management of electronic health records (EHR), in general, and clinical documents, in particular, is becoming a key issue in the daily work of Healthcare Organizations (HO). The need for providing secure and private access to, and storage for, clinical documents together with the need for HO to interoperate, raises a number of issues difficult to solve. Many systems are in place to manage EHR and documents. Some of these Healthcare Information Systems (HIS) follow standards in their document structure and communications protocols, but many do not. In fact, they are mostly proprietary and do not interoperate. Our proposal to solve the current situation is the use of a DACS (Document Archiving and Communication System) for providing security, privacy and standardized access to clinical documents.

  11. 76 FR 19147 - Advisory Committee on the Electronic Records Archives (ACERA)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Advisory Committee on the Electronic Records Archives... Electronic Records Archives (ACERA). The meeting has been consolidated into one day. This meeting will be... number of individuals planning to attend must be submitted to the Electronic Records Archives Program at...

  12. The electronic Rothamsted Archive (e-RA), an online resource for data from the Rothamsted long-term experiments

    PubMed Central

    Perryman, Sarah A. M.; Castells-Brooke, Nathalie I. D.; Glendining, Margaret J.; Goulding, Keith W. T.; Hawkesford, Malcolm J.; Macdonald, Andy J.; Ostler, Richard J.; Poulton, Paul R.; Rawlings, Christopher J.; Scott, Tony; Verrier, Paul J.

    2018-01-01

    The electronic Rothamsted Archive, e-RA (www.era.rothamsted.ac.uk) provides a permanent managed database to both securely store and disseminate data from Rothamsted Research’s long-term field experiments (since 1843) and meteorological stations (since 1853). Both historical and contemporary data are made available via this online database which provides the scientific community with access to a unique continuous record of agricultural experiments and weather measured since the mid-19th century. Qualitative information, such as treatment and management practices, plans and soil information, accompanies the data and are made available on the e-RA website. e-RA was released externally to the wider scientific community in 2013 and this paper describes its development, content, curation and the access process for data users. Case studies illustrate the diverse applications of the data, including its original intended purposes and recent unforeseen applications. Usage monitoring demonstrates the data are of increasing interest. Future developments, including adopting FAIR data principles, are proposed as the resource is increasingly recognised as a unique archive of data relevant to sustainable agriculture, agroecology and the environment. PMID:29762552

  13. 32 CFR 2001.34 - Referrals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... actions and decisions in a manner that facilitates archival processing for public access. Central agency... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.34...

  14. 76 FR 52991 - Renewal of Advisory Committee on Electronic Records Archives

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-24

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Renewal of Advisory Committee on Electronic Records... Records Administration's (NARA) Advisory Committee on Electronic Records Archives. In accordance with... Committee on Electronic Records Archives in NARA's ceiling of discretionary advisory committees. FOR FURTHER...

  15. 76 FR 15349 - Advisory Committee on the Electronic Records Archives (ACERA); Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-21

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Advisory Committee on the Electronic Records Archives (ACERA); Meeting AGENCY: National Archives and Records Administration. ACTION: Notice of Meeting. SUMMARY... Archives and Records Administration (NARA) announces a meeting of the Advisory Committee on the Electronic...

  16. 78 FR 22345 - Advisory Committee on the Electronic Records Archives (ACERA)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-15

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Advisory Committee on the Electronic Records Archives... and Records Administration (NARA) announces a meeting of the Advisory Committee on the Electronic... United States, on technical, mission, and service issues related to the Electronic Records Archives (ERA...

  17. 77 FR 21812 - Advisory Committee on the Electronic Records Archives (ACERA).

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Advisory Committee on the Electronic Records Archives... and Records Administration (NARA) announces a meeting of the Advisory Committee on the Electronic... United States, on technical, mission, and service issues related to the Electronic Records Archives (ERA...

  18. Electronic medical archives: a different approach to applying re-signing mechanisms to digital signatures.

    PubMed

    Chen, Tzer-Long; Lin, Frank Y S

    2011-08-01

    Electronic medical records can be defined as a digital format of the traditionally paper-based anamneses, which contains the history of a patient such as his somewhat illness, current health problems, and his chronic treatments. An electronic anamnesis is meant to make the patient's health information more conveniently accessible and transferable between different medical institutions and also easier to be kept quite a long time. Because of such transferability and accessibility of electronic anamneses, we can use less resource than before on storing the patients' medical information. This also means that medical care providers could save more funds on record-keeping and access a patient's medical background directly since shown on the computer screen more quickly and easily. Overall, the service quality has seemingly improved greatly. However, the usage of electronic anamneses involves in some concerned issues such as its related law declaration, and the security of the patient's confidential information. Because of these concerns, a secure medical networking scheme is taking into consideration. Nowadays, the administrators at the medical institutions are facing more challenges on monitoring computers and network systems, because of dramatic advances in this field. For instance, a trusted third party is authorized to access some medical records for a certain period of time. In regard to the security purpose, all the electronic medical records are embedded with both of the public-key infrastructure (PKI) cryptography and the digital signature technique so as to ensure the records well-protected. Since the signatures will be invalid due to the revocation or time expiration, the security of records under this premise would turn into vulnerable. Hence, we propose a re-signing scheme, whose purpose is to make a going-expired digital signature been resigned in time, in keeping with the premise of not conflicting with the laws, morals, and privacy while maintaining the security of the electronic medical records.

  19. Electronic transfer of sensitive patient data.

    PubMed

    Detterbeck, A M W; Kaiser, J; Hirschfelder, U

    2015-01-01

    The purpose of this study was to develop decision-making aids and recommendations for dental practitioners regarding the utilization and sharing of sensitive digital patient data. In the current environment of growing digitization, healthcare professionals need detailed knowledge of secure data management to maximize confidentiality and minimize the risks involved in both archiving patient data and sharing it through electronic channels. Despite well-defined legal requirements, an all-inclusive technological solution does not currently exist. The need for a preliminary review and critical appraisal of common practices of data transfer prompted a search of the literature and the Web to identify viable methods of secure data exchange and to develop a flowchart. A strong focus was placed on the transmission of datasets both smaller than and larger than 10 MB, and on secure communication by smartphone. Although encryption of patient-related data should be routine, it is often difficult to implement. Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME) are viable standards for secure e-mail encryption. Sharing of high-volume data should be accomplished with the help of file encryption. Careful handling of sensitive patient data is mandatory, and it is the end-user's responsibility to meet any requirements for encryption, preferably by using free, open-source (and hence transparent) software.

  20. Digitizing and Securing Archived Laboratory Notebooks

    ERIC Educational Resources Information Center

    Caporizzo, Marilyn

    2008-01-01

    The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…

  1. 75 FR 63208 - Advisory Committee on the Electronic Records Archives (ACERA)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Advisory Committee on the Electronic Records Archives (ACERA) AGENCY: National Archives and Records Administration. ACTION: Notice of meeting. SUMMARY: In... and Records Administration (NARA) announces a meeting of the Advisory Committee on the Electronic...

  2. 76 FR 65218 - Advisory Committee on the Electronic Records Archives (ACERA)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Advisory Committee on the Electronic Records Archives (ACERA) AGENCY: National Archives and Records Administration. ACTION: Notice of meeting. SUMMARY: In... and Records Administration (NARA) announces a meeting of the Advisory Committee on the Electronic...

  3. Autosophy: an alternative vision for satellite communication, compression, and archiving

    NASA Astrophysics Data System (ADS)

    Holtz, Klaus; Holtz, Eric; Kalienky, Diana

    2006-08-01

    Satellite communication and archiving systems are now designed according to an outdated Shannon information theory where all data is transmitted in meaningless bit streams. Video bit rates, for example, are determined by screen size, color resolution, and scanning rates. The video "content" is irrelevant so that totally random images require the same bit rates as blank images. An alternative system design, based on the newer Autosophy information theory, is now evolving, which transmits data "contend" or "meaning" in a universally compatible 64bit format. This would allow mixing all multimedia transmissions in the Internet's packet stream. The new systems design uses self-assembling data structures, which grow like data crystals or data trees in electronic memories, for both communication and archiving. The advantages for satellite communication and archiving may include: very high lossless image and video compression, unbreakable encryption, resistance to transmission errors, universally compatible data formats, self-organizing error-proof mass memories, immunity to the Internet's Quality of Service problems, and error-proof secure communication protocols. Legacy data transmission formats can be converted by simple software patches or integrated chipsets to be forwarded through any media - satellites, radio, Internet, cable - without needing to be reformatted. This may result in orders of magnitude improvements for all communication and archiving systems.

  4. Community archiving of imaging studies

    NASA Astrophysics Data System (ADS)

    Fritz, Steven L.; Roys, Steven R.; Munjal, Sunita

    1996-05-01

    The quantity of image data created in a large radiology practice has long been a challenge for available archiving technology. Traditional methods ofarchiving the large quantity of films generated in radiology have relied on warehousing in remote sites, with courier delivery of film files for historical comparisons. A digital community archive, accessible via a wide area network, represents a feasible solution to the problem of archiving digital images from a busy practice. In addition, it affords a physician caring for a patient access to imaging studies performed at a variety ofhealthcare institutions without the need to repeat studies. Security problems include both network security issues in the WAN environment and access control for patient, physician and imaging center. The key obstacle to developing a community archive is currently political. Reluctance to participate in a community archive can be reduced by appropriate design of the access mechanisms.

  5. Visual identification system for homeland security and law enforcement support

    NASA Astrophysics Data System (ADS)

    Samuel, Todd J.; Edwards, Don; Knopf, Michael

    2005-05-01

    This paper describes the basic configuration for a visual identification system (VIS) for Homeland Security and law enforcement support. Security and law enforcement systems with an integrated VIS will accurately and rapidly provide identification of vehicles or containers that have entered, exited or passed through a specific monitoring location. The VIS system stores all images and makes them available for recall for approximately one week. Images of alarming vehicles will be archived indefinitely as part of the alarming vehicle"s or cargo container"s record. Depending on user needs, the digital imaging information will be provided electronically to the individual inspectors, supervisors, and/or control center at the customer"s office. The key components of the VIS are the high-resolution cameras that capture images of vehicles, lights, presence sensors, image cataloging software, and image recognition software. In addition to the cameras, the physical integration and network communications of the VIS components with the balance of the security system and client must be ensured.

  6. 75 FR 12573 - Advisory Committee on the Electronic Records Archives (ACERA)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-16

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Advisory Committee on the Electronic Records Archives (ACERA) AGENCY: National Archives and Records Administration. ACTION: Notice of meeting. SUMMARY: In... and Records Administration (NARA) announces a [[Page 12574

  7. Stewardship of very large digital data archives

    NASA Technical Reports Server (NTRS)

    Savage, Patric

    1992-01-01

    This paper addresses the problems foreseen by the author in stewarding the very large digital data archives that will accumulate during the mission of the Earth Orbiting Satellite (EOS). It focuses on the function of 'shepherding' archived digital data into an endless future. Stewardship entails a great deal more than storing and protecting the archive. It also includes all aspects of providing meaningful service to the community of users (scientists) who will want to access the data. The complete steward will be required to do the following: (1) provide against loss due to physical phenomena; (2) assure that data is not 'lost' due to storage technology obsolescence; (3) maintain data in a current formatting methodology with the additional requirement of being able to reconstitute the data to its original, as-received format; (4) secure against loss or pollution of data due to accidental, misguided, or willful software intrusion; (5) prevent unauthorized electronic access to the data, including unauthorized placement of data into the archive; (6) index the data in a metadatabase so that all anticipatable queries can be served without searching through the data itself; (7) provide responsive access to the metadatabase; (8) provide appropriately responsive access to the data; (9) incorporate additions and changes to the archive (and to the metadatabase) in a timely way; and (10) deliver only copies of data to clients - retain physical custody of the 'official' data. Items 1 through 4 are discussed in this paper.

  8. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  9. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  10. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...

  11. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...

  12. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  13. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  14. Improving the security of international ISO container traffic by centralizing the archival of inspection results

    NASA Astrophysics Data System (ADS)

    Chalmers, Alex

    2004-09-01

    To increase the security and throughput of ISO traffic through international terminals more technology must be applied to the problem. A transnational central archive of inspection records is discussed that can be accessed by national agencies as ISO containers approach their borders. The intent is to improve the throughput and security of the cargo inspection process. A review of currently available digital media archiving technologies is presented and their possible application to the tracking of international ISO container shipments. Specific image formats employed by current x-ray inspection systems are discussed. Sample x-ray data from systems in use today are shown that could be entered into such a system. Data from other inspection technologies are shown to be easily integrated, as well as the creation of database records suitable for interfacing with other computer systems. Overall system performance requirements are discussed in terms of security, response time and capacity. Suggestions for pilot projects based on existing border inspection processes are made also.

  15. Teaching Electronic Records Management in the Archival Curriculum

    ERIC Educational Resources Information Center

    Zhang, Jane

    2016-01-01

    Electronic records management has been incorporated into the archival curriculum in North America since the 1990s. This study reported in this paper provides a systematic analysis of the content of electronic records management (ERM) courses currently taught in archival education programs. Through the analysis of course combinations and their…

  16. 32 CFR 2001.70 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Security Education and Training § 2001.70 General. (a) Purpose. This subpart sets standards for agency security education and... uniformity in the conduct of agency security education and training programs; and (3) Reduce instances of...

  17. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part...: Information Security Oversight Office, NARA. ACTION: Proposed rule; correction. SUMMARY: This document... Management System (FDMS) number to the proposed rule for Information Security Oversight Office (ISOO...

  18. Overview Webinar | Transportation Secure Data Center | NREL

    Science.gov Websites

    Overview Webinar Overview Webinar This webinar focuses on the Transportation Secure Data Center (TSDC), which serves as a secure area for archiving and accessing detailed transportation data from a

  19. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  20. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  1. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  2. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  3. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  4. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Security Education and Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal security education and training program which provides for initial training, refresher training...

  5. The machine in the market: Computers and the infrastructure of price at the New York Stock Exchange, 1965-1975.

    PubMed

    Kennedy, Devin

    2017-12-01

    This article traces the development and expansion of early computer systems for managing and disseminating 'real-time' market data at the most influential stock market in the United States, the New York Stock Exchange (NYSE). It follows electronic media at the NYSE over a roughly ten-year period, from the time of the deployment of a computer called the Market Data System (MDS) through debates surrounding the National Market System and the passage of the 1975 Securities Acts Amendments. Building on research at the archives of the NYSE and the Securities and Exchange Commission (SEC), this history emphasizes the regulatory and managerial contexts in which market data became computerized. The SEC viewed market automation as both necessary for the viability of the securities industry and a mechanism for expanding regulatory oversight over the venues of stock trading. Moving from the MDS to later technical projects in the late 1960s and early 1970s, this article charts the changing meaning of electronic governance in a market increasingly conceptualized as a technical object. Adding to recent work in the social studies of finance and financial technologies, this history sites early NYSE computerization programs within managerial efforts to consolidate control over the clerical labor of financial markets, and in contests between regulatory and market institutions. It concludes by exploring the differing forms of electronic governance activated in these efforts to bring computers into the market.

  6. 32 CFR 2001.80 - Prescribed standard forms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... when their use will enhance the protection of national security information and/or will reduce the....80 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Standard...

  7. The Post-Soviet Archives: Organization, Access, and Declassification

    DTIC Science & Technology

    1993-01-01

    attempting to place these files under Poskeirkhlv but has had limited success . The successors to the 503-the Ninistry of Security and the Foreign...their transfer to Roakomazkbiv. Pikhoia was able to take over these archives with some success ; yet, comp~lete control over the RO= archives has alluded...key 1Mironenko interview, May 27, 1992. - 20 - players are involved in the management of the Russian Presidential Archive. First, the director of the

  8. Fingerprint verification on medical image reporting system.

    PubMed

    Chen, Yen-Cheng; Chen, Liang-Kuang; Tsai, Ming-Dar; Chiu, Hou-Chang; Chiu, Jainn-Shiun; Chong, Chee-Fah

    2008-03-01

    The healthcare industry is recently going through extensive changes, through adoption of robust, interoperable healthcare information technology by means of electronic medical records (EMR). However, a major concern of EMR is adequate confidentiality of the individual records being managed electronically. Multiple access points over an open network like the Internet increases possible patient data interception. The obligation is on healthcare providers to procure information security solutions that do not hamper patient care while still providing the confidentiality of patient information. Medical images are also part of the EMR which need to be protected from unauthorized users. This study integrates the techniques of fingerprint verification, DICOM object, digital signature and digital envelope in order to ensure that access to the hospital Picture Archiving and Communication System (PACS) or radiology information system (RIS) is only by certified parties.

  9. Online catalog access and distribution of remotely sensed information

    NASA Astrophysics Data System (ADS)

    Lutton, Stephen M.

    1997-09-01

    Remote sensing is providing voluminous data and value added information products. Electronic sensors, communication electronics, computer software, hardware, and network communications technology have matured to the point where a distributed infrastructure for remotely sensed information is a reality. The amount of remotely sensed data and information is making distributed infrastructure almost a necessity. This infrastructure provides data collection, archiving, cataloging, browsing, processing, and viewing for applications from scientific research to economic, legal, and national security decision making. The remote sensing field is entering a new exciting stage of commercial growth and expansion into the mainstream of government and business decision making. This paper overviews this new distributed infrastructure and then focuses on describing a software system for on-line catalog access and distribution of remotely sensed information.

  10. 32 CFR 2001.48 - Loss, possible compromise or unauthorized disclosure.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... governments normally will not be advised of any security system vulnerabilities that contributed to the... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.48 Loss, possible compromise or unauthorized disclosure. (a...

  11. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... prompt decision on the appeal. (b) [Reserved] Sec. 1260.82 What actions must NARA take with information... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... related to declassification of classified national security information in records transferred to NARA's...

  12. AGU Council makes major commitment to the future of electronic publication

    NASA Astrophysics Data System (ADS)

    The establishment of a "perpetual care trust fund for AGU's electronic archives," which was done at the December 1996 meeting, is perhaps one of the most far-reaching actions ever taken by the AGU Council. The Union recognizes that it has a responsibility to the scientific community to assure that AGU publications are available in the future. Without the careful protection and upgrading of the files developed for AGU's electronic publications, there could be a hiatus in the archive of the body of knowledge. The costs associated with the maintenance of the electronic archive for these publications will be a continuing obligation of the Union, one that may be too large to be absorbed in the annual operating budget. Thus, the Council at the recommendation of the Publications Committee set up a trust fund to help ensure that AGU has the financial resources to maintain an archive of the material included in its electronic publications, to refresh these files on a regular basis, and to migrate the material in the archive to new formats and media as the technology for electronic publishing changes.

  13. The BlackBerry Project: Capturing the Content of Adolescents’ Text Messaging

    PubMed Central

    Underwood, Marion K.; Rosen, Lisa H.; More, David; Ehrenreich, Sam; Gentsch, Joanna K.

    2011-01-01

    This brief report presents an innovative method for capturing the content of adolescents’ electronic communication on handheld devices: text messaging, email, and Instant Messaging. In an ongoing longitudinal study, adolescents were provided with BlackBerry devices with service plans paid by the investigators, and use of text messaging was examined when participants were 15 years old and in the 10th grade (N=175, 81 girls). BlackBerries are configured so that the content of all text messages, email messages, and Instant Messages is saved to a secure server and organized in a highly secure, searchable, online archive. This paper describes the technology used to devise this method and ethical considerations. Evidence for validity is presented, including information on use of text messaging to show that participants used these devices heavily and frequencies of profane and sexual language in a two-day sample of text messaging to demonstrate that they were communicating openly. PMID:22004337

  14. The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C. M. Pancerella; L. A. Rahn; C. Yang

    2000-02-01

    The Diesel Combustion Collaborator (DCC) is a pilot project to develop and deploy collaborative technologies to combustion researchers distributed throughout the DOE national laboratories, academia, and industry. The result is a problem-solving environment for combustion research. Researchers collaborate over the Internet using DCC tools, which include: a distributed execution management system for running combustion models on widely distributed computers, including supercomputers; web-accessible data archiving capabilities for sharing graphical experimental or modeling data; electronic notebooks and shared workspaces for facilitating collaboration; visualization of combustion data; and video-conferencing and data-conferencing among researchers at remote sites. Security is a key aspect of themore » collaborative tools. In many cases, the authors have integrated these tools to allow data, including large combustion data sets, to flow seamlessly, for example, from modeling tools to data archives. In this paper the authors describe the work of a larger collaborative effort to design, implement and deploy the DCC.« less

  15. 32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency...

  16. An Electronic Finding Aid Using Extensible Markup Language (XML) and Encoded Archival Description (EAD).

    ERIC Educational Resources Information Center

    Chang, May

    2000-01-01

    Describes the development of electronic finding aids for archives at the University of Illinois, Urbana-Champaign that used XML (extensible markup language) and EAD (encoded archival description) to enable more flexible information management and retrieval than using MARC or a relational database management system. EAD template is appended.…

  17. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  18. 32 CFR 2001.52 - Emergency authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001... dissemination, transmission, safeguarding, and destruction of classified information during certain emergency...

  19. Uncovering Information Hidden in Web Archives: Glimpse at Web Analysis Building on Data Warehouses; Towards Continuous Web Archiving: First Results and an Agenda for the Future; The Open Video Digital Library; After Migration to an Electronic Journal Collection: Impact on Faculty and Doctoral Students; Who Is Reading On-Line Education Journals? Why? And What Are They Reading?; Report on eLibrary@UBC4: Research, Collaboration and the Digital Library - Visions for 2010.

    ERIC Educational Resources Information Center

    Rauber, Andreas; Bruckner, Robert M.; Aschenbrenner, Andreas; Witvoet, Oliver; Kaiser, Max; Masanes, Julien; Marchionini, Gary; Geisler, Gary; King, Donald W.; Montgomery, Carol Hansen; Rudner, Lawrence M.; Gellmann, Jennifer S.; Miller-Whitehead, Marie; Iverson, Lee

    2002-01-01

    These six articles discuss Web archives and Web analysis building on data warehouses; international efforts at continuous Web archiving; the Open Video Digital Library; electronic journal collections in academic libraries; online education journals; and an electronic library symposium at the University of British Columbia. (LRW)

  20. Long-Term Preservation and Advanced Access Services to Archived Data: The Approach of a System Integrator

    NASA Astrophysics Data System (ADS)

    Petitjean, Gilles; de Hauteclocque, Bertrand

    2004-06-01

    EADS Defence and Security Systems (EADS DS SA) have developed an expertise as integrator of archive management systems for both their commercial and defence customers (ESA, CNES, EC, EUMETSAT, French MOD, US DOD, etc.), especially in Earth Observation and in Meteorology fields.The concern of valuable data owners is both their long-term preservation but also the integration of the archive in their information system with in particular an efficient access to archived data for their user community. The system integrator answers to this requirement by a methodology combining understanding of user needs, exhaustive knowledge of the existing solutions both for hardware and software elements and development and integration ability. The system integrator completes the facility development by support activities.The long-term preservation of archived data obviously involves a pertinent selection of storage media and archive library. This selection relies on storage technology survey but the selection criteria depend on the analysis of the user needs. The system integrator will recommend the best compromise for implementing an archive management facility, thanks to its knowledge and its independence of storage market and through the analysis of the user requirements. He will provide a solution, which is able to evolve to take advantage of the storage technology progress.But preserving the data for long-term is not only a question of storage technology. Some functions are required to secure the archive management system against contingency situation: multiple data set copies using operational procedures, active quality control of the archived data, migration policy optimising the cost of ownership.

  1. 32 CFR 2004.10 - Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS... Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1 1 Bracketed references... 32 National Defense 6 2011-07-01 2011-07-01 false Responsibilities of the Director, Information...

  2. 32 CFR 2004.10 - Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS... Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1 1 Bracketed references... 32 National Defense 6 2010-07-01 2010-07-01 false Responsibilities of the Director, Information...

  3. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  4. Will Today's Electronic Journals Be Accessible in the 23rd Century: Issues in Long-Term Archiving (SIG STI, IFP)

    ERIC Educational Resources Information Center

    Lippert, Margaret

    2000-01-01

    This abstract of a planned session on access to scientific and technical journals addresses policy and standard issues related to long-term archives; digital archiving models; economic factors; hardware and software issues; multi-publisher electronic journal content integration; format considerations; and future data migration needs. (LRW)

  5. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  6. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  7. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  8. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  9. 32 CFR 2001.40 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... crucial nature of the information; analysis of known and anticipated threats; vulnerability; and... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.40 General...

  10. 32 CFR 2001.22 - Derivative classification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Derivative classification. 2001.22 Section 2001.22 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION...

  11. 32 CFR 2001.42 - Standards for security equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...

  12. 32 CFR 2001.42 - Standards for security equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...

  13. 32 CFR 2001.42 - Standards for security equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...

  14. 32 CFR 2001.42 - Standards for security equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...

  15. Visa Security Policy: Roles of the Departments of State and Homeland Security

    DTIC Science & Technology

    2011-06-30

    Functions in the Major Homeland Security Bills, both by Lisa M. Seghetti and Ruth Ellen Wasem. (Archived reports, available upon request.) 4 Ian Kelly , On...determine who, how many, and the scope of their functions. Then-Assistant Secretary of State for Consular Affairs Maura Harty described several key

  16. Library Operations Policies and Procedures, Volume 2. Central Archive for Reusable Defense Software (CARDS)

    DTIC Science & Technology

    1994-02-28

    improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are...and Franchisees . A Potential User is an individual who requests a Library Account. A User Recruit has been sent a CARDS Library Account Registration

  17. Managing Archival Collections in an Automated Environment: The Joys of Barcoding

    ERIC Educational Resources Information Center

    Hamburger, Susan; Charles, Jane Veronica

    2006-01-01

    In a desire for automated collection control, archival repositories are adopting barcoding from their library and records center colleagues. This article discusses the planning, design, and implementation phases of barcoding. The authors focus on reasons for barcoding, security benefits, in-room circulation tracking, potential for gathering…

  18. 76 FR 41826 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records... Information Program for State, Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on...

  19. Facilities Requirements for Archives and Special Collections Department.

    ERIC Educational Resources Information Center

    Brown, Charlotte B.

    The program of the Archives and Special Collections Department at Franklin and Marshall College requires the following function areas to be located in the Shadek-Fackenthal Library: (1) Reading Room; (2) Conservation Laboratory; (3) Isolation Room; (4) storage for permanent collection; (5) storage for high security materials; (6) Processing Room;…

  20. The GTC scientific archive

    NASA Astrophysics Data System (ADS)

    Gutiérrez, R.; Solano, E.

    2011-11-01

    At present, data management in telescopes ofclass 8-10 meters is very inefficient. The Gran Telescopio Canarias(GTC) scientific archive that is being developed by the Centro deAstrobiología (CAB) in the framework of the Spanish Virtual Observatoryis aimed at avoiding this situation, providing the telescope with anarchive accessible via internet, guaranteeing the accessibility,efficiency, visibility and data security demanded by a telescope of itsentity. The GTC archive will also be adapted to the standards defined bythe International Virtual Observatory, maximizing the visibility of thedata produced by the telescope. The main characteristics of the GTCscientific archive are described in this poster.

  1. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  2. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  3. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  4. 32 CFR 2001.60 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false General. 2001.60 Section 2001.60 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Self-Inspections § 2001.60...

  5. 29 CFR 14.4 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the interest of national security. (c) Courier—an individual designated by appropriate authority to...)—an office located in the National Archives and Records Administration (GSA) that monitors the... national security information. (k) Material—any document, product, or substance on or in which information...

  6. The USA PATRIOT Act: Archival Implications

    ERIC Educational Resources Information Center

    Trinkaus-Randall, Gregor

    2005-01-01

    In October 2001, Congress passed the USA PATRIOT Act to strengthen the ability of the U.S. government to combat terrorism. Unfortunately, some sections of the Act strike at core values and practices of libraries and archives, especially in the areas of record keeping, privacy, confidentiality, security, and access to the collections. This article…

  7. Data security in genomics: A review of Australian privacy requirements and their relation to cryptography in data storage.

    PubMed

    Schlosberg, Arran

    2016-01-01

    The advent of next-generation sequencing (NGS) brings with it a need to manage large volumes of patient data in a manner that is compliant with both privacy laws and long-term archival needs. Outside of the realm of genomics there is a need in the broader medical community to store data, and although radiology aside the volume may be less than that of NGS, the concepts discussed herein are similarly relevant. The relation of so-called "privacy principles" to data protection and cryptographic techniques is explored with regards to the archival and backup storage of health data in Australia, and an example implementation of secure management of genomic archives is proposed with regards to this relation. Readers are presented with sufficient detail to have informed discussions - when implementing laboratory data protocols - with experts in the fields.

  8. Data security in genomics: A review of Australian privacy requirements and their relation to cryptography in data storage

    PubMed Central

    Schlosberg, Arran

    2016-01-01

    The advent of next-generation sequencing (NGS) brings with it a need to manage large volumes of patient data in a manner that is compliant with both privacy laws and long-term archival needs. Outside of the realm of genomics there is a need in the broader medical community to store data, and although radiology aside the volume may be less than that of NGS, the concepts discussed herein are similarly relevant. The relation of so-called “privacy principles” to data protection and cryptographic techniques is explored with regards to the archival and backup storage of health data in Australia, and an example implementation of secure management of genomic archives is proposed with regards to this relation. Readers are presented with sufficient detail to have informed discussions – when implementing laboratory data protocols – with experts in the fields. PMID:26955504

  9. The Image and Data Archive at the Laboratory of Neuro Imaging.

    PubMed

    Crawford, Karen L; Neu, Scott C; Toga, Arthur W

    2016-01-01

    The LONI Image and Data Archive (IDA)(1) is a repository for sharing and long-term preservation of neuroimaging and biomedical research data. Originally designed to archive strictly medical image files, the IDA has evolved over the last ten years and now encompasses the storage and dissemination of neuroimaging, clinical, biospecimen, and genetic data. In this article, we report upon the genesis of the IDA and how it currently securely manages data and protects data ownership. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. 32 CFR 2004.21 - Protection of Classified Information [201(e)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of Classified Information [201(e)]. 2004.21 Section 2004.21 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY...

  11. 32 CFR 2001.37 - Assistance to the Department of State.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Assistance to the Department of State. 2001.37 Section 2001.37 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION...

  12. Secure and Privacy-Preserving Distributed Information Brokering

    ERIC Educational Resources Information Center

    Li, Fengjun

    2010-01-01

    As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…

  13. 32 CFR 2004.12 - Reviews by ISOO [102(b)(4)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Reviews by ISOO [102(b)(4)]. 2004.12 Section 2004.12 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1...

  14. Archiving Innovations Preserve Essential Historical Records

    NASA Technical Reports Server (NTRS)

    2013-01-01

    The Apollo 11 mission left on the Moon a silicon disc inscribed with microscopic recreations of messages from 73 countries. NanoArk Corporation of Fairport, New York, built on that NASA technology to develop a fire and water resistant archiving innovation that provides cost savings and security in preserving documents. Since its launch, NanoArk has grown from 2 to 10 employees.

  15. Strike Up the Score: Deriving Searchable and Playable Digital Formats from Sheet Music; Smart Objects and Open Archives; Building the Archives of the Future: Advanced in Preserving Electronic Records at the National Archives and Records Administration; From the Digitized to the Digital Library.

    ERIC Educational Resources Information Center

    Choudhury, G. Sayeed; DiLauro, Tim; Droettboom, Michael; Fujinaga, Ichiro; MacMillan, Karl; Nelson, Michael L.; Maly, Kurt; Thibodeau, Kenneth; Thaller, Manfred

    2001-01-01

    These articles describe the experiences of the Johns Hopkins University library in digitizing their collection of sheet music; motivation for buckets, Smart Object, Dumb Archive (SODA) and the Open Archives Initiative (OAI), and initial experiences using them in digital library (DL) testbeds; requirements for archival institutions, the National…

  16. Archives: New Horizons in Astronomy

    NASA Astrophysics Data System (ADS)

    Bobis, L.; Laurenceau, A.

    2010-10-01

    The scientific archives in the Paris Observatory's library date back to the XVIIth century. In addition to the preservation and the valorisation of these historic archives, the library is also responsible for the efficient and timely management of contemporary documents to ensure their optimum conservation and identification once they become historical. Oral, iconographic and electronic documents complement these paper archives.

  17. The Naval Postgraduate School SECURE ARCHIVAL STORAGE SYSTEM. Part II. Segment and Process Management Implementation.

    DTIC Science & Technology

    1981-03-01

    Research Instructor of Computer Scienr-. Reviewed by: Released by: WILLIAM M. TOLLES Department puter Science Dean of Research 4c t SECURITY...Lyle A. Cox, Roger R. Schell, and Sonja L. Perdue 9. PERFORMING ORGANIZATION NAME ANO ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT... Computer Networks, Operating Systems, Computer Security 20. AftUrCT (Cnthm, w v re eae old* It n..*p and idm 0 F W blk ..m.m.o’) ",A_;he security

  18. Usage of insecure E-mail services among researchers with different scientific background.

    PubMed

    Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago

    2011-08-01

    Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.

  19. Integration of EGA secure data access into Galaxy.

    PubMed

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.

  20. Integration of EGA secure data access into Galaxy

    PubMed Central

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; Fijneman, Remond J.A.; Boiten, Jan-Willem; A. Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer. PMID:28232859

  1. 78 FR 47245 - NARA Records Subject to FOIA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-05

    ... the NARA Web site, available at: http://www.archives.gov/foia/electronic-reading-room.html . (b) The... 31, 1996, also will be placed on NARA's Web site at http://www.archives.gov/foia/electronic-reading... you faster if we have any questions about your request. It is incumbent on the requester to maintain a...

  2. USNO Image and Catalog Archive Server - Naval Oceanography Portal

    Science.gov Websites

    are here: Home › USNO › Astrometry › Optical/IR Products › USNO Image and Catalog Archive Server USNO Logo USNO Navigation Optical/IR Products NOMAD UCAC URAT USNO-B1.0 Double Stars Solar System Link Disclaimer This is an official U.S. Navy web site. Security & Privacy Policy Veterans Crisis

  3. 77 FR 74249 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-13

    ... System (``FINRA ADDS'') is a secure Web site that provides a firm, by market participant identifier... generates a separate report for each data archive (Asset-Backed Securities or Corporate/Agency Debt..., 2013. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.\\11...

  4. The State of Leadership in DHS - Is There a Model for Leading?

    DTIC Science & Technology

    2008-12-01

    Security Directors Reports Findings (2008) https://www.nisp.us/ logistica /public/news.cfm?category=SPB&article_id=5544&sidebar=archive (accessed...Prosperous (Washington, D.C.: The Heritage Foundation, 2008), 18. 20 Veronica de Rugy, “Facts and Figures About Seven Years of Homeland Security...banding scale in the case of the Transportation Security Administration or equivalent pay grade/rank with respect to the U.S. Coast Guard). The

  5. The American Archival Profession and Information Technology Standards.

    ERIC Educational Resources Information Center

    Cox, Richard J.

    1992-01-01

    Discussion of the use of standards by archivists highlights the U.S. MARC AMC (Archives-Manuscript Control) format for reporting archival records and manuscripts; their interest in specific standards being developed for the OSI (Open Systems Interconnection) reference model; and the management of records in electronic formats. (16 references) (LAE)

  6. 36 CFR 1200.7 - What are NARA logos and how are they used?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Originals; ER11MY04.002 (4) Electronic Records Archives; ER11MY04.003 (5) The Archival Research Catalog; ER11MY04.004 (6) The Archives Library Information Center; ER11MY04.005 (7) Presidential Libraries; ER11MY04...

  7. 36 CFR 1200.7 - What are NARA logos and how are they used?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Originals; ER11MY04.002 (4) Electronic Records Archives; ER11MY04.003 (5) The Archival Research Catalog; ER11MY04.004 (6) The Archives Library Information Center; ER11MY04.005 (7) Presidential Libraries; ER11MY04...

  8. Digital information management: a progress report on the National Digital Mammography Archive

    NASA Astrophysics Data System (ADS)

    Beckerman, Barbara G.; Schnall, Mitchell D.

    2002-05-01

    Digital mammography creates very large images, which require new approaches to storage, retrieval, management, and security. The National Digital Mammography Archive (NDMA) project, funded by the National Library of Medicine (NLM), is developing a limited testbed that demonstrates the feasibility of a national breast imaging archive, with access to prior exams; patient information; computer aids for image processing, teaching, and testing tools; and security components to ensure confidentiality of patient information. There will be significant benefits to patients and clinicians in terms of accessible data with which to make a diagnosis and to researchers performing studies on breast cancer. Mammography was chosen for the project, because standards were already available for digital images, report formats, and structures. New standards have been created for communications protocols between devices, front- end portal and archive. NDMA is a distributed computing concept that provides for sharing and access across corporate entities. Privacy, auditing, and patient consent are all integrated into the system. Five sites, Universities of Pennsylvania, Chicago, North Carolina and Toronto, and BWXT Y12, are connected through high-speed networks to demonstrate functionality. We will review progress, including technical challenges, innovative research and development activities, standards and protocols being implemented, and potential benefits to healthcare systems.

  9. Secure Retrieval of FFTF Testing, Design, and Operating Information

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function ofmore » the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.« less

  10. Experimental Evaluation of the New Automated Team Composition System (ATCS) by Formation of Optimal Teams for an Engineering Research Task

    DTIC Science & Technology

    2010-12-24

    Los Angeles Police Department ) 3. LACSD ( Los Angeles County Sheriff’ Department ) 4. USDHS (US Department of Homeland Security) Candidate Roster... The present study used archival data from a UCLA (University of California Los Angeles ) engineering course in which nominally student teams prepare...psychological literature. The present study used archival data from a UCLA (University of California Los Angeles ) engineering course

  11. Medical image digital archive: a comparison of storage technologies

    NASA Astrophysics Data System (ADS)

    Chunn, Timothy; Hutchings, Matt

    1998-07-01

    A cost effective, high capacity digital archive system is one of the remaining key factors that will enable a radiology department to eliminate film as an archive medium. The ever increasing amount of digital image data is creating the need for huge archive systems that can reliably store and retrieve millions of images and hold from a few terabytes of data to possibly hundreds of terabytes. Selecting the right archive solution depends on a number of factors: capacity requirements, write and retrieval performance requirements, scaleability in capacity and performance, conformance to open standards, archive availability and reliability, security, cost, achievable benefits and cost savings, investment protection, and more. This paper addresses many of these issues. It compares and positions optical disk and magnetic tape technologies, which are the predominant archive mediums today. New technologies will be discussed, such as DVD and high performance tape. Price and performance comparisons will be made at different archive capacities, plus the effect of file size on random and pre-fetch retrieval time will be analyzed. The concept of automated migration of images from high performance, RAID disk storage devices to high capacity, NearlineR storage devices will be introduced as a viable way to minimize overall storage costs for an archive.

  12. Electronic publishing: opportunities and challenges for clinical linguistics and phonetics.

    PubMed

    Powell, Thomas W; Müller, Nicole; Ball, Martin J

    2003-01-01

    This paper discusses the contributions of informatics technology to the field of clinical linguistics and phonetics. The electronic publication of research reports and books has facilitated both the dissemination and the retrieval of scientific information. Electronic archives of speech and language corpora, too, stimulate research efforts. Although technology provides many opportunities, there remain significant challenges. Establishment and maintenance of scientific archives is largely dependent upon volunteer efforts, and there are few standards to ensure long-term access. Coordinated efforts and peer review are necessary to ensure utility and quality.

  13. Service-Based Extensions to an OAIS Archive for Science Data Management

    NASA Astrophysics Data System (ADS)

    Flathers, E.; Seamon, E.; Gessler, P. E.

    2014-12-01

    With new data management mandates from major funding sources such as the National Institutes for Health and the National Science Foundation, architecture of science data archive systems is becoming a critical concern for research institutions. The Consultative Committee for Space Data Systems (CCSDS), in 2002, released their first version of a Reference Model for an Open Archival Information System (OAIS). The CCSDS document (now an ISO standard) was updated in 2012 with additional focus on verifying the authenticity of data and developing concepts of access rights and a security model. The OAIS model is a good fit for research data archives, having been designed to support data collections of heterogeneous types, disciplines, storage formats, etc. for the space sciences. As fast, reliable, persistent Internet connectivity spreads, new network-available resources have been developed that can support the science data archive. A natural extension of an OAIS archive is the interconnection with network- or cloud-based services and resources. We use the Service Oriented Architecture (SOA) design paradigm to describe a set of extensions to an OAIS-type archive: purpose and justification for each extension, where and how each extension connects to the model, and an example of a specific service that meets the purpose.

  14. Indicators of Suicide Found on Social Networks: Phase 2

    DTIC Science & Technology

    2015-10-01

    Engagement in Sport and Suicide Risk. Archives of Suicide Research . 11(4), pp375-390. Chioqueta, A. P. & Stiles, T. C. (2007). The relationship between...Approved for Public Distribution: Distribution Unlimited Defense Personnel and Security Research Center Defense Manpower Data Center Technical...Report 15-04 October 2015 Indicators of Suicide Found on Social Networks: Phase 2 Andrée E. Rose Defense Personnel and Security Research

  15. European distributed seismological data archives infrastructure: EIDA

    NASA Astrophysics Data System (ADS)

    Clinton, John; Hanka, Winfried; Mazza, Salvatore; Pederson, Helle; Sleeman, Reinoud; Stammler, Klaus; Strollo, Angelo

    2014-05-01

    The European Integrated waveform Data Archive (EIDA) is a distributed Data Center system within ORFEUS that (a) securely archives seismic waveform data and related metadata gathered by European research infrastructures, and (b) provides transparent access to the archives for the geosciences research communities. EIDA was founded in 2013 by ORFEUS Data Center, GFZ, RESIF, ETH, INGV and BGR to ensure sustainability of a distributed archive system and the implementation of standards (e.g. FDSN StationXML, FDSN webservices) and coordinate new developments. Under the mandate of the ORFEUS Board of Directors and Executive Committee the founding group is responsible for steering and maintaining the technical developments and organization of the European distributed seismic waveform data archive and the integration within broader multidisciplanry frameworks like EPOS. EIDA currently offers uniform data access to unrestricted data from 8 European archives (www.orfeus-eu.org/eida), linked by the Arclink protocol, hosting data from 75 permanent networks (1800+ stations) and 33 temporary networks (1200+) stations). Moreover, each archive may also provide unique, restricted datasets. A webinterface, developed at GFZ, offers interactive access to different catalogues (EMSC, GFZ, USGS) and EIDA waveform data. Clients and toolboxes like arclink_fetch and ObsPy can connect directly to any EIDA node to collect data. Current developments are directed to the implementation of quality parameters and strong motion parameters.

  16. Investigation Organizer

    NASA Technical Reports Server (NTRS)

    Panontin, Tina; Carvalho, Robert; Keller, Richard

    2004-01-01

    Contents include the folloving:Overview of the Application; Input Data; Analytical Process; Tool's Output; and Application of the Results of the Analysis.The tool enables the first element through a Web-based application that can be accessed by distributed teams to store and retrieve any type of digital investigation material in a secure environment. The second is accomplished by making the relationships between information explicit through the use of a semantic network-a structure that literally allows an investigator or team to "connect -the-dots." The third element, the significance of the correlated information, is established through causality and consistency tests using a number of different methods embedded within the tool, including fault trees, event sequences, and other accident models. And finally, the evidence gathered and structured within the tool can be directly, electronically archived to preserve the evidence and investigative reasoning.

  17. Asan medical information system for healthcare quality improvement.

    PubMed

    Ryu, Hyeon Jeong; Kim, Woo Sung; Lee, Jae Ho; Min, Sung Woo; Kim, Sun Ja; Lee, Yong Su; Lee, Young Ha; Nam, Sang Woo; Eo, Gi Seung; Seo, Sook Gyoung; Nam, Mi Hyun

    2010-09-01

    This purpose of this paper is to introduce the status of the Asan Medical Center (AMC) medical information system with respect to healthcare quality improvement. Asan Medical Information System (AMIS) is projected to become a completely electronic and digital information hospital. AMIS has played a role in improving the health care quality based on the following measures: safety, effectiveness, patient-centeredness, timeliness, efficiency, privacy, and security. AMIS CONSISTED OF SEVERAL DISTINCTIVE SYSTEMS: order communication system, electronic medical record, picture archiving communication system, clinical research information system, data warehouse, enterprise resource planning, IT service management system, and disaster recovery system. The most distinctive features of AMIS were the high alert-medication recognition & management system, the integrated and severity stratified alert system, the integrated patient monitoring system, the perioperative diabetic care monitoring and support system, and the clinical indicator management system. AMIS provides IT services for AMC, 7 affiliated hospitals and over 5,000 partners clinics, and was developed to improve healthcare services. The current challenge of AMIS is standard and interoperability. A global health IT strategy is needed to get through the current challenges and to provide new services as needed.

  18. Preserving electronic records: Not the easiest task

    NASA Technical Reports Server (NTRS)

    Eaton, Fynnette

    1993-01-01

    The National Archives and Records Administration has had a program for accessioning, describing, preserving and providing reference service to the electronic records (machine-readable records) created by Federal agencies for more than twenty years. Although there have been many changes in the name of the office, its basic mission has remained the same: to preserve and make available those records created by Federal agencies that the National Archives has determined to have value beyond the short-term need of the originating agency. A phrase that was once coined for a preservation conference still applies: the National Archives, when it decides to accept the transfer of records into its custody, is committing itself to preserving these records for perpetuity.

  19. Electronic Journals, the Internet, and Scholarly Communication.

    ERIC Educational Resources Information Center

    Kling, Rob; Callahan, Ewa

    2003-01-01

    Examines the role of the Internet in supporting scholarly communication via electronic journals. Topics include scholarly electronic communication; a typology of electronic journals; models of electronic documents and scholarly communication forums; publication speed; costs; pricing; access and searching; citations; interactivity; archiving and…

  20. Going, going, still there: using the WebCite service to permanently archive cited Web pages.

    PubMed

    Eysenbach, Gunther

    2006-01-01

    Scholars are increasingly citing electronic "web references" which are not preserved in libraries or full text archives. WebCite is a new standard for citing web references. To "webcite" a document involves archiving the cited Web page through www.webcitation.org and citing the WebCite permalink instead of (or in addition to) the unstable live Web page.

  1. REAL ID Repeal and Identification Security Enhancement Act of 2009

    THOMAS, 111th Congress

    Rep. Cohen, Steve [D-TN-9

    2009-07-31

    House - 10/23/2009 Referred to the Subcommittee on Information Policy, Census, and National Archives. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. --No Title--

    Science.gov Websites

    help secure continuing funding to keep the GLCF archive free and open to the world. The messages contact you if we have more questions? Yes No Please help the GLCF continue to provide free and open

  3. Software for Managing an Archive of Images

    NASA Technical Reports Server (NTRS)

    Hallai, Charles; Jones, Helene; Callac, Chris

    2003-01-01

    This is a revised draft by Innovators concerning the report on Software for Managing and Archive of Images.The SSC Multimedia Archive is an automated electronic system to manage images, acquired both by film and digital cameras, for the Public Affairs Office (PAO) at Stennis Space Center (SSC). Previously, the image archive was based on film photography and utilized a manual system that, by todays standards, had become inefficient and expensive. Now, the SSC Multimedia Archive, based on a server at SSC, contains both catalogs and images for pictures taken both digitally and with a traditional film-based camera, along with metadata about each image.

  4. Lunar Data Node: Apollo Data Restoration and Archiving Update

    NASA Technical Reports Server (NTRS)

    Williams, David R.; Hills, Howard K.; Guiness, Edward A.; Taylor, Patrick T.; McBride, Marie Julia

    2013-01-01

    The Lunar Data Node (LDN) of the Planetary Data System (PDS) is responsible for the restoration and archiving of Apollo data. The LDN is located at the National Space Science Data Center (NSSDC), which holds much of the extant Apollo data on microfilm, microfiche, hard-copy documents, and magnetic tapes in older formats. The goal of the restoration effort is to convert the data into user-accessible PDS formats, create a full set of explanatory supporting data (metadata), archive the full data sets through PDS, and post the data online at the PDS Geosciences Node. This will both enable easy use of the data by current researchers and ensure that the data and metadata are securely preserved for future use. We are also attempting to locate and preserve Apollo data which were never archived at NSSDC. We will give a progress report on the data sets we have been restoring and future work.

  5. News from ESO Archive Services: Next Generation Request Handler and Data Access Delegation

    NASA Astrophysics Data System (ADS)

    Fourniol, N.; Lockhart, J.; Suchar, D.; Tacconi-Garman, L. E.; Moins, C.; Bierwirth, T.; Eglitis, P.; Vuong, M.; Micol, A.; Delmotte, N.; Vera, I.; Dobrzycki, A.; Forchì, V.; Lange, U.; Sogni, F.

    2012-09-01

    We present the new ESO Archive services which improve the electronic data access via the Download Manager and also provide PIs with the option to delegate data access to their collaborators via the Data Access Control.

  6. Photocopy of drawing located at National Archives, San Bruno, California ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing located at National Archives, San Bruno, California (Navy # 505-A-3). Floor plan; October, 1938. - Mare Island Naval Shipyard, Defense Electronics Equipment Operating Center, I Street, terminus west of Cedar Avenue, Vallejo, Solano County, CA

  7. Photocopy of drawing located at National Archives, San Bruno, California ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing located at National Archives, San Bruno, California (Navy # 505-A-9). Entrance details; October, 1938. - Mare Island Naval Shipyard, Defense Electronics Equipment Operating Center, I Street, terminus west of Cedar Avenue, Vallejo, Solano County, CA

  8. Photocopy of drawing located at National Archives, San Bruno, California ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing located at National Archives, San Bruno, California (Navy # 505-A-6). Elevations and sections; October 1938. - Mare Island Naval Shipyard, Defense Electronics Equipment Operating Center, I Street, terminus west of Cedar Avenue, Vallejo, Solano County, CA

  9. Photocopy of drawing located at National Archives, San Bruno, California ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing located at National Archives, San Bruno, California (Navy # 505-A-10). Exterior details; October, 1938. - Mare Island Naval Shipyard, Defense Electronics Equipment Operating Center, I Street, terminus west of Cedar Avenue, Vallejo, Solano County, CA

  10. Archival storage solutions for PACS

    NASA Astrophysics Data System (ADS)

    Chunn, Timothy

    1997-05-01

    While they are many, one of the inhibitors to the wide spread diffusion of PACS systems has been robust, cost effective digital archive storage solutions. Moreover, an automated Nearline solution is key to a central, sharable data repository, enabling many applications such as PACS, telemedicine and teleradiology, and information warehousing and data mining for research such as patient outcome analysis. Selecting the right solution depends on a number of factors: capacity requirements, write and retrieval performance requirements, scaleability in capacity and performance, configuration architecture and flexibility, subsystem availability and reliability, security requirements, system cost, achievable benefits and cost savings, investment protection, strategic fit and more.This paper addresses many of these issues. It compares and positions optical disk and magnetic tape technologies, which are the predominant archive mediums today. Price and performance comparisons will be made at different archive capacities, plus the effect of file size on storage system throughput will be analyzed. The concept of automated migration of images from high performance, high cost storage devices to high capacity, low cost storage devices will be introduced as a viable way to minimize overall storage costs for an archive. The concept of access density will also be introduced and applied to the selection of the most cost effective archive solution.

  11. Photocopy of drawing located at National Archives, San Bruno, California ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing located at National Archives, San Bruno, California (Navy # 505-A-16). Window details (as built); October, 1938. - Mare Island Naval Shipyard, Defense Electronics Equipment Operating Center, I Street, terminus west of Cedar Avenue, Vallejo, Solano County, CA

  12. Photocopy of drawing located at National Archives, San Bruno, California ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing located at National Archives, San Bruno, California (Navy # 505-A-11). Tower and stair details; October, 1938. - Mare Island Naval Shipyard, Defense Electronics Equipment Operating Center, I Street, terminus west of Cedar Avenue, Vallejo, Solano County, CA

  13. Photocopy of drawing located at National Archives, San Bruno, California ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Photocopy of drawing located at National Archives, San Bruno, California (Navy # 505-A-14). Door schedule and details; October, 1938 - Mare Island Naval Shipyard, Defense Electronics Equipment Operating Center, I Street, terminus west of Cedar Avenue, Vallejo, Solano County, CA

  14. 36 CFR § 1200.7 - What are NARA logos and how are they used?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Archival Research Catalog; ER11MY04.004 (6) The Archives Library Information Center; ER11MY04.005 (7) Presidential Libraries; ER11MY04.006 (8) Federal Register publications. (i) Electronic Code of Federal...

  15. Access to the scientific literature

    NASA Astrophysics Data System (ADS)

    Albarède, Francis

    The Public Library of Science Open Letter (http://www.publiclibraryofscience.org) is a very generous initiative, but, as most similar initiatives since the advent of electronic publishing, it misses the critical aspects of electronic publishing.Ten years ago, a Publisher would be in charge of running a system called a “scientific journal.” In such a system, the presence of an Editor and peer Reviewers secures the strength of the science and the rigor of writing; the Publisher guarantees the professional quality of printing, efficient dissemination, and long-term archiving. Publishing used to be in everyone's best interest, or nearly everyone. The Publisher, because he/she is financially motivated, ensures widespread dissemination of the journal amongst libraries and individual subscribers. The interest of the Author is that the system guarantees a broad potential readership. The interest of the Reader is that a line is drawn between professionally edited literature, presumably of better quality, and gray literature or home publishing, so that he/she does not waste time going through ‘low yield’ ungraded information. The Publisher could either be a private company, an academic institution, or a scholarly society. My experience is that, when page charges and subscription rates are compounded, journals published by scholarly societies are not necessarily cheaper. The difference between these cases is not the cost of running an office with rents, wages, printing, postage, advertisement, and archiving, but that a private Publisher pays shareholders. Shareholders have the bad habit of minding their own business and, therefore, they may interfere negatively with scientific publishing. Nevertheless, while the stranglehold imposed by private Publishers on our libraries over the last 10 years by increasing subscription rates may in part be due to shareholders' greed, this is true only in part. The increases are also a consequence of the booming number of pages being printed.

  16. Zero Nuclear Weapons and Nuclear Security Enterprise Modernization

    DTIC Science & Technology

    2011-01-01

    national security strategy. For the first time since the Manhattan Project , the United States was no longer building nuclear weapons and was in fact...50 to 60 years to the Manhattan Project and are on the verge of catastrophic failure. Caustic chemicals and processes have sped up the corrosion and...day, the United States must fund the long-term modernization effort of the entire enter­ prise. Notes 1. Nuclear Weapon Archive, “The Manhattan

  17. Electronic Information Management for PfP Nations (La gestion electronique des informations pour les pays du PfP)

    DTIC Science & Technology

    2003-04-01

    such repositories containing electronic information sources that can be used for academic research. The Los Alamos Physics Archive, providing access to...Pinfield, Gardner and MacColl. 2002). The first e-print server was the Los Alamos Physics Archive, presently known as arXiv.org, which was created in 1991...by Ginsparg (Ginsparg 1996; Luce 2001; McKiernan 2000) at the Los Alamos National Laboratory, to give access to pre-prints in the domain of high

  18. Ocean Color Data at the Goddard Earth Sciences (GES) DAAC: CZCS, SeaWiFS, OCTS, MODIS-Terra, MODIS-Aqua

    NASA Technical Reports Server (NTRS)

    2002-01-01

    The Goddard Earth Sciences Distributed Active Archive Center (DAAC) is the designated archive for all of the ocean color data produced by NASA satellite missions. The DAAC is a long-term, high volume, secure repository for many different kinds of environmental data. With respect to ocean color, the Goddard DAAC holds all the data obtained during the eight-year mission of the Coastal Zone Color Scanner (CZCS). The DAAC is currently receiving data from the Sea-viewing Wide Field-of-view Sensor (SeaWiFS), and the MODIS-Terra instrument. The DAAC recently received reformatted data from the Ocean Color and Temperature Scanner (OCTS) and will also archive MODIS-Aqua Ocean products. In addition to its archive and distribution services, the Goddard DAAC strives to improve data access, ease-of-use, and data applicability for a broad spectrum of customers. The DAAC's data support teams practice dual roles, both insuring the integrity of the DAAC data archive and serving the user community with answers to user inquiries, online and print documentation, and customized data services.

  19. Education Policy Analysis Archives, 1996.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    1997-01-01

    This document consists of the 19 articles published in the Electronic Journal "Education Policy Analysis Archives" for the year 1996: (1) "The Achievement Crisis Is Real: A Review of 'The Manufactured Crisis'" (Lawrence C. Stedman); (2) "Staff Development Policy: Fuzzy Choices in an Imperfect Market" (Robert T.…

  20. Education Policy Analysis Archives, 1998.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    1998-01-01

    This document consists of the 21 articles published in the electronic journal "Education Policy Analysis Archives" for the year 1996. The articles are: (1) "The Political Legacy of School Accountability Systems" (Sherman Dorn); (2) "Review of Stephen Arons's 'Short Route to Chaos'" (Charles L. Glenn); (3)…

  1. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  2. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  3. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  4. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  5. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  6. 46 CFR 147.7 - Incorporation by reference.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES... approved material is available for inspection at Coast Guard Headquarters. Contact Commandant (CG-ENG... is also available for inspection at the National Archives and Records Administration (NARA). For...

  7. BAO plate archive digitization

    NASA Astrophysics Data System (ADS)

    Mickaelian, A. M.; Nikoghosyan, E. H.; Gigoyan, K. S.; Paronyan, G. M.; Abrahamyan, H. V.; Andreasyan, H. R.; Azatyan, N. M.; Kostandyan, G. R.; Khachatryan, K. G.; Vardanyan, A. V.; Gyulzadyan, M. V.; Mikayelyan, G. A.; Farmanyan, S. V.; Knyazyan, A. V.

    Astronomical plate archives created on the basis of numerous observations at many observatories are important part of the astronomical heritage. Byurakan Astrophysical Observatory (BAO) plate archive consists of 37,000 photographic plates and films, obtained at 2.6m telescope, 1m and 0.5m Schmidt telescopes and other smaller ones during 1947-1991. In 2015, we have started a project on the whole BAO Plate Archive digitization, creation of electronic database and its scientific usage. A Science Program Board is created to evaluate the observing material, to investigate new possibilities and to propose new projects based on the combined usage of these observations together with other world databases. The Executing Team consists of 11 astronomers and 2 computer scientists and will use 2 EPSON Perfection V750 Pro scanners for the digitization. The project will run during 3 years in 2015-2017 and the final result will be an electronic database and online interactive sky map to be used for further research projects.

  8. Electronic Books.

    ERIC Educational Resources Information Center

    Barker, Philip; Giller, Susan

    1992-01-01

    Classifies types of electronic books: archival, informational, instructional, and interrogational; evaluates five commercially, available examples and two in-house examples; and describes software tools for creating and delivering electronic books. Identifies crucial design considerations: interactive end-user interfaces; use of hypermedia;…

  9. Security Techniques for the Electronic Health Records.

    PubMed

    Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra

    2017-08-01

    The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.

  10. DOE DISS/ET pilot system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strait, R.S.; Wagner, E.E.

    1994-07-01

    The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less

  11. Development of a Smart Mobile Data Module for Fetal Monitoring in E-Healthcare.

    PubMed

    Houzé de l'Aulnoit, Agathe; Boudet, Samuel; Génin, Michaël; Gautier, Pierre-François; Schiro, Jessica; Houzé de l'Aulnoit, Denis; Beuscart, Régis

    2018-03-23

    The fetal heart rate (FHR) is a marker of fetal well-being in utero (when monitoring maternal and/or fetal pathologies) and during labor. Here, we developed a smart mobile data module for the remote acquisition and transmission (via a Wi-Fi or 4G connection) of FHR recordings, together with a web-based viewer for displaying the FHR datasets on a computer, smartphone or tablet. In order to define the features required by users, we modelled the fetal monitoring procedure (in home and hospital settings) via semi-structured interviews with midwives and obstetricians. Using this information, we developed a mobile data transfer module based on a Raspberry Pi. When connected to a standalone fetal monitor, the module acquires the FHR signal and sends it (via a Wi-Fi or a 3G/4G mobile internet connection) to a secure server within our hospital information system. The archived, digitized signal data are linked to the patient's electronic medical records. An HTML5/JavaScript web viewer converts the digitized FHR data into easily readable and interpretable graphs for viewing on a computer (running Windows, Linux or MacOS) or a mobile device (running Android, iOS or Windows Phone OS). The data can be viewed in real time or offline. The application includes tools required for correct interpretation of the data (signal loss calculation, scale adjustment, and precise measurements of the signal's characteristics). We performed a proof-of-concept case study of the transmission, reception and visualization of FHR data for a pregnant woman at 30 weeks of amenorrhea. She was hospitalized in the pregnancy assessment unit and FHR data were acquired three times a day with a Philips Avalon® FM30 fetal monitor. The prototype (Raspberry Pi) was connected to the fetal monitor's RS232 port. The emission and reception of prerecorded signals were tested and the web server correctly received the signals, and the FHR recording was visualized in real time on a computer, a tablet and smartphones (running Android and iOS) via the web viewer. This process did not perturb the hospital's computer network. There was no data delay or loss during a 60-min test. The web viewer was tested successfully in the various usage situations. The system was as user-friendly as expected, and enabled rapid, secure archiving. We have developed a system for the acquisition, transmission, recording and visualization of RCF data. Healthcare professionals can view the FHR data remotely on their computer, tablet or smartphone. Integration of FHR data into a hospital information system enables optimal, secure, long-term data archiving.

  12. Education Policy Analysis Archives, 2001: Numbers 12-22.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    2001-01-01

    This document consists of articles 12-22 published in the electronic journal "Educational Policy Analysis Archives" for the year 2001: (12) "Affirmative Action at Work: Performance Audit of Two Minority Graduate Fellowship Programs, Illinois IMGIP and ICEOP" (Jack McKillip); (13) "School Reform Initiatives as Balancing…

  13. Education Policy Analysis Archives, 1999: Numbers 21-31.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    1999-01-01

    This document consists of articles 21-31 published in the electronic journal "Education Policy Analysis Archives" for the year 1999: (21) "Facing the Consequences: Identifying Limitations of How We Categorize People in Research and Policy" (Cynthia Wallat and Carolyn Steele); (22) "Teachers in Charter Schools and…

  14. 46 CFR 147.7 - Incorporation by reference.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES... approved material is available for inspection at the Coast Guard, Office of Operating and Environmental... sources listed below. It is also available for inspection at the National Archives and Records...

  15. 36 CFR 1236.24 - What are the additional requirements for managing unstructured electronic records?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... requirements for managing unstructured electronic records? 1236.24 Section 1236.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional Requirements for Electronic Records § 1236.24 What are the additional requirements for managing...

  16. 36 CFR 1236.24 - What are the additional requirements for managing unstructured electronic records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... requirements for managing unstructured electronic records? 1236.24 Section 1236.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional Requirements for Electronic Records § 1236.24 What are the additional requirements for managing...

  17. 36 CFR 1236.24 - What are the additional requirements for managing unstructured electronic records?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requirements for managing unstructured electronic records? 1236.24 Section 1236.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional Requirements for Electronic Records § 1236.24 What are the additional requirements for managing...

  18. 36 CFR 1236.24 - What are the additional requirements for managing unstructured electronic records?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements for managing unstructured electronic records? 1236.24 Section 1236.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional Requirements for Electronic Records § 1236.24 What are the additional requirements for managing...

  19. Preserving Data for Renewable Energy

    NASA Astrophysics Data System (ADS)

    Macduff, M.; Sivaraman, C.

    2017-12-01

    The EERE Atmosphere to Electrons (A2e) program established the Data Archive and Portal (DAP) to ensure the long-term preservation and access to A2e research data. The DAP has been operated by PNNL for 2 years with data from more than a dozen projects and 1PB of data and hundreds of datasets expected to be stored this year. The data are a diverse mix of model runs, observational data, and dervived products. While most of the data is public, the DAP has securely stored many proprietary data sets provided by energy producers that are critical to the research goals of the A2e program. The DAP uses Amazon Web Services (AWS) and PNNL resources to provide long-term archival and access to the data with appropriate access controls. As a key element of the DAP, metadata are collected for each dataset to assist with data discovery and usefulness of the data. Further, the DAP has begun a process of standardizing observation data into NetCDF, which allows users to focus on the data instead of parsing the many formats. Creating a central repository that is in tune with the unique needs of the A2e research community is helping active tasks today as well as making many future research efforts possible. In this presentation, we provide an overview the DAP capabilities and benefits to the renewable energy community.

  20. Archiving California’s historical duck nesting data

    USGS Publications Warehouse

    Ackerman, Joshua T.; Herzog, Mark P.; Brady, Caroline; Eadie, John M.; Yarris, Greg S.

    2015-07-14

    With the conclusion of this project, most duck nest data have been entered, but all nest-captured hen data and other breeding waterfowl data that were outside the scope of this project have still not been entered and electronically archived. Maintaining an up-to-date archive will require additional resources to archive and enter the new duck nest data each year in an iterative process. Further, data proofing should be conducted whenever possible, and also should be considered an iterative process as there was sometimes missing data that could not be filled in without more direct knowledge of specific projects. Despite these disclaimers, this duck data archive represents a massive and useful dataset to inform future research and management questions.

  1. Education Policy Analysis Archives, 1999: Numbers 1-20.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    1999-01-01

    This document consists of articles 1-20 published in the electronic journal "Educational Policy Analysis Archives" for the year 1999: (1) "Ethnic Segregation in Arizona Charter Schools" (Casey D. Cobb and Gene V. Glass); (2) "Educational Research in Latin America: A Response to Akkari and Perez" (Mariano Narodowski);…

  2. Education Policy Analysis Archives, 2002: Numbers 26-50.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    This document consists of articles 26 through 50 published in the electronic journal "Education Policy Analysis Archives" for the year 2002: (26) "Home Schooling in the United States: Trends and Characteristics" (Kurt J. Bauman); (27) "Mentoring Narratives ON-LINE: Teaching the Principalship" (Alison I. Griffith and Svitlana Taraban); (28) "Elm…

  3. Education Policy Analysis Archives, 2002: Numbers 1-25.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    2002-01-01

    This document consists of articles 1 through 25 published in the electronic journal Education Policy Analysis Archives for the year 2002: (1) Testing and Diversity in Postsecondary Education: The Case of California (Daniel Koretz, Michael Russell, Chingwei David Shin, Cathy Horn, and Kelly Shasby); (2) State-Mandated Testing and Teachers Beliefs…

  4. Education Policy Analysis Archives, 2001: Numbers 23-45.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    2001-01-01

    This document consists of articles 23-45 published in the electronic journal "Education Policy Analysis Archives" for the year 2001: (23) "La Participacion de las Minorias Nacionales dentro de Sistemas Educativas Pre-Modernos: El Caso de los Garifunas de Guatemala" (Carlos R. Ruano); (24) "'Alexander v. Sandoval': A…

  5. 36 CFR 1225.24 - When can an agency apply previously approved schedules to electronic records?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT SCHEDULING RECORDS § 1225.24 When... must notify the National Archives and Records Administration, Modern Records Programs (NWM), 8601... authority reference; and (v) Format of the records (e.g., database, scanned images, digital photographs, etc...

  6. 36 CFR 1225.24 - When can an agency apply previously approved schedules to electronic records?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT SCHEDULING RECORDS § 1225.24 When... must notify the National Archives and Records Administration, Modern Records Programs (NWM), 8601... authority reference; and (v) Format of the records (e.g., database, scanned images, digital photographs, etc...

  7. 36 CFR 1225.24 - When can an agency apply previously approved schedules to electronic records?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT SCHEDULING RECORDS § 1225.24 When... must notify the National Archives and Records Administration, Modern Records Programs (NWM), 8601... authority reference; and (v) Format of the records (e.g., database, scanned images, digital photographs, etc...

  8. Picture archiving and communication systems (PACS).

    PubMed

    Gamsu, Gordon; Perez, Enrico

    2003-07-01

    Over the past 2 decades, groups of computer scientists, electronic design engineers, and physicians, in universities and industry, have worked to achieve an electronic environment for the practice of medicine and radiology. The radiology component of this revolution is often called PACS (picture archiving and communication systems). More recently it has become evident that the efficiencies and cost savings of PACS are realized when they are part of an enterprise-wide electronic medical record. The installation of PACS requires careful planning by all the various stakeholds over many months prior to installation. All of the users must be aware of the initial disruption that will occur as they become familiar with the systems. Modern fourth generation PACS is linked to radiology and hospital information systems. The PACS consist of electronic acquisition sites-a robust network intelligently managed by a server, multiple viewing sites, and an archive. The details of how these are linked and their workflow analysis determines the success of PACS. PACS evolves over time, components are frequently replaced, and so the users must expect continuous learning about new updates and improved functionality. The digital medical revolution is rapidly being adopted in many medical centers, improving patient care and the success of the institution.

  9. Recommendations for a service framework to access astronomical archives

    NASA Technical Reports Server (NTRS)

    Travisano, J. J.; Pollizzi, J.

    1992-01-01

    There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.

  10. 36 CFR 1236.22 - What are the additional requirements for managing electronic mail records?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... requirements for managing electronic mail records? 1236.22 Section 1236.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional... accordance with the provisions of GRS 23, Item 5. (5) Draft documents that are circulated on electronic mail...

  11. 36 CFR 1236.22 - What are the additional requirements for managing electronic mail records?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements for managing electronic mail records? 1236.22 Section 1236.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional... accordance with the provisions of GRS 23, Item 5. (5) Draft documents that are circulated on electronic mail...

  12. 36 CFR 1236.22 - What are the additional requirements for managing electronic mail records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... requirements for managing electronic mail records? 1236.22 Section 1236.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional... accordance with the provisions of GRS 23, Item 5. (5) Draft documents that are circulated on electronic mail...

  13. 36 CFR 1236.22 - What are the additional requirements for managing electronic mail records?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requirements for managing electronic mail records? 1236.22 Section 1236.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional... accordance with the provisions of GRS 23, Item 5. (5) Draft documents that are circulated on electronic mail...

  14. Documenting genomics: Applying archival theory to preserving the records of the Human Genome Project.

    PubMed

    Shaw, Jennifer

    2016-02-01

    The Human Genome Archive Project (HGAP) aimed to preserve the documentary heritage of the UK's contribution to the Human Genome Project (HGP) by using archival theory to develop a suitable methodology for capturing the results of modern, collaborative science. After assessing past projects and different archival theories, the HGAP used an approach based on the theory of documentation strategy to try to capture the records of a scientific project that had an influence beyond the purely scientific sphere. The HGAP was an archival survey that ran for two years. It led to ninety scientists being contacted and has, so far, led to six collections being deposited in the Wellcome Library, with additional collections being deposited in other UK repositories. In applying documentation strategy the HGAP was attempting to move away from traditional archival approaches to science, which have generally focused on retired Nobel Prize winners. It has been partially successful in this aim, having managed to secure collections from people who are not 'big names', but who made an important contribution to the HGP. However, the attempt to redress the gender imbalance in scientific collections and to improve record-keeping in scientific organisations has continued to be difficult to achieve. Copyright © 2015 The Author. Published by Elsevier Ltd.. All rights reserved.

  15. Documenting genomics: Applying archival theory to preserving the records of the Human Genome Project

    PubMed Central

    Shaw, Jennifer

    2016-01-01

    The Human Genome Archive Project (HGAP) aimed to preserve the documentary heritage of the UK's contribution to the Human Genome Project (HGP) by using archival theory to develop a suitable methodology for capturing the results of modern, collaborative science. After assessing past projects and different archival theories, the HGAP used an approach based on the theory of documentation strategy to try to capture the records of a scientific project that had an influence beyond the purely scientific sphere. The HGAP was an archival survey that ran for two years. It led to ninety scientists being contacted and has, so far, led to six collections being deposited in the Wellcome Library, with additional collections being deposited in other UK repositories. In applying documentation strategy the HGAP was attempting to move away from traditional archival approaches to science, which have generally focused on retired Nobel Prize winners. It has been partially successful in this aim, having managed to secure collections from people who are not ‘big names’, but who made an important contribution to the HGP. However, the attempt to redress the gender imbalance in scientific collections and to improve record-keeping in scientific organisations has continued to be difficult to achieve. PMID:26388555

  16. BAO Plate Archive Project

    NASA Astrophysics Data System (ADS)

    Mickaelian, A. M.; Gigoyan, K. S.; Gyulzadyan, M. V.; Paronyan, G. M.; Abrahamyan, H. V.; Andreasyan, H. R.; Azatyan, N. M.; Kostandyan, G. R.; Samsonyan, A. L.; Mikayelyan, G. A.; Farmanyan, S. V.; Harutyunyan, V. L.

    2017-12-01

    We present the Byurakan Astrophysical Observatory (BAO) Plate Archive Project that is aimed at digitization, extraction and analysis of archival data and building an electronic database and interactive sky map. BAO Plate Archive consists of 37,500 photographic plates and films, obtained with 2.6m telescope, 1m and 0.5m Schmidt telescopes and other smaller ones during 1947-1991. The famous Markarian Survey (or the First Byurakan Survey, FBS) 2000 plates were digitized in 2002-2005 and the Digitized FBS (DFBS, www.aras.am/Dfbs/dfbs.html) was created. New science projects have been conducted based on this low-dispersion spectroscopic material. Several other smaller digitization projects have been carried out as well, such as part of Second Byurakan Survey (SBS) plates, photographic chain plates in Coma, where the blazar ON 231 is located and 2.6m film spectra of FBS Blue Stellar Objects. However, most of the plates and films are not digitized. In 2015, we have started a project on the whole BAO Plate Archive digitization, creation of electronic database and its scientific usage. Armenian Virtual Observatory (ArVO, www.aras.am/Arvo/arvo.htm) database will accommodate all new data. The project runs in collaboration with the Armenian Institute of Informatics and Automation Problems (IIAP) and will continues during 4 years in 2015-2018. The final result will be an Electronic Database and online Interactive Sky map to be used for further research projects. ArVO will provide all standards and tools for efficient usage of the scientific output and its integration in international databases.

  17. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    PubMed

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  18. [From planning to realization of an electronic patient record].

    PubMed

    Krämer, T; Rapp, R; Krämer, K L

    1999-03-01

    The high complex requirements on information and information flow in todays hospitals can only be accomplished by the use of modern Information Systems (IS). In order to achieve this, the Stiftung Orthopädische Universitätsklinik has carried out first the Project "Strategic Informations System Planning" in 1993. Then realizing the necessary infrastructure (network; client-server) from 1993 to 1997, and finally started the introduction of modern IS (SAP R/3 and IXOS-Archive) in the clinical area. One of the approved goal was the replacement of the paper medical record by an up-to-date electronical medical record. In this article the following three topics will be discussed: the difference between the up-to-date electronical medical record and the electronically archived finished cases, steps performed by our clinic to realize the up-to-date electronical medical record and the problems occurred during this process.

  19. From planning to realisation of an electronic patient record.

    PubMed

    Krämer, T; Rapp, R; Krämer, K-L

    1999-03-01

    The high complex requirements on information and information flow in todays hospitals can only be accomplished by the use of modern Information Systems (IS). In order to achieve this, the Stiftung Orthopädische Universitätsklinik has carried out first the Project "Strategic Informations System Planning" in 1993. Then realizing the neccessary infrastructure (network; client-server) from 1993 to 1997, and finally started the introduction of modern IS (SAP R/3 and IXOS-Archive) in the clinical area. One of the approved goal was the replacement of the paper medical record by an up-to-date electronical medical record. In this article the following three topics will be discussed: the difference between the up-to-date electronical medical record and the electronically archived finished cases, steps performed by our clinic to realize the up-to-date electronical medical record and the problems occured during this process.

  20. Common object request broker architecture (CORBA)-based security services for the virtual radiology environment.

    PubMed

    Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K

    2000-05-01

    The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.

  1. Remediation of the protein data bank archive.

    PubMed

    Henrick, Kim; Feng, Zukang; Bluhm, Wolfgang F; Dimitropoulos, Dimitris; Doreleijers, Jurgen F; Dutta, Shuchismita; Flippen-Anderson, Judith L; Ionides, John; Kamada, Chisa; Krissinel, Eugene; Lawson, Catherine L; Markley, John L; Nakamura, Haruki; Newman, Richard; Shimizu, Yukiko; Swaminathan, Jawahar; Velankar, Sameer; Ory, Jeramia; Ulrich, Eldon L; Vranken, Wim; Westbrook, John; Yamashita, Reiko; Yang, Huanwang; Young, Jasmine; Yousufuddin, Muhammed; Berman, Helen M

    2008-01-01

    The Worldwide Protein Data Bank (wwPDB; wwpdb.org) is the international collaboration that manages the deposition, processing and distribution of the PDB archive. The online PDB archive at ftp://ftp.wwpdb.org is the repository for the coordinates and related information for more than 47 000 structures, including proteins, nucleic acids and large macromolecular complexes that have been determined using X-ray crystallography, NMR and electron microscopy techniques. The members of the wwPDB-RCSB PDB (USA), MSD-EBI (Europe), PDBj (Japan) and BMRB (USA)-have remediated this archive to address inconsistencies that have been introduced over the years. The scope and methods used in this project are presented.

  2. 36 CFR 1236.6 - What are agency responsibilities for electronic records management?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...-1235 of this subchapter; (b) Integrate records management and preservation considerations into the... responsibilities for electronic records management? 1236.6 Section 1236.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT General...

  3. 36 CFR 1236.6 - What are agency responsibilities for electronic records management?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-1235 of this subchapter; (b) Integrate records management and preservation considerations into the... responsibilities for electronic records management? 1236.6 Section 1236.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT General...

  4. 36 CFR 1236.6 - What are agency responsibilities for electronic records management?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...-1235 of this subchapter; (b) Integrate records management and preservation considerations into the... responsibilities for electronic records management? 1236.6 Section 1236.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT General...

  5. 36 CFR 1236.6 - What are agency responsibilities for electronic records management?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...-1235 of this subchapter; (b) Integrate records management and preservation considerations into the... responsibilities for electronic records management? 1236.6 Section 1236.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT General...

  6. 18 CFR 284.12 - Standards for pipeline business operations and communications.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... all such electronic information and documents. The pipeline must make this archived information... the following business practice and electronic communication standards promulgated by the North... (Version 1.9, September 30, 2009); (v) Quadrant Electronic Delivery Mechanism Related Standards (Version 1...

  7. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  8. Storage media for computers in radiology.

    PubMed

    Dandu, Ravi Varma

    2008-11-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits.

  9. Issues in Electronic Publishing.

    ERIC Educational Resources Information Center

    Meadow, Charles T.

    1997-01-01

    Discusses issues related to electronic publishing. Topics include writing; reading; production, distribution, and commerce; copyright and ownership of intellectual property; archival storage; technical obsolescence; control of content; equality of access; and cultural changes. (Author/LRW)

  10. 36 CFR 1235.50 - What specifications and standards for transfer apply to electronic records?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... characters and other non-data characters removed. Agencies must consult with the National Archives and... Road, College Park, MD 20740, phone number (301) 837-1578 to initiate transfer discussions. (b) Data files and databases. Data files and databases must be transferred to the National Archives of the United...

  11. 36 CFR 1235.50 - What specifications and standards for transfer apply to electronic records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... characters and other non-data characters removed. Agencies must consult with the National Archives and... Road, College Park, MD 20740, phone number (301) 837-1578 to initiate transfer discussions. (b) Data files and databases. Data files and databases must be transferred to the National Archives of the United...

  12. Using OAI-PMH and METS for Exporting Metadata and Digital Objects between Repositories

    ERIC Educational Resources Information Center

    Bell, Jonathan; Lewis, Stuart

    2006-01-01

    Purpose: To examine the relationship between deposit of electronic theses in institutional and archival repositories. Specifically the paper considers the automated export of theses for deposit in the archival repository in continuation of the existing arrangement in Wales for paper-based theses. Design/methodology/approach: The paper presents a…

  13. Home Economics Archive: Research, Tradition and History (HEARTH)

    Science.gov Websites

    , Tradition and History HEARTH is a core electronic collection of books and journals in Home Economics and Intimate History of American Girls. Additional information, images and readings on the history of Home Archive: Research, Tradition and History (HEARTH). Ithaca, NY: Albert R. Mann Library, Cornell University

  14. Research Capacity Building in Education: The Role of Digital Archives

    ERIC Educational Resources Information Center

    Carmichael, Patrick

    2011-01-01

    Accounts of how research capacity in education can be developed often make reference to electronic networks and online resources. This paper presents a theoretically driven analysis of the role of one such resource, an online archive of educational research studies that includes not only digitised collections of original documents but also videos…

  15. Education Policy Analysis Archives, 2001: Numbers 46-51.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    2001-01-01

    This document consists of articles 46 through 51 published in the electronic journal Education Policy Analysis Archives for the year 2001: (46) Second Year Analysis of a Hybrid Schedule High School (James B. Shreiber, William R. Veal, David J. Flinders, and Sherry Churchill; (47) Knowledge Management for Educational Information Systems: What Is…

  16. 36 CFR § 1225.24 - When can an agency apply previously approved schedules to electronic records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT SCHEDULING RECORDS § 1225.24 When... must notify the National Archives and Records Administration, Modern Records Programs (NWM), 8601... authority reference; and (v) Format of the records (e.g., database, scanned images, digital photographs, etc...

  17. Make it better but don't change anything.

    PubMed

    Wright, Jerry M

    2009-11-19

    With massive amounts of data being generated in electronic format, there is a need in basic science laboratories to adopt new methods for tracking and analyzing data. An electronic laboratory notebook (ELN) is not just a replacement for a paper lab notebook, it is a new method of storing and organizing data while maintaining the data entry flexibility and legal recording functions of paper notebooks. Paper notebooks are regarded as highly flexible since the user can configure it to store almost anything that can be written or physically pasted onto the pages. However, data retrieval and data sharing from paper notebooks are labor intensive processes and notebooks can be misplaced, a single point of failure that loses all entries in the volume. Additional features provided by electronic notebooks include searchable indices, data sharing, automatic archiving for security against loss and ease of data duplication. Furthermore, ELNs can be tasked with additional functions not commonly found in paper notebooks such as inventory control. While ELNs have been on the market for some time now, adoption of an ELN in academic basic science laboratories has been lagging. Issues that have restrained development and adoption of ELN in research laboratories are the sheer variety and frequency of changes in protocols with a need for the user to control notebook configuration outside the framework of professional IT staff support. In this commentary, we will look at some of the issues and experiences in academic laboratories that have proved challenging in implementing an electronic lab notebook.

  18. Disks for the Laboratory Part II.

    ERIC Educational Resources Information Center

    Dessy, Raymond E., Ed.

    1985-01-01

    Part 1 presents the chemistry, physics, and engineering technology associated with magnetic and optical disks. This part explores the subjects of archiving, security, validation and certification, and protection. Questions and issues are raised in each of the areas that both users and vendors should be aware. (JN)

  19. 36 CFR 1260.30 - What is the NDC?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false What is the NDC? 1260.30 Section 1260.30 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION The National Declassification Center (NDC...

  20. Wave Processes in Arctic Seas, Observed from TerraSAR-X

    DTIC Science & Technology

    2015-09-30

    Susanne Lehner German Aerospace Center Maritime Safety and Security Lab Henrich-Focke-Str. 4 28199 Bremen Germany phone: 0049 421/ 24420...of high resolution sea state forecast models in the German Bight, The International Archives of the Photogrammetry, Remote Sensing and Spatial

  1. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  2. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  3. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  4. 32 CFR 2001.43 - Storage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...

  5. 36 CFR § 1235.44 - What general transfer requirements apply to electronic records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... requirements apply to electronic records? § 1235.44 Section § 1235.44 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT TRANSFER OF RECORDS TO THE NATIONAL... requirements apply to electronic records? (a) Each agency must retain a copy of permanent electronic records...

  6. 36 CFR § 1236.22 - What are the additional requirements for managing electronic mail records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... requirements for managing electronic mail records? § 1236.22 Section § 1236.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT... management requirements for electronic mail records: (1) The names of sender and all addressee(s) and date...

  7. 36 CFR § 1236.24 - What are the additional requirements for managing unstructured electronic records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... requirements for managing unstructured electronic records? § 1236.24 Section § 1236.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT Additional Requirements for Electronic Records § 1236.24 What are the additional requirements for...

  8. 36 CFR § 1235.50 - What specifications and standards for transfer apply to electronic records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT TRANSFER OF RECORDS TO THE... Records Administration, Electronic/Special Media Records Services Division (NWME), 8601 Adelphi Road... and Records Administration, Electronic/Special Media Records Services Division (NWME), 8601 Adelphi...

  9. 36 CFR 1235.50 - What specifications and standards for transfer apply to electronic records?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT TRANSFER OF REC- ORDS TO THE... Records Administration, Electronic/Special Media Records Services Division (NWME), 8601 Adelphi Road... and Records Administration, Electronic/Special Media Records Services Division (NWME), 8601 Adelphi...

  10. BAO Plate Archive Project: Digitization, Electronic Database and Research Programmes

    NASA Astrophysics Data System (ADS)

    Mickaelian, A. M.; Abrahamyan, H. V.; Andreasyan, H. R.; Azatyan, N. M.; Farmanyan, S. V.; Gigoyan, K. S.; Gyulzadyan, M. V.; Khachatryan, K. G.; Knyazyan, A. V.; Kostandyan, G. R.; Mikayelyan, G. A.; Nikoghosyan, E. H.; Paronyan, G. M.; Vardanyan, A. V.

    2016-06-01

    The most important part of the astronomical observational heritage are astronomical plate archives created on the basis of numerous observations at many observatories. Byurakan Astrophysical Observatory (BAO) plate archive consists of 37,000 photographic plates and films, obtained at 2.6m telescope, 1m and 0.5m Schmidt type and other smaller telescopes during 1947-1991. In 2002-2005, the famous Markarian Survey (also called First Byurakan Survey, FBS) 1874 plates were digitized and the Digitized FBS (DFBS) was created. New science projects have been conducted based on these low-dispersion spectroscopic material. A large project on the whole BAO Plate Archive digitization, creation of electronic database and its scientific usage was started in 2015. A Science Program Board is created to evaluate the observing material, to investigate new possibilities and to propose new projects based on the combined usage of these observations together with other world databases. The Executing Team consists of 11 astronomers and 2 computer scientists and will use 2 EPSON Perfection V750 Pro scanners for the digitization, as well as Armenian Virtual Observatory (ArVO) database will be used to accommodate all new data. The project will run during 3 years in 2015-2017 and the final result will be an electronic database and online interactive sky map to be used for further research projects, mainly including high proper motion stars, variable objects and Solar System bodies.

  11. BAO Plate Archive digitization, creation of electronic database and its scientific usage

    NASA Astrophysics Data System (ADS)

    Mickaelian, Areg M.

    2015-08-01

    Astronomical plate archives created on the basis of numerous observations at many observatories are important part of the astronomical heritage. Byurakan Astrophysical Observatory (BAO) plate archive consists of 37,500 photographic plates and films, obtained at 2.6m telescope, 1m and 0.5m Schmidt telescopes and other smaller ones during 1947-1991. In 2002-2005, the famous Markarian Survey (First Byurakan Survey, FBS) 2000 plates were digitized and the Digitized FBS (DFBS, http://www.aras.am/Dfbs/dfbs.html) was created. New science projects have been conducted based on these low-dispersion spectroscopic material. In 2015, we have started a project on the whole BAO Plate Archive digitization, creation of electronic database and its scientific usage. A Science Program Board is created to evaluate the observing material, to investigate new possibilities and to propose new projects based on the combined usage of these observations together with other world databases. The Executing Team consists of 9 astronomers and 3 computer scientists and will use 2 EPSON Perfection V750 Pro scanners for the digitization, as well as Armenian Virtual Observatory (ArVO) database to accommodate all new data. The project will run during 3 years in 2015-2017 and the final result will be an electronic database and online interactive sky map to be used for further research projects.

  12. HEASARC - The High Energy Astrophysics Science Archive Research Center

    NASA Technical Reports Server (NTRS)

    Smale, Alan P.

    2011-01-01

    The High Energy Astrophysics Science Archive Research Center (HEASARC) is NASA's archive for high-energy astrophysics and cosmic microwave background (CMB) data, supporting the broad science goals of NASA's Physics of the Cosmos theme. It provides vital scientific infrastructure to the community by standardizing science data formats and analysis programs, providing open access to NASA resources, and implementing powerful archive interfaces. Over the next five years the HEASARC will ingest observations from up to 12 operating missions, while serving data from these and over 30 archival missions to the community. The HEASARC archive presently contains over 37 TB of data, and will contain over 60 TB by the end of 2014. The HEASARC continues to secure major cost savings for NASA missions, providing a reusable mission-independent framework for reducing, analyzing, and archiving data. This approach was recognized in the NRC Portals to the Universe report (2007) as one of the HEASARC's great strengths. This poster describes the past and current activities of the HEASARC and our anticipated developments in coming years. These include preparations to support upcoming high energy missions (NuSTAR, Astro-H, GEMS) and ground-based and sub-orbital CMB experiments, as well as continued support of missions currently operating (Chandra, Fermi, RXTE, Suzaku, Swift, XMM-Newton and INTEGRAL). In 2012 the HEASARC (which now includes LAMBDA) will support the final nine-year WMAP data release. The HEASARC is also upgrading its archive querying and retrieval software with the new Xamin system in early release - and building on opportunities afforded by the growth of the Virtual Observatory and recent developments in virtual environments and cloud computing.

  13. Electronic Journal Market Overview 1997: Part II--The Aggregators.

    ERIC Educational Resources Information Center

    Machovec, George S.

    1997-01-01

    Reviews the electronic journals and online services marketplace. Discusses fees; types of materials that are accessible; search engines and compatibility with Web browsers; information currency; types and number of sources available and numbers; archives; indexing, abstracting and full text titles; electronic delivery; technological development;…

  14. 75 FR 8156 - Electronic Game Card, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Electronic Game Card, Inc.; Order of Suspension of Trading February 19, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Electronic Game Card, Inc...

  15. The Importance of Trust in Electronic Commerce.

    ERIC Educational Resources Information Center

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  16. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ...-01] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health... the National Cybersecurity Center of Excellence (NCCoE) in the Secure Exchange of Electronic Health... accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE will bring...

  17. Remediation of the protein data bank archive

    PubMed Central

    Henrick, Kim; Feng, Zukang; Bluhm, Wolfgang F.; Dimitropoulos, Dimitris; Doreleijers, Jurgen F.; Dutta, Shuchismita; Flippen-Anderson, Judith L.; Ionides, John; Kamada, Chisa; Krissinel, Eugene; Lawson, Catherine L.; Markley, John L.; Nakamura, Haruki; Newman, Richard; Shimizu, Yukiko; Swaminathan, Jawahar; Velankar, Sameer; Ory, Jeramia; Ulrich, Eldon L.; Vranken, Wim; Westbrook, John; Yamashita, Reiko; Yang, Huanwang; Young, Jasmine; Yousufuddin, Muhammed; Berman, Helen M.

    2008-01-01

    The Worldwide Protein Data Bank (wwPDB; wwpdb.org) is the international collaboration that manages the deposition, processing and distribution of the PDB archive. The online PDB archive at ftp://ftp.wwpdb.org is the repository for the coordinates and related information for more than 47 000 structures, including proteins, nucleic acids and large macromolecular complexes that have been determined using X-ray crystallography, NMR and electron microscopy techniques. The members of the wwPDB–RCSB PDB (USA), MSD-EBI (Europe), PDBj (Japan) and BMRB (USA)–have remediated this archive to address inconsistencies that have been introduced over the years. The scope and methods used in this project are presented. PMID:18073189

  18. An Overview of Electronic Passport Security Features

    NASA Astrophysics Data System (ADS)

    Říha, Zdeněk

    Electronic passports include contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution. In its simplest form an electronic passport contains just a collection of read-only files, more advanced variants can include sophisticated cryptographic mechanisms protecting security of the document and / or privacy of the passport holder. This paper describes security features of electronic passports and discusses their efficiency.

  19. AccuNet/AP (Associated Press) Multimedia Archive

    ERIC Educational Resources Information Center

    Young, Terrence E., Jr.

    2004-01-01

    The AccuNet/AP Multimedia Archive is an electronic library containing the AP's current photos and a selection of pictures from their enormous print and negative library, as well as text and graphic material. It is composed of two photo databases as well as graphics, text, and audio databases. The features of this database are briefly described in…

  20. Journal of Teaching in Marriage and Family: Innovations in Family Science Education. Archival Print Edition, 2001.

    ERIC Educational Resources Information Center

    Gentry, Deborah, Ed.

    2002-01-01

    This document comprises the archival print edition of the first volume of a quarterly electronic journal providing a forum for information on leading-edge teaching innovations and research findings in the field of family science. The foci of the journal are the family science curriculum, instruction issues, evaluation and assessment, and…

  1. Searching Internet Archive Sites with Archie: Why, What, Where, and How.

    ERIC Educational Resources Information Center

    Simmonds, Curtis

    1993-01-01

    Describes Archie, an online catalog of electronic holdings of anonymous FTP (File Transfer Protocol) archive sites on the Internet. Accessing Archie through e-mail and using it in a telnet session are discussed. The Internet Gopher and Whatis, which can be used with Archie, are also explained, and search examples are included. (four references)…

  2. Education Policy Analysis Archives, 2001: Numbers 1-11.

    ERIC Educational Resources Information Center

    Glass, Gene V., Ed.

    2001-01-01

    This document consists of articles 1-11 published in the electronic journal "Education Policy Analysis Archives" for the year 2001: (1) "School Segregation of Children Who Migrate to the United States from Puerto Rico" (Luis M. Laosa); (2) "Testing Times: A School Case Study" (Ivor Goodson and Martha Foote); (3) "Impact of U.S. Overseas Schools in…

  3. 76 FR 24865 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... Electronic Archive (AEA). Transfer a snap shot of the DCIPS Master File to AEA annually at the end of the fiscal year. The AEA will transfer a snap shot of DCIPS to the National Archives and Records Administration (NARA) one year after the signature by the Archivist of the United States. Thereafter, the AEA...

  4. Developing and Managing a Local Digital Archive for Integrated Access to Journals and Other Publications.

    ERIC Educational Resources Information Center

    Stackpole, Laurie

    2001-01-01

    The Naval Research Laboratory Library has made significant progress providing its distributed user community with a single point-of-access to information needed to support scientific research through TORPEDO "Ultra," a digital archive that in many respects functions as an electronic counterpart of a traditional library. It consists of…

  5. 36 CFR § 1236.6 - What are agency responsibilities for electronic records management?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-1235 of this subchapter; (b) Integrate records management and preservation considerations into the... responsibilities for electronic records management? § 1236.6 Section § 1236.6 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT General...

  6. 78 FR 310 - Draft Revision of Guidance for Industry on Providing Regulatory Submissions in Electronic Format...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-03

    ...ApprovalProcess/FormsSubmissionRequirements/ElectronicSubmissions/ucm253101.htm , http://www.regulations.../Drugs/DevelopmentApprovalProcess/FormsSubmissionRequirements/ElectronicSubmissions/ucm253101.htm , http...), in a format that FDA can process, review, and archive. Currently, the Agency can process, review, and...

  7. 76 FR 16462 - In the Matter of Heli Electronics Corp., Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Heli Electronics Corp., Order of Suspension of Trading March 21, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Heli Electronics Corp...

  8. The Use of Electronic Book Theft Detection Systems in Libraries.

    ERIC Educational Resources Information Center

    Witt, Thomas B.

    1996-01-01

    Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…

  9. The electronic security partnership of safety/security and information systems departments.

    PubMed

    Yow, J Art

    2012-01-01

    The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.

  10. 36 CFR § 1260.30 - What is the NDC?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true What is the NDC? § 1260.30 Section § 1260.30 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION The National Declassification Center (NDC...

  11. 36 CFR 1226.20 - How do agencies temporarily extend retention periods?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false How do agencies temporarily extend retention periods? 1226.20 Section 1226.20 Parks, Forests, and Public Property NATIONAL ARCHIVES... temporarily extend retention periods? (a) Agencies must secure NARA written approval to retain records series...

  12. 36 CFR 1226.20 - How do agencies temporarily extend retention periods?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false How do agencies temporarily extend retention periods? 1226.20 Section 1226.20 Parks, Forests, and Public Property NATIONAL ARCHIVES... temporarily extend retention periods? (a) Agencies must secure NARA written approval to retain records series...

  13. 36 CFR 1260.56 - What are NARA considerations when implementing automatic declassification?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false What are NARA considerations when implementing automatic declassification? 1260.56 Section 1260.56 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Automatic Declassification §...

  14. NASA/IPAC Infrared Science Archive (IRSA) in the 2020s.

    NASA Astrophysics Data System (ADS)

    Desai, Vandana; Rebull, Luisa M.; IRSA Team

    2018-06-01

    I will discuss challenges faced by IRSA in the next decade due to changes in our user base: the dissolution of wavelength boundaries among astronomers, and the education of astronomers as data scientists. While the fraction of astronomers who use infrared data has increased drastically in the era of Spitzer, Herschel, and WISE, most people who do science with those data sets don’t use infrared data exclusively or identify as “Infrared astronomers”. Our archive, and others, need to be responsive to the needs of an increasingly multiwavelength community, and those exploring time domain astronomy. That means making the archives interlink seamlessly, while preserving expert knowledge so that data don’t get misused. As astronomical data sets grow in volume, users will increasingly expect server side resources, including both storage and analysis resources. These expectations come with a host of ramifications, from cost to security. Our archives must be built to satisfy the needs of both the power user and the beginning astronomer. I will discuss how IRSA plans to meet the evolving needs of our user community.

  15. Multi-provider architecture for cloud outsourcing of medical imaging repositories.

    PubMed

    Godinho, Tiago Marques; Bastião Silva, Luís A; Costa, Carlos; Oliveira, José Luís

    2014-01-01

    Over the last few years, the extended usage of medical imaging procedures has raised the medical community attention towards the optimization of their workflows. More recently, the federation of multiple institutions into a seamless distribution network has brought hope of increased quality healthcare services along with more efficient resource management. As a result, medical institutions are constantly looking for the best infrastructure to deploy their imaging archives. In this scenario, public cloud infrastructures arise as major candidates, as they offer elastic storage space, optimal data availability without great requirements of maintenance costs or IT personnel, in a pay-as-you-go model. However, standard methodologies still do not take full advantage of outsourced archives, namely because their integration with other in-house solutions is troublesome. This document proposes a multi-provider architecture for integration of outsourced archives with in-house PACS resources, taking advantage of foreign providers to store medical imaging studies, without disregarding security. It enables the retrieval of images from multiple archives simultaneously, improving performance, data availability and avoiding the vendor-locking problem. Moreover it enables load balancing and cache techniques.

  16. The conservation and utilisation of corporate documents and records : In the case of Yamaichi Security Company which had failed in 1997

    NASA Astrophysics Data System (ADS)

    Itoh, Masanao

    This article aims to explain the role and function of the faculty archives affiliated with the faculty of economics, the University of Tokyo, which preserves corporate and private documents and records of importance as historical materials received from various corporations and individuals and makes them available to the researcher and public, and then to explain how and why we have hold the original documents and records of Yamaichi Securities Company which had failed in 1997.

  17. What CFOs should know before venturing into the cloud.

    PubMed

    Rajendran, Janakan

    2013-05-01

    There are three major trends in the use of cloud-based services for healthcare IT: Cloud computing involves the hosting of health IT applications in a service provider cloud. Cloud storage is a data storage service that can involve, for example, long-term storage and archival of information such as clinical data, medical images, and scanned documents. Data center colocation involves rental of secure space in the cloud from a vendor, an approach that allows a hospital to share power capacity and proven security protocols, reducing costs.

  18. Strict integrity control of biomedical images

    NASA Astrophysics Data System (ADS)

    Coatrieux, Gouenou; Maitre, Henri; Sankur, Bulent

    2001-08-01

    The control of the integrity and authentication of medical images is becoming ever more important within the Medical Information Systems (MIS). The intra- and interhospital exchange of images, such as in the PACS (Picture Archiving and Communication Systems), and the ease of copying, manipulation and distribution of images have brought forth the security aspects. In this paper we focus on the role of watermarking for MIS security and address the problem of integrity control of medical images. We discuss alternative schemes to extract verification signatures and compare their tamper detection performance.

  19. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  20. Benefits of cloud computing for PACS and archiving.

    PubMed

    Koch, Patrick

    2012-01-01

    The goal of cloud-based services is to provide easy, scalable access to computing resources and IT services. The healthcare industry requires a private cloud that adheres to government mandates designed to ensure privacy and security of patient data while enabling access by authorized users. Cloud-based computing in the imaging market has evolved from a service that provided cost effective disaster recovery for archived data to fully featured PACS and vendor neutral archiving services that can address the needs of healthcare providers of all sizes. Healthcare providers worldwide are now using the cloud to distribute images to remote radiologists while supporting advanced reading tools, deliver radiology reports and imaging studies to referring physicians, and provide redundant data storage. Vendor managed cloud services eliminate large capital investments in equipment and maintenance, as well as staffing for the data center--creating a reduction in total cost of ownership for the healthcare provider.

  1. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Electronic shareholder forums. 240.14a-17 Section 240.14a-17 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...

  2. Storage media for computers in radiology

    PubMed Central

    Dandu, Ravi Varma

    2008-01-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits. PMID:19774182

  3. Improving the Quality of Backup Process for Publishing Houses and Printing Houses

    NASA Astrophysics Data System (ADS)

    Proskuriakov, N. E.; Yakovlev, B. S.; Pries, V. V.

    2018-04-01

    The analysis of main types for data threats, used by print media, and their influence on the vitality and security of information is made. The influence of the programs settings for preparing archive files, the types of file managers on the backup process is analysed. We proposed a simple and economical version of the practical implementation of the backup process consisting of 4 components: the command line interpreter, the 7z archiver, the Robocopy utility, and network storage. We recommend that the best option would be to create backup copies, consisting of three local copies of data and two network copies.

  4. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  5. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  6. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  7. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  8. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  9. Video capture of clinical care to enhance patient safety

    PubMed Central

    Weinger, M; Gonzales, D; Slagle, J; Syeed, M

    2004-01-01

    

 Experience from other domains suggests that videotaping and analyzing actual clinical care can provide valuable insights for enhancing patient safety through improvements in the process of care. Methods are described for the videotaping and analysis of clinical care using a high quality portable multi-angle digital video system that enables simultaneous capture of vital signs and time code synchronization of all data streams. An observer can conduct clinician performance assessment (such as workload measurements or behavioral task analysis) either in real time (during videotaping) or while viewing previously recorded videotapes. Supplemental data are synchronized with the video record and stored electronically in a hierarchical database. The video records are transferred to DVD, resulting in a small, cheap, and accessible archive. A number of technical and logistical issues are discussed, including consent of patients and clinicians, maintaining subject privacy and confidentiality, and data security. Using anesthesiology as a test environment, over 270 clinical cases (872 hours) have been successfully videotaped and processed using the system. PMID:15069222

  10. Archival Administration in the Electronic Information Age: An Advanced Institute for Government Archivists (2nd, Pittsburgh, Pennsylvania, June 3-14, 1991).

    ERIC Educational Resources Information Center

    Pittsburgh Univ., PA. Graduate School of Library and Information Sciences.

    This report describes the first phase of an institute that was designed to provide technical information to the chief administrative officials of state archival agencies about new trends in information technology and to introduce them to management tools needed for operating in this environment. Background information on the first institute…

  11. Creating Collaboration: Exploring the Development of a Baptist Digital Library and Archive. A Case Study

    ERIC Educational Resources Information Center

    Hall, Taffey

    2013-01-01

    The purpose of this study was to explore the construction of a collaborative Baptist digital library and archive on the Internet. The study investigated how a central electronic location of digitized Baptist primary source materials could look and work on the Internet and how such a project could benefit Baptist history professors, the primary…

  12. EHR/PHR Basics

    MedlinePlus

    ... a hospital, an insurance company, or an employer. Electronic Health Records—Are They Secure? Many people wonder ... information is kept private and secure in an electronic health record system. In an electronic health record, ...

  13. The Birmingham Burn Centre archive: A photographic history of post-war burn care in the United Kingdom.

    PubMed

    Hardwicke, Joseph; Kohlhardt, Angus; Moiemen, Naiem

    2015-06-01

    The Medical Research Council Burns and Industrial Injuries Unit at the Birmingham Accident Hospital pioneered civilian burn care and research in the United Kingdom during the post-war years. A photographic archive has been discovered that documents this period from 1945 to 1975. The aim of this project was to sort, digitize and archive the images in a secure format for future reference. The photographs detail the management of burns patients, from injury causation and surgical intervention, to nursing care, rehabilitation and long-term follow-up. A total of 2650 images files were collected from over 600 patients. Many novel surgical, nursing, dressing and rehabilitation strategies are documented and discussed. We have chosen to report part of the archive under the sections of (1) aseptic and antimicrobial burn care; (2) burn excision and wound closure; (3) rehabilitation, reconstruction and long-term outcomes; (4) accident prevention; and (5) response to a major burns incident. The Birmingham collection gives us a valuable insight into the approach to civilian burn care in the post-war years, and we present a case from the archive to the modern day, the longest clinical photographic follow-up to date. Copyright © 2015 Elsevier Ltd and ISBI. All rights reserved.

  14. Development of quantitative security optimization approach for the picture archives and carrying system between a clinic and a rehabilitation center

    NASA Astrophysics Data System (ADS)

    Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko

    2002-05-01

    The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.

  15. Citation Patterns to Traditional and Electronic Preprints in the Published Literature.

    ERIC Educational Resources Information Center

    Youngen, Gregory K.

    1998-01-01

    Identifies the growing importance of electronic preprints in the published literature of physics and astronomy and address several areas of concern regarding the future role of electronic preprints in scientific communication. Topics include a history of preprints in astronomy and physics; inaccuracies in preprint citations; and archival issues.…

  16. [A new concept for integration of image databanks into a comprehensive patient documentation].

    PubMed

    Schöll, E; Holm, J; Eggli, S

    2001-05-01

    Image processing and archiving are of increasing importance in the practice of modern medicine. Particularly due to the introduction of computer-based investigation methods, physicians are dealing with a wide variety of analogue and digital picture archives. On the other hand, clinical information is stored in various text-based information systems without integration of image components. The link between such traditional medical databases and picture archives is a prerequisite for efficient data management as well as for continuous quality control and medical education. At the Department of Orthopedic Surgery, University of Berne, a software program was developed to create a complete multimedia electronic patient record. The client-server system contains all patients' data, questionnaire-based quality control, and a digital picture archive. Different interfaces guarantee the integration into the hospital's data network. This article describes our experiences in the development and introduction of a comprehensive image archiving system at a large orthopedic center.

  17. Radiologic image communication and archive service: a secure, scalable, shared approach

    NASA Astrophysics Data System (ADS)

    Fellingham, Linda L.; Kohli, Jagdish C.

    1995-11-01

    The Radiologic Image Communication and Archive (RICA) service is designed to provide a shared archive for medical images to the widest possible audience of customers. Images are acquired from a number of different modalities, each available from many different vendors. Images are acquired digitally from those modalities which support direct digital output and by digitizing films for projection x-ray exams. The RICA Central Archive receives standard DICOM 3.0 messages and data streams from the medical imaging devices at customer institutions over the public telecommunication network. RICA represents a completely scalable resource. The user pays only for what he is using today with the full assurance that as the volume of image data that he wishes to send to the archive increases, the capacity will be there to accept it. To provide this seamless scalability imposes several requirements on the RICA architecture: (1) RICA must support the full array of transport services. (2) The Archive Interface must scale cost-effectively to support local networks that range from the very small (one x-ray digitizer in a medical clinic) to the very large and complex (a large hospital with several CTs, MRs, Nuclear medicine devices, ultrasound machines, CRs, and x-ray digitizers). (3) The Archive Server must scale cost-effectively to support rapidly increasing demands for service providing storage for and access to millions of patients and hundreds of millions of images. The architecture must support the incorporation of improved technology as it becomes available to maintain performance and remain cost-effective as demand rises.

  18. System Security Authorization Agreement (SSAA) for the WIRE Archive and Research Facility

    NASA Technical Reports Server (NTRS)

    2002-01-01

    The Wide-Field Infrared Explorer (WIRE) Archive and Research Facility (WARF) is operated and maintained by the Department of Physics, USAF Academy. The lab is located in Fairchild Hall, 2354 Fairchild Dr., Suite 2A103, USAF Academy, CO 80840. The WARF will be used for research and education in support of the NASA Wide Field Infrared Explorer (WIRE) satellite, and for related high-precision photometry missions and activities. The WARF will also contain the WIRE preliminary and final archives prior to their delivery to the National Space Science Data Center (NSSDC). The WARF consists of a suite of equipment purchased under several NASA grants in support of WIRE research. The core system consists of a Red Hat Linux workstation with twin 933 MHz PIII processors, 1 GB of RAM, 133 GB of hard disk space, and DAT and DLT tape drives. The WARF is also supported by several additional networked Linux workstations. Only one of these (an older 450 Mhz PIII computer running Red Hat Linux) is currently running, but the addition of several more is expected over the next year. In addition, a printer will soon be added. The WARF will serve as the primary research facility for the analysis and archiving of data from the WIRE satellite, together with limited quantities of other high-precision astronomical photometry data from both ground- and space-based facilities. However, the archive to be created here will not be the final archive; rather, the archive will be duplicated at the NSSDC and public access to the data will generally take place through that site.

  19. 75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... electronic security, the market is estimated at US$ 1.5 billion. Today, electronic security equipment is not... market information and to provide access to key government officials and potential business partners for... both the public sector (e.g., public security authorities and officials) and private business (e.g...

  20. GEOSPATICAL INFORMATION TECHNOLOGY AND INFORMATION MANAGEMENT QUALITY ASSURANCE

    EPA Science Inventory

    Most of the geospatial data in use are originated electronically. As a result, these data are acquired, stored, transformed, processed, presented, and archived electronically. The organized system of computer hardware and software used in these processes is called an Informatio...

  1. A reliable, low-cost picture archiving and communications system for small and medium veterinary practices built using open-source technology.

    PubMed

    Iotti, Bryan; Valazza, Alberto

    2014-10-01

    Picture Archiving and Communications Systems (PACS) are the most needed system in a modern hospital. As an integral part of the Digital Imaging and Communications in Medicine (DICOM) standard, they are charged with the responsibility for secure storage and accessibility of the diagnostic imaging data. These machines need to offer high performance, stability, and security while proving reliable and ergonomic in the day-to-day and long-term storage and retrieval of the data they safeguard. This paper reports the experience of the authors in developing and installing a compact and low-cost solution based on open-source technologies in the Veterinary Teaching Hospital for the University of Torino, Italy, during the course of the summer of 2012. The PACS server was built on low-cost x86-based hardware and uses an open source operating system derived from Oracle OpenSolaris (Oracle Corporation, Redwood City, CA, USA) to host the DCM4CHEE PACS DICOM server (DCM4CHEE, http://www.dcm4che.org ). This solution features very high data security and an ergonomic interface to provide easy access to a large amount of imaging data. The system has been in active use for almost 2 years now and has proven to be a scalable, cost-effective solution for practices ranging from small to very large, where the use of different hardware combinations allows scaling to the different deployments, while the use of paravirtualization allows increased security and easy migrations and upgrades.

  2. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  3. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  4. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  5. 36 CFR 1260.38 - How does the NDC ensure the quality of declassification reviews?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false How does the NDC ensure the quality of declassification reviews? 1260.38 Section 1260.38 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION The...

  6. 36 CFR 1260.38 - How does the NDC ensure the quality of declassification reviews?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false How does the NDC ensure the quality of declassification reviews? 1260.38 Section 1260.38 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION The...

  7. Invisible Ink Revealed: Concept, Context, and Chemical Principles of "Cold War" Writing

    ERIC Educational Resources Information Center

    Macrakis, Kristie; Bell, Elizabeth K.; Perry, Dale L.; Sweeder, Ryan D.

    2012-01-01

    By modifying secret writing formulas uncovered from the archives of the East German Ministry of State Security (MfS or Stasi), a novel general chemistry secret writing laboratory was developed. The laboratory combines science and history that highlights several fundamental chemical principles related to the writing. These include catalysis, redox…

  8. 36 CFR 1220.20 - What NARA acronyms are used throughout subchapter B?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What NARA acronyms are used throughout subchapter B? 1220.20 Section 1220.20 Parks, Forests, and Public Property NATIONAL ARCHIVES AND.... NAS means the Space and Security Management Division. NR means the Office of Regional Record Services...

  9. 36 CFR 1220.20 - What NARA acronyms are used throughout Subchapter B?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false What NARA acronyms are used throughout Subchapter B? 1220.20 Section 1220.20 Parks, Forests, and Public Property NATIONAL ARCHIVES AND.... NAS means the Space and Security Management Division. NR means the Office of Regional Record Services...

  10. 36 CFR 1254.10 - For how long and where is my researcher identification card valid?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... facilities in the Washington, DC, area and other NARA facilities that issue and use plastic researcher identification cards as part of their security systems, we issue a plastic card to replace the paper card issued... ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL...

  11. 36 CFR 1234.22 - How does an agency request a waiver from a requirement in this part?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and Security Management Division (NAS), National Archives and Records Administration, 8601 Adelphi Rd...) Supporting documentation that the alternative does not provide less protection for Federal records than that.... Documentation may take the form of certifications from a licensed fire protection engineer or a structural or...

  12. 36 CFR § 1234.22 - How does an agency request a waiver from a requirement in this part?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and Security Management Division (NAS), National Archives and Records Administration, 8601 Adelphi Rd...) Supporting documentation that the alternative does not provide less protection for Federal records than that.... Documentation may take the form of certifications from a licensed fire protection engineer or a structural or...

  13. 36 CFR 1234.22 - How does an agency request a waiver from a requirement in this part?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and Security Management Division (NAS), National Archives and Records Administration, 8601 Adelphi Rd...) Supporting documentation that the alternative does not provide less protection for Federal records than that.... Documentation may take the form of certifications from a licensed fire protection engineer or a structural or...

  14. 36 CFR 1234.22 - How does an agency request a waiver from a requirement in this part?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and Security Management Division (NAS), National Archives and Records Administration, 8601 Adelphi Rd...) Supporting documentation that the alternative does not provide less protection for Federal records than that.... Documentation may take the form of certifications from a licensed fire protection engineer or a structural or...

  15. 36 CFR 1234.22 - How does an agency request a waiver from a requirement in this part?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and Security Management Division (NAS), National Archives and Records Administration, 8601 Adelphi Rd...) Supporting documentation that the alternative does not provide less protection for Federal records than that.... Documentation may take the form of certifications from a licensed fire protection engineer or a structural or...

  16. Web Camera Use in Developing Biology, Molecular Biology and Biochemistry Laboratories

    ERIC Educational Resources Information Center

    Ogren, Paul J.; Deibel, Michael; Kelly, Ian; Mulnix, Amy B.; Peck, Charlie

    2004-01-01

    The use of a network-ready color camera is described which is primarily marketed as a security device and is used for experiments in developmental biology, genetics and biochemistry laboratories and in special student research projects. Acquiring and analyzing project and archiving images is very important in microscopy, electrophoresis and…

  17. Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications

    NASA Astrophysics Data System (ADS)

    Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu

    2007-11-01

    Since the security of all modern cryptographic techniques relies on unpredictable and irreproducible digital keys generated by random-number generators (RNGs), the realization of high-quality RNG is essential for secure communications. In this report, a new RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating silicon single-electron transistor (SET) having nearby an electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, stochastic single-electron capture/emission processes to/from the electron pocket are detected with high sensitivity by the SET, and result in giant random telegraphic signals (GRTS) on the SET current. It is experimentally demonstrated that the single-electron RNG generates extremely high-quality random digital sequences at room temperature, in spite of its simple configuration. Because of its small-size and low-power properties, the single-electron RNG is promising as a key nanoelectronic device for future ubiquitous computing systems with highly secure mobile communication capabilities.

  18. USign--a security enhanced electronic consent model.

    PubMed

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  19. Archiving data from new survey technologies: Enabling research with high-precision data while preserving participant privacy

    DOE PAGES

    Gonder, Jeffrey; Burton, Evan; Murakami, Elaine

    2015-12-29

    Despite the significant effort and expense to collect high-resolution Global Positioning System (GPS) data in travel surveys, privacy concerns often lead to its underutilization. This paper describes development of the Transportation Secure Data Center (TSDC) to address this dilemma of providing data access while preserving privacy. Furthermore, the TSDC operating structure was developed in consultation with an advisory committee and includes: a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using amore » variety of tools and reference information.« less

  20. [Electronic poison information management system].

    PubMed

    Kabata, Piotr; Waldman, Wojciech; Kaletha, Krystian; Sein Anand, Jacek

    2013-01-01

    We describe deployment of electronic toxicological information database in poison control center of Pomeranian Center of Toxicology. System was based on Google Apps technology, by Google Inc., using electronic, web-based forms and data tables. During first 6 months from system deployment, we used it to archive 1471 poisoning cases, prepare monthly poisoning reports and facilitate statistical analysis of data. Electronic database usage made Poison Center work much easier.

  1. 77 FR 65416 - Advisory Committee on the Electronic Records Archives (ACERA)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... Minutes ERA Program Update Business Priorities Presidential Directive on Records Management Online Public Access Discussions: Encouraging development of automated tools for electronic records management, impact of big data, and benchmarking Dated: October 24, 2012. Patrice Little Murray, Acting Committee...

  2. 76 FR 1173 - Draft Guidance for Industry on Electronic Source Documentation in Clinical Investigations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    ...] Draft Guidance for Industry on Electronic Source Documentation in Clinical Investigations; Availability... Documentation in Clinical Investigations.'' This document provides guidance to sponsors, contract research organizations (CROs), data management centers, and clinical investigators on capturing, using, and archiving...

  3. A case for automated tape in clinical imaging.

    PubMed

    Bookman, G; Baune, D

    1998-08-01

    Electronic archiving of radiology images over many years will require many terabytes of storage with a need for rapid retrieval of these images. As more large PACS installations are installed and implemented, a data crisis occurs. The ability to store this large amount of data using the traditional method of optical jukeboxes or online disk alone becomes an unworkable solution. The amount of floor space number of optical jukeboxes, and off-line shelf storage required to store the images becomes unmanageable. With the recent advances in tape and tape drives, the use of tape for long term storage of PACS data has become the preferred alternative. A PACS system consisting of a centrally managed system of RAID disk, software and at the heart of the system, tape, presents a solution that for the first time solves the problems of multi-modality high end PACS, non-DICOM image, electronic medical record and ADT data storage. This paper will examine the installation of the University of Utah, Department of Radiology PACS system and the integration of automated tape archive. The tape archive is also capable of storing data other than traditional PACS data. The implementation of an automated data archive to serve the many other needs of a large hospital will also be discussed. This will include the integration of a filmless cardiology department and the backup/archival needs of a traditional MIS department. The need for high bandwidth to tape with a large RAID cache will be examined and how with an interface to a RIS pre-fetch engine, tape can be a superior solution to optical platters or other archival solutions. The data management software will be discussed in detail. The performance and cost of RAID disk cache and automated tape compared to a solution that includes optical will be examined.

  4. The ISO Data Archive and Interoperability with Other Archives

    NASA Astrophysics Data System (ADS)

    Salama, Alberto; Arviset, Christophe; Hernández, José; Dowson, John; Osuna, Pedro

    The ESA's Infrared Space Observatory (ISO), an unprecedented observatory for infrared astronomy launched in November 1995, successfully made nearly 30,000 scientific observations in its 2.5-year mission. The ISO data can be retrieved from the ISO Data Archive, available at ISO Data Archive , and comprised of about 150,000 observations, including parallel and serendipity mode observations. A user-friendly Java interface permits queries to the database and data retrieval. The interface currently offers a wide variety of links to other archives, such as name resolution with NED and SIMBAD, access to electronic articles from ADS and CDS/VizieR, and access to IRAS data. In the past year development has been focused on improving the IDA interoperability with other astronomical archives, either by accessing other relevant archives or by providing direct access to the ISO data for external services. A mechanism of information transfer has been developed, allowing direct query to the IDA via a Java Server Page, returning quick look ISO images and relevant, observation-specific information embedded in an HTML page. This method has been used to link from the CDS/Vizier Data Centre and ADS, and work with IPAC to allow access to the ISO Archive from IRSA, including display capabilities of the observed sky regions onto other mission images, is in progress. Prospects for further links to and from other archives and databases are also addressed.

  5. Imaged Document Optical Correlation and Conversion System (IDOCCS)

    NASA Astrophysics Data System (ADS)

    Stalcup, Bruce W.; Dennis, Phillip W.; Dydyk, Robert B.

    1999-03-01

    Today, the paper document is fast becoming a thing of the past. With the rapid development of fast, inexpensive computing and storage devices, many government and private organizations are archiving their documents in electronic form (e.g., personnel records, medical records, patents, etc.). In addition, many organizations are converting their paper archives to electronic images, which are stored in a computer database. Because of this, there is a need to efficiently organize this data into comprehensive and accessible information resources. The Imaged Document Optical Correlation and Conversion System (IDOCCS) provides a total solution to the problem of managing and retrieving textual and graphic information from imaged document archives. At the heart of IDOCCS, optical correlation technology provides the search and retrieval capability of document images. The IDOCCS can be used to rapidly search for key words or phrases within the imaged document archives and can even determine the types of languages contained within a document. In addition, IDOCCS can automatically compare an input document with the archived database to determine if it is a duplicate, thereby reducing the overall resources required to maintain and access the document database. Embedded graphics on imaged pages can also be exploited, e.g., imaged documents containing an agency's seal or logo, or documents with a particular individual's signature block, can be singled out. With this dual capability, IDOCCS outperforms systems that rely on optical character recognition as a basis for indexing and storing only the textual content of documents for later retrieval.

  6. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    MedlinePlus

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  7. 76 FR 12144 - Advanced Optics Electronics, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Advanced Optics Electronics, Inc.; Order of... lack of current and accurate information concerning the securities of Advanced Optics Electronics, Inc... in Advanced Optics Electronics, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the...

  8. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  9. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  10. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  11. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  12. 78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.

  13. Diagnostic report acquisition unit for the Mayo/IBM PACS project

    NASA Astrophysics Data System (ADS)

    Brooks, Everett G.; Rothman, Melvyn L.

    1991-07-01

    The Mayo Clinic and IBM Rochester have jointly developed a picture archive and control system (PACS) for use with Mayo's MRI and Neuro-CT imaging modalities. One of the challenges of developing a useful PACS involves integrating the diagnostic reports with the electronic images so they can be displayed simultaneously. By the time a diagnostic report is generated for a particular case, its images have already been captured and archived by the PACS. To integrate the report with the images, the authors have developed an IBM Personal System/2 computer (PS/2) based diagnostic report acquisition unit (RAU). A typed copy of the report is transmitted via facsimile to the RAU where it is stacked electronically with other reports that have been sent previously but not yet processed. By processing these reports at the RAU, the information they contain is integrated with the image database and a copy of the report is archived electronically on an IBM Application System/400 computer (AS/400). When a user requests a set of images for viewing, the report is automatically integrated with the image data. By using a hot key, the user can toggle on/off the report on the display screen. This report describes process, hardware, and software employed to integrate the diagnostic report information into the PACS, including how the report images are captured, transmitted, and entered into the AS/400 database. Also described is how the archived reports and their associated medical images are located and merged for retrieval and display. The methods used to detect and process error conditions are also discussed.

  14. Databases and archiving for cryoEM

    PubMed Central

    Patwardhan, Ardan; Lawson, Catherine L.

    2017-01-01

    Cryo-EM in structural biology is currently served by three public archives – EMDB for 3DEM reconstructions, PDB for models built from 3DEM reconstructions and EMPIAR for the raw 2D image data used to obtain the 3DEM reconstructions. These archives play a vital role for both the structural community and the wider biological community in making the data accessible so that results may be reused, reassessed and integrated with other structural and bioinformatics resources. The important role of the archives is underpinned by the fact that many journals mandate the deposition of data to PDB and EMDB on publication. The field is currently undergoing transformative changes where on the one hand high-resolution structures are becoming a routine occurrence while on the other hand electron tomography is enabling the study of macromolecules in the cellular context. Concomitantly the archives are evolving to best serve their stakeholder communities. In this chapter we describe the current state of the archives, resources available for depositing, accessing, searching, visualising and validating data, on-going community-wide initiatives and opportunities and challenges for the future. PMID:27572735

  15. Design of real-time encryption module for secure data protection of wearable healthcare devices.

    PubMed

    Kim, Jungchae; Lee, Byuck Jin; Yoo, Sun K

    2013-01-01

    Wearable devices for biomedical instrumentation could generate the medical data and transmit to a repository on cloud service through wireless networks. In this process, the private medical data will be disclosed by man in the middle attack. Thus, the archived data for healthcare services would be protected by non-standardized security policy by healthcare service provider (HSP) because HIPAA only defines the security rules. In this paper, we adopted the Advanced Encryption Standard (AES) for security framework on wearable devices, so healthcare applications using this framework could support the confidentiality easily. The framework developed as dynamic loadable module targeted for lightweight microcontroller such as msp430 within embedded operating system. The performance was shown that the module can support the real-time encryption using electrocardiogram and photoplethysmogram. In this regard, the processing load for enabling security is distributed to wearable devices, and the customized data protection method could be composed by HSP for a trusted healthcare service.

  16. System Requirement Analyses for Ubiquitous Environment Management System

    NASA Astrophysics Data System (ADS)

    Lim, Sang Boem; Gil, Kyung Jun; Choe, Ho Rim; Eo, Yang Dam

    We are living in new stage of society. U-City introduces new paradigm that cannot be archived in traditional city to future city. Korea is one of the most active countries to construct U-City based on advances of IT technologies - especially based on high-speed network through out country [1]. Peoples are realizing ubiquitous service is key factor of success of U-City. Among the U-services, U-security service is one of the most important services. Nowadays we have to concern about traditional threat and also personal information. Since apartment complex is the most common residence type in Korea. We are developing security rules and system based on analyses of apartment complex and assert of apartment complex. Based on these analyses, we are developing apartment complex security using various technologies including home network system. We also will discuss basic home network security architecture.

  17. 36 CFR § 1222.26 - What are the general recordkeeping requirements for agency programs?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT CREATION AND MAINTENANCE OF... be created and maintained to document program policies, procedures, functions, activities, and... electronic records; (c) Related records series and systems; (d) The relationship between paper and electronic...

  18. Digital Libraries and the Problem of Purpose [and] On DigiPaper and the Dissemination of Electronic Documents [and] DFAS: The Distributed Finding Aid Search System [and] Best Practices for Digital Archiving: An Information Life Cycle Approach [and] Mapping and Converting Essential Federal Geographic Data Committee (FGDC) Metadata into MARC21 and Dublin Core: Towards an Alternative to the FGDC Clearinghouse [and] Evaluating Website Modifications at the National Library of Medicine through Search Log analysis.

    ERIC Educational Resources Information Center

    Levy, David M.; Huttenlocher, Dan; Moll, Angela; Smith, MacKenzie; Hodge, Gail M.; Chandler, Adam; Foley, Dan; Hafez, Alaaeldin M.; Redalen, Aaron; Miller, Naomi

    2000-01-01

    Includes six articles focusing on the purpose of digital public libraries; encoding electronic documents through compression techniques; a distributed finding aid server; digital archiving practices in the framework of information life cycle management; converting metadata into MARC format and Dublin Core formats; and evaluating Web sites through…

  19. Using a Java Web-based Graphical User Interface to access the SOHO Data Arch ive

    NASA Astrophysics Data System (ADS)

    Scholl, I.; Girard, Y.; Bykowski, A.

    This paper presents the architecture of a Java web-based graphical interface dedicated to the access of the SOHO Data archive. This application allows local and remote users to search in the SOHO data catalog and retrieve the SOHO data files from the archive. It has been developed at MEDOC (Multi-Experiment Data and Operations Centre), located at the Institut d'Astrophysique Spatiale (Orsay, France), which is one of the European Archives for the SOHO data. This development is part of a joint effort between ESA, NASA and IAS in order to implement long term archive systems for the SOHO data. The software architecture is built as a client-server application using Java language and SQL above a set of components such as an HTTP server, a JDBC gateway, a RDBMS server, a data server and a Web browser. Since HTML pages and CGI scripts are not powerful enough to allow user interaction during a multi-instrument catalog search, this type of requirement enforces the choice of Java as the main language. We also discuss performance issues, security problems and portability on different Web browsers and operating syste ms.

  20. Rnomads: An R Interface with the NOAA Operational Model Archive and Distribution System

    NASA Astrophysics Data System (ADS)

    Bowman, D. C.; Lees, J. M.

    2014-12-01

    The National Oceanic and Atmospheric Administration Operational Model Archive and Distribution System (NOMADS) facilitates rapid delivery of real time and archived environmental data sets from multiple agencies. These data are distributed free to the scientific community, industry, and the public. The rNOMADS package provides an interface between NOMADS and the R programming language. Like R itself, rNOMADS is open source and cross platform. It utilizes server-side functionality on the NOMADS system to subset model outputs for delivery to client R users. There are currently 57 real time and 10 archived models available through rNOMADS. Atmospheric models include the Global Forecast System and North American Mesoscale. Oceanic models include WAVEWATCH III and U. S. Navy Operational Global Ocean Model. rNOMADS has been downloaded 1700 times in the year since it was released. At the time of writing, it is being used for wind and solar power modeling, climate monitoring related to food security concerns, and storm surge/inundation calculations, among others. We introduce this new package and show how it can be used to extract data for infrasonic waveform modeling in the atmosphere.

  1. Privacy, confidentiality, and electronic medical records.

    PubMed Central

    Barrows, R C; Clayton, P D

    1996-01-01

    The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450

  2. The information security needs in radiological information systems-an insight on state hospitals of Iran, 2012.

    PubMed

    Farhadi, Akram; Ahmadi, Maryam

    2013-12-01

    Picture Archiving and Communications System (PACS) was originally developed for radiology services over 20 years ago to capture medical images electronically. Medical diagnosis methods are based on images such as clinical radiographs, ultrasounds, CT scans, MRIs, or other imaging modalities. Information obtained from these images is correlated with patient information. So with regards to the important role of PACS in hospitals, we aimed to evaluate the PACS and survey the information security needed in the Radiological Information system. First, we surveyed the different aspects of PACS that should be in any health organizations based on Department of Health standards and prepared checklists for assessing the PACS in different hospitals. Second, we surveyed the security controls that should be implemented in PACS. Checklists reliability is affirmed by professors of Tehran Science University. Then, the final data are inputted in SPSS software and analyzed. The results indicate that PACS in hospitals can transfer patient demographic information but they do not show route of information. These systems are not open source. They don't use XML-based standard and HL7 standard for exchanging the data. They do not use DS digital signature. They use passwords and the user can correct or change the medical information. PACS can detect alternation rendered. The survey of results demonstrates that PACS in all hospitals has the same features. These systems have the patient demographic data but they do not have suitable flexibility to interface network or taking reports. For the privacy of PACS in all hospitals, there were passwords for users and the system could show the changes that have been made; but there was no water making or digital signature for the users.

  3. 36 CFR 1260.2 - What definitions apply to the regulations in this part?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false What definitions apply to the regulations in this part? 1260.2 Section 1260.2 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION General Information § 1260.2 What definitions apply...

  4. 36 CFR 1260.2 - What definitions apply to the regulations in this part?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false What definitions apply to the regulations in this part? 1260.2 Section 1260.2 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION General Information § 1260.2 What definitions apply...

  5. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  6. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  7. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  8. 36 CFR 79.9 - Standards to determine when a repository possesses the capability to provide adequate long-term...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the particular collection on a long-term basis using professional museum and archival practices; and... security such as locking the items in a safe, vault or museum specimen cabinet, as appropriate; (vi... staff and any consultants who are responsible for managing and preserving the collection to be qualified...

  9. Develop security architecture for both in-house healthcare information systems and electronic patient record

    NASA Astrophysics Data System (ADS)

    Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.

    2003-05-01

    In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

  10. A Support Database System for Integrated System Health Management (ISHM)

    NASA Technical Reports Server (NTRS)

    Schmalzel, John; Figueroa, Jorge F.; Turowski, Mark; Morris, John

    2007-01-01

    The development, deployment, operation and maintenance of Integrated Systems Health Management (ISHM) applications require the storage and processing of tremendous amounts of low-level data. This data must be shared in a secure and cost-effective manner between developers, and processed within several heterogeneous architectures. Modern database technology allows this data to be organized efficiently, while ensuring the integrity and security of the data. The extensibility and interoperability of the current database technologies also allows for the creation of an associated support database system. A support database system provides additional capabilities by building applications on top of the database structure. These applications can then be used to support the various technologies in an ISHM architecture. This presentation and paper propose a detailed structure and application description for a support database system, called the Health Assessment Database System (HADS). The HADS provides a shared context for organizing and distributing data as well as a definition of the applications that provide the required data-driven support to ISHM. This approach provides another powerful tool for ISHM developers, while also enabling novel functionality. This functionality includes: automated firmware updating and deployment, algorithm development assistance and electronic datasheet generation. The architecture for the HADS has been developed as part of the ISHM toolset at Stennis Space Center for rocket engine testing. A detailed implementation has begun for the Methane Thruster Testbed Project (MTTP) in order to assist in developing health assessment and anomaly detection algorithms for ISHM. The structure of this implementation is shown in Figure 1. The database structure consists of three primary components: the system hierarchy model, the historical data archive and the firmware codebase. The system hierarchy model replicates the physical relationships between system elements to provide the logical context for the database. The historical data archive provides a common repository for sensor data that can be shared between developers and applications. The firmware codebase is used by the developer to organize the intelligent element firmware into atomic units which can be assembled into complete firmware for specific elements.

  11. The Archival View of Technology: Resources for the Scholar of the Future.

    ERIC Educational Resources Information Center

    Zeidberg, David S.

    1999-01-01

    Archivists need to apply traditional principles of records management to electronic documents if these records are to survive for research by future scholars. Additionally, archivists must ensure that the electronic records preserved remain accessible as hardware and software change over time. (Author/AEF)

  12. 77 FR 65913 - Privacy Act of 1974: Systems of Records.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-31

    ... performing clerical, stenographic, or data analysis functions, or by reproduction of records by electronic or... performing clerical, stenographic, or data analysis functions, or by reproduction of records by electronic or... Services (OGIS) National Archives and Records Administration, in connection with mediation of FOIA requests...

  13. Image dissemination and archiving.

    PubMed

    Robertson, Ian

    2007-08-01

    Images generated as part of the sonographic examination are an integral part of the medical record and must be retained according to local regulations. The standard medical image format, known as DICOM (Digital Imaging and COmmunications in Medicine) makes it possible for images from many different imaging modalities, including ultrasound, to be distributed via a standard internet network to distant viewing workstations and a central archive in an almost seamless fashion. The DICOM standard is a truly universal standard for the dissemination of medical images. When purchasing an ultrasound unit, the consumer should research the unit's capacity to generate images in a DICOM format, especially if one wishes interconnectivity with viewing workstations and an image archive that stores other medical images. PACS, an acronym for Picture Archive and Communication System refers to the infrastructure that links modalities, workstations, the image archive, and the medical record information system into an integrated system, allowing for efficient electronic distribution and storage of medical images and access to medical record data.

  14. 76 FR 41685 - Electronic Substitutions for Form SSA-538

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0027] RIN 0960-AH02 Electronic Substitutions for Form SSA-538 AGENCY: Social Security Administration. ACTION: Final rule with request for... children alleging disability or continuing disability under title XVI of the Social Security Act (Act...

  15. Picture archiving and communication system--Part one: Filmless radiology and distance radiology.

    PubMed

    De Backer, A I; Mortelé, K J; De Keulenaer, B L

    2004-01-01

    Picture archiving and communication system (PACS) is a collection of technologies used to carry out digital medical imaging. PACS is used to digitally acquire medical images from the various modalities, such as computed tomography (CT), magnetic resonance imaging (MRI), ultrasound, and digital projection radiography. The image data and pertinent information are transmitted to other and possibly remote locations over networks, where they may be displayed on computer workstations for soft copy viewing in multiple locations, thus permitting simultaneous consultations and almost instant reporting from radiologists at a distance. Data are secured and archived on digital media such as optical disks or tape, and may be automatically retrieved as necessary. Close integration with the hospital information system (HIS)--radiology information system (RIS) is critical for system functionality. Medical image management systems are maturing, providing access outside of the radiology department to images throughout the hospital via the Ethernet, at different hospitals, or from a home workstation if teleradiology has been implemented.

  16. 10 CFR 37.7 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regulations in this part may be sent as follows: (a) By mail addressed to: ATTN: Document Control Desk... Management Programs; or Director, Division of Security Policy, Office of Nuclear Security and Incident... electronic submission, for example, Electronic Information Exchange, or CD-ROM. Electronic submissions must...

  17. Security Management of Electronic Data Interchange

    DTIC Science & Technology

    1993-06-01

    48 6. Signatures by Tamper-Resistent Electronic seal .................................. 49 7. Resolution of Disputes...Trademark by RSA). Secure communication is not possible without any pi eu uous relationship between parties. Electronic mail may be sealed in a...public key certification. [Ref. 321 6. Signatures by Tamper-Resistent Electronic seal There is a separation between encryption and decryption in a public

  18. The Acquisition and Management of Electronic Resources: Can Use Justify Cost?

    ERIC Educational Resources Information Center

    Koehn, Shona L.; Hawamdeh, Suliman

    2010-01-01

    As library collections increasingly become digital, libraries are faced with many challenges regarding the acquisition and management of electronic resources. Some of these challenges include copyright and fair use, the first-sale doctrine, licensing versus ownership, digital preservation, long-term archiving, and, most important, the issue of…

  19. Making Technology Work for Scholarship: Investing in the Data.

    ERIC Educational Resources Information Center

    Hockey, Susan

    This paper examines issues related to how providers and consumers can make the best use of electronic information, focusing on the humanities. Topics include: new technology or old; electronic text and data formats; Standard Generalized Markup Language (SGML); text encoding initiative; encoded archival description (EAD); other applications of…

  20. Imaged document information location and extraction using an optical correlator

    NASA Astrophysics Data System (ADS)

    Stalcup, Bruce W.; Dennis, Phillip W.; Dydyk, Robert B.

    1999-12-01

    Today, the paper document is fast becoming a thing of the past. With the rapid development of fast, inexpensive computing and storage devices, many government and private organizations are archiving their documents in electronic form (e.g., personnel records, medical records, patents, etc.). Many of these organizations are converting their paper archives to electronic images, which are then stored in a computer database. Because of this, there is a need to efficiently organize this data into comprehensive and accessible information resources and provide for rapid access to the information contained within these imaged documents. To meet this need, Litton PRC and Litton Data Systems Division are developing a system, the Imaged Document Optical Correlation and Conversion System (IDOCCS), to provide a total solution to the problem of managing and retrieving textual and graphic information from imaged document archives. At the heart of IDOCCS, optical correlation technology provide a means for the search and retrieval of information from imaged documents. IDOCCS can be used to rapidly search for key words or phrases within the imaged document archives and has the potential to determine the types of languages contained within a document. In addition, IDOCCS can automatically compare an input document with the archived database to determine if it is a duplicate, thereby reducing the overall resources required to maintain and access the document database. Embedded graphics on imaged pages can also be exploited, e.g., imaged documents containing an agency's seal or logo can be singled out. In this paper, we present a description of IDOCCS as well as preliminary performance results and theoretical projections.

  1. 42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... prescribed in this subpart, all the forms shall be submitted with his or her name and social security account... miner identification document containing the miner's name, address, social security number and place of... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer...

  2. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...

  3. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...

  4. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...

  5. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    PubMed

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  6. 20 CFR 416.1513 - Mandatory use of electronic services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Mandatory use of electronic services. 416.1513 Section 416.1513 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Representation of Parties § 416.1513 Mandatory use of electronic...

  7. 20 CFR 416.1513 - Mandatory use of electronic services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Mandatory use of electronic services. 416.1513 Section 416.1513 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Representation of Parties § 416.1513 Mandatory use of electronic...

  8. S2O - A software tool for integrating research data from general purpose statistic software into electronic data capture systems.

    PubMed

    Bruland, Philipp; Dugas, Martin

    2017-01-07

    Data capture for clinical registries or pilot studies is often performed in spreadsheet-based applications like Microsoft Excel or IBM SPSS. Usually, data is transferred into statistic software, such as SAS, R or IBM SPSS Statistics, for analyses afterwards. Spreadsheet-based solutions suffer from several drawbacks: It is generally not possible to ensure a sufficient right and role management; it is not traced who has changed data when and why. Therefore, such systems are not able to comply with regulatory requirements for electronic data capture in clinical trials. In contrast, Electronic Data Capture (EDC) software enables a reliable, secure and auditable collection of data. In this regard, most EDC vendors support the CDISC ODM standard to define, communicate and archive clinical trial meta- and patient data. Advantages of EDC systems are support for multi-user and multicenter clinical trials as well as auditable data. Migration from spreadsheet based data collection to EDC systems is labor-intensive and time-consuming at present. Hence, the objectives of this research work are to develop a mapping model and implement a converter between the IBM SPSS and CDISC ODM standard and to evaluate this approach regarding syntactic and semantic correctness. A mapping model between IBM SPSS and CDISC ODM data structures was developed. SPSS variables and patient values can be mapped and converted into ODM. Statistical and display attributes from SPSS are not corresponding to any ODM elements; study related ODM elements are not available in SPSS. The S2O converting tool was implemented as command-line-tool using the SPSS internal Java plugin. Syntactic and semantic correctness was validated with different ODM tools and reverse transformation from ODM into SPSS format. Clinical data values were also successfully transformed into the ODM structure. Transformation between the spreadsheet format IBM SPSS and the ODM standard for definition and exchange of trial data is feasible. S2O facilitates migration from Excel- or SPSS-based data collections towards reliable EDC systems. Thereby, advantages of EDC systems like reliable software architecture for secure and traceable data collection and particularly compliance with regulatory requirements are achievable.

  9. How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.

    PubMed

    Stites, Mark; Pianykh, Oleg S

    2016-04-01

    Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.

  10. 36 CFR § 1260.2 - What definitions apply to the regulations in this part?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true What definitions apply to the regulations in this part? § 1260.2 Section § 1260.2 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION General Information § 1260.2 What definitions...

  11. Social Media Use of Cooperative Extension Family Economics Educators: Online Survey Results and Implications

    ERIC Educational Resources Information Center

    O'Neill, Barbara; Zumwalt, Andrew; Bechman, Janet

    2011-01-01

    This article describes results of an online survey conducted by the eXtension Financial Security for All (FSA) Community of Practice (CoP) to determine the social media capacity and activity of its members. The survey was conducted to inform two subsequent FSA CoP programs: an archived webinar on social media programs and impact evaluation methods…

  12. Military Interoperable Digital Hospital Testbed (MIDHT) Phase II

    DTIC Science & Technology

    2011-07-01

    personal health records has been limited, resulting in a small sample size to date. Additional providers and a new disease condition ( gestational diabetes ...Syndrome Picture Archive and Communications System User Satisfaction Gestational Diabetes 16. SECURITY CLASSIFICATION OF: 17...Consumer Informatics in the Chronic Care Model: Metabolic Syndrome and Gestational Diabetes in a Rural Setting. This arm focuses on finding innovative

  13. U.S. Strategic Nuclear Forces: Background, Developments, and Issues

    DTIC Science & Technology

    2013-10-22

    32 Safety, Security, and Management ...by Amy F. Woolf. 2 Natural Resources Defense Council. Table of U.S. Strategic Offensive Force Loadings. Archive of Nuclear Data. http://www.nrdc.org...12000 14000 16000 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 Year N um be r Launchers Warheads Source: Natural Resources Defense Council

  14. Expanding the PACS archive to support clinical review, research, and education missions

    NASA Astrophysics Data System (ADS)

    Honeyman-Buck, Janice C.; Frost, Meryll M.; Drane, Walter E.

    1999-07-01

    Designing an image archive and retrieval system that supports multiple users with many different requirements and patterns of use without compromising the performance and functionality required by diagnostic radiology is an intellectual and technical challenge. A diagnostic archive, optimized for performance when retrieving diagnostic images for radiologists needed to be expanded to support a growing clinical review network, the University of Florida Brain Institute's demands for neuro-imaging, Biomedical Engineering's imaging sciences, and an electronic teaching file. Each of the groups presented a different set of problems for the designers of the system. In addition, the radiologists did not want to see nay loss of performance as new users were added.

  15. Opening the Landsat Archive

    USGS Publications Warehouse

    ,

    2008-01-01

    The USGS Landsat archive holds an unequaled 36-year record of the Earth's surface that is invaluable to climate change studies, forest and resource management activities, and emergency response operations. An aggressive effort is taking place to provide all Landsat imagery [scenes currently held in the USGS Earth Resources Observation and Science (EROS) Center archive, as well as newly acquired scenes daily] free of charge to users with electronic access via the Web by the end of December 2008. The entire Landsat 7 Enhanced Thematic Mapper Plus (ETM+) archive acquired since 1999 and any newly acquired Landsat 7 ETM+ images that have less than 40 percent cloud cover are currently available for download. When this endeavor is complete all Landsat 1-5 data will also be available for download. This includes Landsat 1-5 Multispectral Scanner (MSS) scenes, as well as Landsat 4 and 5 Thematic Mapper (TM) scenes.

  16. 42 CFR 37.60 - Submitting required chest radiograph classification and miner identification documents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... software and format specified by NIOSH either using portable electronic media, or a secure electronic file... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...

  17. 42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...

  18. Career Profiles- Drawing Controller Kelvin Siu- Operations Engineering Branch

    NASA Image and Video Library

    2016-06-23

    The Drawing Control group provides project support in the form of drafting services, drawing version management, and drawing archival. The office provides drafting services through creation of new drawings and sketches, or integration of red-lines. They maintain physical and electronic storage of flight vehicle drawings, and archive all sketches for the AFRC community. This office is the controlling organization for all Armstrong drawing formats and maintains the drawing numbering system for flight vehicle projects.

  19. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    NASA Astrophysics Data System (ADS)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  20. Secure content objects

    DOEpatents

    Evans, William D [Cupertino, CA

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  1. Local Places, Global Connections: Libraries in the Digital Age. What's Going On Series.

    ERIC Educational Resources Information Center

    Benton Foundation, Washington, DC.

    Libraries have long been pivotal community institutions--public spaces where people can come together to learn, reflect, and interact. Today, information is rapidly spreading beyond books and journals to digital government archives, business databases, electronic sound and image collections, and the flow of electronic impulses over computer…

  2. Electronic Records Management and Archives in International Organizations: A RAMP Study with Guidelines.

    ERIC Educational Resources Information Center

    Dollar, Charles M.

    This study is a review of trends in information-handling technology and significant developments which are changing or will change the general environment within which archivists and records managers in international organizations will have to work. Trends in microelectronics, electronic storage, software, data transmission, computer architecture,…

  3. The NAS Computational Aerosciences Archive

    NASA Technical Reports Server (NTRS)

    Miceli, Kristina D.; Globus, Al; Lasinski, T. A. (Technical Monitor)

    1995-01-01

    In order to further the state-of-the-art in computational aerosciences (CAS) technology, researchers must be able to gather and understand existing work in the field. One aspect of this information gathering is studying published work available in scientific journals and conference proceedings. However, current scientific publications are very limited in the type and amount of information that they can disseminate. Information is typically restricted to text, a few images, and a bibliography list. Additional information that might be useful to the researcher, such as additional visual results, referenced papers, and datasets, are not available. New forms of electronic publication, such as the World Wide Web (WWW), limit publication size only by available disk space and data transmission bandwidth, both of which are improving rapidly. The Numerical Aerodynamic Simulation (NAS) Systems Division at NASA Ames Research Center is in the process of creating an archive of CAS information on the WWW. This archive will be based on the large amount of information produced by researchers associated with the NAS facility. The archive will contain technical summaries and reports of research performed on NAS supercomputers, visual results (images, animations, visualization system scripts), datasets, and any other supporting meta-information. This information will be available via the WWW through the NAS homepage, located at http://www.nas.nasa.gov/, fully indexed for searching. The main components of the archive are technical summaries and reports, visual results, and datasets. Technical summaries are gathered every year by researchers who have been allotted resources on NAS supercomputers. These summaries, together with supporting visual results and references, are browsable by interested researchers. Referenced papers made available by researchers can be accessed through hypertext links. Technical reports are in-depth accounts of tools and applications research projects performed by NAS staff members and collaborators. Visual results, which may be available in the form of images, animations, and/or visualization scripts, are generated by researchers with respect to a certain research project, depicting dataset features that were determined important by the investigating researcher. For example, script files for visualization systems (e.g. FAST, PLOT3D, AVS) are provided to create visualizations on the user's local workstation to elucidate the key points of the numerical study. Users can then interact with the data starting where the investigator left off. Datasets are intended to give researchers an opportunity to understand previous work, 'mine' solutions for new information (for example, have you ever read a paper thinking "I wonder what the helicity density looks like?"), compare new techniques with older results, collaborate with remote colleagues, and perform validation. Supporting meta-information associated with the research projects is also important to provide additional context for research projects. This may include information such as the software used in the simulation (e.g. grid generators, flow solvers, visualization). In addition to serving the CAS research community, the information archive will also be helpful to students, visualization system developers and researchers, and management. Students (of any age) can use the data to study fluid dynamics, compare results from different flow solvers, learn about meshing techniques, etc., leading to better informed individuals. For these users it is particularly important that visualization be integrated into dataset archives. Visualization researchers can use dataset archives to test algorithms and techniques, leading to better visualization systems, Management can use the data to figure what is really going on behind the viewgraphs. All users will benefit from fast, easy, and convenient access to CFD datasets. The CAS information archive hopes to serve as a useful resource to those interested in computational sciences. At present, only information that may be distributed internationally is made available via the archive. Studies are underway to determine security requirements and solutions to make additional information available. By providing access to the archive via the WWW, the process of information gathering can be more productive and fruitful due to ease of access and ability to manage many different types of information. As the archive grows, additional resources from outside NAS will be added, providing a dynamic source of research results.

  4. Operation of the Australian Store.Synchrotron for macromolecular crystallography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Grischa R.; Aragão, David; Mudie, Nathan J.

    2014-10-01

    The Store.Synchrotron service, a fully functional, cloud computing-based solution to raw X-ray data archiving and dissemination at the Australian Synchrotron, is described. The Store.Synchrotron service, a fully functional, cloud computing-based solution to raw X-ray data archiving and dissemination at the Australian Synchrotron, is described. The service automatically receives and archives raw diffraction data, related metadata and preliminary results of automated data-processing workflows. Data are able to be shared with collaborators and opened to the public. In the nine months since its deployment in August 2013, the service has handled over 22.4 TB of raw data (∼1.7 million diffraction images). Severalmore » real examples from the Australian crystallographic community are described that illustrate the advantages of the approach, which include real-time online data access and fully redundant, secure storage. Discoveries in biological sciences increasingly require multidisciplinary approaches. With this in mind, Store.Synchrotron has been developed as a component within a greater service that can combine data from other instruments at the Australian Synchrotron, as well as instruments at the Australian neutron source ANSTO. It is therefore envisaged that this will serve as a model implementation of raw data archiving and dissemination within the structural biology research community.« less

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  6. Information Management: The Challenges of Managing Electronic Records. Testimony Before the Subcommittee on Information Policy, Census and National Archives, Committee on Oversight and Government Reform, House of Representatives. GAO-10-838T

    ERIC Educational Resources Information Center

    Melvin, Valerie C.

    2010-01-01

    Federal agencies are increasingly using electronic means to create, exchange, and store information, and in doing so, they frequently create federal records: that is, information, in whatever form, that documents government functions, activities, decisions, and other important transactions. As the volume of electronic information grows, so does…

  7. Managing the Security of Nursing Data in the Electronic Health Record

    PubMed Central

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-01-01

    Background: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. Methods: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. Results: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Conclusions: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. PMID:25870490

  8. Managing the security of nursing data in the electronic health record.

    PubMed

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-02-01

    The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research.

  9. Security Implications of Electronic Commerce: A Survey of Consumers and Businesses.

    ERIC Educational Resources Information Center

    Furnell, S. M.; Karweni, T.

    1999-01-01

    Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…

  10. EFFICACY OF THE 20-WEEK CIRCLE OF SECURITY INTERVENTION: CHANGES IN CAREGIVER REFLECTIVE FUNCTIONING, REPRESENTATIONS, AND CHILD ATTACHMENT IN AN AUSTRALIAN CLINICAL SAMPLE.

    PubMed

    Huber, Anna; McMahon, Catherine A; Sweller, Naomi

    2015-01-01

    Circle of Security is an attachment theory based intervention that aims to promote secure parent-child attachment relationships. Despite extensive uptake of the approach, there is limited empirical evidence regarding efficacy. The current study examined whether participation in the 20-week Circle of Security intervention resulted in positive caregiver-child relationship change in four domains: caregiver reflective functioning; caregiver representations of the child and the relationship with the child; child attachment security, and attachment disorganization. Archived pre- and postintervention data were analyzed from 83 clinically referred caregiver-child dyads (child age: 13-88 months) who completed the Circle of Security intervention in sequential cohorts and gave permission for their data to be included in the study. Caregivers completed the Circle of Security Interview, and dyads were filmed in the Strange Situation Procedure before and after the intervention. Results supported all four hypotheses: Caregiver reflective functioning, caregiving representations, and level of child attachment security increased after the intervention, and level of attachment disorganization decreased for those with high baseline levels. Those whose scores were least optimal prior to intervention showed the greatest change in all domains. This study adds to the evidence suggesting that the 20-week Circle of Security intervention results in significant relationship improvements for caregivers and their children. © 2015 Michigan Association for Infant Mental Health.

  11. Electronic data capture and DICOM data management in multi-center clinical trials

    NASA Astrophysics Data System (ADS)

    Haak, Daniel; Page, Charles-E.; Deserno, Thomas M.

    2016-03-01

    Providing eligibility, efficacy and security evaluation by quantitative and qualitative disease findings, medical imaging has become increasingly important in clinical trials. Here, subject's data is today captured in electronic case reports forms (eCRFs), which are offered by electronic data capture (EDC) systems. However, integration of subject's medical image data into eCRFs is insufficiently supported. Neither integration of subject's digital imaging and communications in medicine (DICOM) data, nor communication with picture archiving and communication systems (PACS), is possible. This aggravates the workflow of the study personnel, in special regarding studies with distributed data capture in multiple sites. Hence, in this work, a system architecture is presented, which connects an EDC system, a PACS and a DICOM viewer via the web access to DICOM objects (WADO) protocol. The architecture is implemented using the open source tools OpenClinica, DCM4CHEE and Weasis. The eCRF forms the primary endpoint for the study personnel, where subject's image data is stored and retrieved. Background communication with the PACS is completely hidden for the users. Data privacy and consistency is ensured by automatic de-identification and re-labelling of DICOM data with context information (e.g. study and subject identifiers), respectively. The system is exemplarily demonstrated in a clinical trial, where computer tomography (CT) data is de-centrally captured from the subjects and centrally read by a chief radiologists to decide on inclusion of the subjects in the trial. Errors, latency and costs in the EDC workflow are reduced, while, a research database is implicitly built up in the background.

  12. A joint signal processing and cryptographic approach to multimedia encryption.

    PubMed

    Mao, Yinian; Wu, Min

    2006-07-01

    In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search, and retrieval. These delegate services have brought new challenges to the protection of multimedia content confidentiality. This paper discusses the importance and feasibility of applying a joint signal processing and cryptographic approach to multimedia encryption, in order to address the access control issues unique to multimedia applications. We propose two atomic encryption operations that can preserve standard compliance and are friendly to delegate processing. Quantitative analysis for these operations is presented to demonstrate that a good tradeoff can be made between security and bitrate overhead. In assisting the design and evaluation of media security systems, we also propose a set of multimedia-oriented security scores to quantify the security against approximation attacks and to complement the existing notion of generic data security. Using video as an example, we present a systematic study on how to strategically integrate different atomic operations to build a video encryption system. The resulting system can provide superior performance over both generic encryption and its simple adaptation to video in terms of a joint consideration of security, bitrate overhead, and friendliness to delegate processing.

  13. From secure dependency to attachment: Mary Ainsworth's integration of Blatz's security theory into Bowlby's attachment theory.

    PubMed

    van Rosmalen, Lenny; van der Horst, Frank C P; van der Veer, René

    2016-02-01

    John Bowlby is generally regarded as the founder of attachment theory, with the help of Mary Ainsworth. Through her Uganda and Baltimore studies Ainsworth provided empirical evidence for attachment theory, and she contributed the notion of the secure base and exploratory behavior, the Strange Situation Procedure and its classification system, and the notion of maternal sensitivity. On closer scrutiny, many of these contributions appear to be heavily influenced by William Blatz and his security theory. Even though Blatz's influence on Ainsworth has been generally acknowledged, this article, partly based on understudied correspondence from several personal archives, is the first to show which specific parts of attachment theory can be traced back directly to Blatz and his security theory. When Ainsworth started working with Bowlby in the 1950s, around the time he turned to evolutionary theory for an explanation of his findings, she integrated much of Blatzian security theory into Bowlby's theory in the making and used her theoretical and practical experience to enrich attachment theory. Even though Blatz is hardly mentioned nowadays, several of his ideas live on in attachment theory. (c) 2016 APA, all rights reserved).

  14. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  15. Science information systems: Archive, access, and retrieval

    NASA Technical Reports Server (NTRS)

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  16. Extending the role of a healthcare digital library environment to support orthopaedic research.

    PubMed

    Miles-Board, Timothy; Carr, Leslie; Wills, Gary; Power, Guillermo; Bailey, Christopher; Hall, Wendy; Stenning, Matthew; Grange, Simon

    2006-06-01

    A digital archive, together with its users and its contents, does not exist in isolation; there is a cycle of activities which provides the context for the archive's existence. In arguing for the broadening of the traditional view of digital libraries as merely collections towards the processes of collecting and deploying, we have developed an extend ed digital library environment for orthopaedic surgeons which bridges the gap between the undertaking of experimental work and the dissemination of its results through electronic publication.

  17. The SciELO Brazilian Scientific Journal Gateway and Open Archives; Usability of Hypermedia Educational e-Books; Building Upon the MyLibrary Concept To Better Meet the Information Needs of College Students; Open Archives and UK Institutions; The Utah Digital Newspapers Project; Examples of Practical Digital Libraries.

    ERIC Educational Resources Information Center

    Marcondes, Carlos Henrique; Sayao, Luis Fernando; Diaz, Paloma; Gibbons, Susan; Pinfield, Stephen; Kenning, Arlitsch; Edge, Karen; Yapp, L.; Witten, Ian H.

    2003-01-01

    Includes six articles that focus on practical uses of technologies developed from digital library research in the areas of education and scholarship reflecting the international impact of digital library research initiatives. Includes the Scientific Electronic Library Online (SciELO) (Brazil); the National Science Foundation (NSF) (US); the Joint…

  18. A Scalable, Open Source Platform for Data Processing, Archiving and Dissemination

    DTIC Science & Technology

    2016-01-01

    Object Oriented Data Technology (OODT) big data toolkit developed by NASA and the Work-flow INstance Generation and Selection (WINGS) scientific work...to several challenge big data problems and demonstrated the utility of OODT-WINGS in addressing them. Specific demonstrated analyses address i...source software, Apache, Object Oriented Data Technology, OODT, semantic work-flows, WINGS, big data , work- flow management 16. SECURITY CLASSIFICATION OF

  19. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.

    PubMed

    Yang, Che-Ming; Lin, Herng-Ching; Chang, Polun; Jian, Wen-Shan

    2006-06-01

    The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world including Health Insurance Portability and Accountability Act (HIPAA) of the U.S. The trend of a centralized bill that focuses on managing computerized health information is the part that needs our further attention. Under the sponsor of Taiwan's Department of Health (DOH), our expert panel drafted the "Medical Information Security and Privacy Protection Guidelines", which identifies nine principles and entails 12 articles, in the hope that medical organizations will have an effective reference in how to manage their medical information in a confidential and secured fashion especially in electronic transactions.

  20. Security of electronic mental health communication and record-keeping in the digital age.

    PubMed

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.

  1. NASA ARCH- A FILE ARCHIVAL SYSTEM FOR THE DEC VAX

    NASA Technical Reports Server (NTRS)

    Scott, P. J.

    1994-01-01

    The function of the NASA ARCH system is to provide a permanent storage area for files that are infrequently accessed. The NASA ARCH routines were designed to provide a simple mechanism by which users can easily store and retrieve files. The user treats NASA ARCH as the interface to a black box where files are stored. There are only five NASA ARCH user commands, even though NASA ARCH employs standard VMS directives and the VAX BACKUP utility. Special care is taken to provide the security needed to insure file integrity over a period of years. The archived files may exist in any of three storage areas: a temporary buffer, the main buffer, and a magnetic tape library. When the main buffer fills up, it is transferred to permanent magnetic tape storage and deleted from disk. Files may be restored from any of the three storage areas. A single file, multiple files, or entire directories can be stored and retrieved. archived entities hold the same name, extension, version number, and VMS file protection scheme as they had in the user's account prior to archival. NASA ARCH is capable of handling up to 7 directory levels. Wildcards are supported. User commands include TEMPCOPY, DISKCOPY, DELETE, RESTORE, and DIRECTORY. The DIRECTORY command searches a directory of savesets covering all three archival areas, listing matches according to area, date, filename, or other criteria supplied by the user. The system manager commands include 1) ARCHIVE- to transfer the main buffer to duplicate magnetic tapes, 2) REPORTto determine when the main buffer is full enough to archive, 3) INCREMENT- to back up the partially filled main buffer, and 4) FULLBACKUP- to back up the entire main buffer. On-line help files are provided for all NASA ARCH commands. NASA ARCH is written in DEC VAX DCL for interactive execution and has been implemented on a DEC VAX computer operating under VMS 4.X. This program was developed in 1985.

  2. One-year clinical experience with a fully digitized nuclear medicine department: organizational and economical aspects

    NASA Astrophysics Data System (ADS)

    Anema, P. C.; de Graaf, C. N.; Wilmink, J. B.; Hall, David R.; Hoekstra, A. G.; van Rijk, P. P.; Van Isselt, J. W.; Viergever, Max A.

    1991-07-01

    At the department of nuclear medicine of the University Hospital Utrecht a single-modality PACS has been operational since mid-1990. After one year of operation the functionality, the organizational and economical consequences, and the acceptability of the PACS were evaluated. The functional aspects reviewed were: viewing facilities, patient data management, connectivity, reporting facilities, archiving, privacy, and security. It was concluded that the improved quality of diagnostic viewing and the potential integration with diagnosis, reporting, and archiving are highly appreciated. The many problems that have occurred during the transition period, however, greatly influence the appreciation and acceptability of the PACS. Overall, it is felt that in the long term there will be a positive effect on the quality and efficiency of the work.

  3. The Heinz Electronic Library Interactive Online System (HELIOS): Building a Digital Archive Using Imaging, OCR, and Natural Language Processing Technologies.

    ERIC Educational Resources Information Center

    Galloway, Edward A.; Michalek, Gabrielle V.

    1995-01-01

    Discusses the conversion project of the congressional papers of Senator John Heinz into digital format and the provision of electronic access to these papers by Carnegie Mellon University. Topics include collection background, project team structure, document processing, scanning, use of optical character recognition software, verification…

  4. Uniforming information management in Finnish Social Welfare.

    PubMed

    Laaksonen, Maarit; Kärki, Jarmo; Ailio, Erja

    2012-01-01

    This paper describes the phases and methods used in the National project for IT in Social Services in Finland (Tikesos). The main goals of Tikesos were to unify the client information systems in social services, to develop electronic documentation and to produce specifications for nationally organized electronic archive. The method of Enterprise Architecture was largely used in the project.

  5. 36 CFR 1233.18 - What reference procedures are used in NARA Federal Records Centers?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... designated by that agency and NARA, or their electronic equivalents. (c) For civilian personnel records... (electronic equivalent of the SF 180). Access to eMilrecs and additional information is available on line at... available on line at: http://www.archives.gov/veterans/evetrecs. (3) Members of the public and non...

  6. 36 CFR 1233.18 - What reference procedures are used in NARA Federal Records Centers?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... designated by that agency and NARA, or their electronic equivalents. (c) For civilian personnel records... (electronic equivalent of the SF 180). Access to eMilrecs and additional information is available on line at... available on line at: http://www.archives.gov/veterans/evetrecs. (3) Members of the public and non...

  7. 36 CFR 1233.18 - What reference procedures are used in NARA Federal Records Centers?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... designated by that agency and NARA, or their electronic equivalents. (c) For civilian personnel records... (electronic equivalent of the SF 180). Access to eMilrecs and additional information is available on line at... available on line at: http://www.archives.gov/veterans/evetrecs. (3) Members of the public and non...

  8. 36 CFR 1233.18 - What reference procedures are used in NARA Federal Records Centers?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... designated by that agency and NARA, or their electronic equivalents. (c) For civilian personnel records... (electronic equivalent of the SF 180). Access to eMilrecs and additional information is available on line at... available on line at: http://www.archives.gov/veterans/evetrecs. (3) Members of the public and non...

  9. 19 CFR 103.31a - Advance electronic information for air, truck, and rail cargo; Importer Security Filing...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Advance electronic information for air, truck, and rail cargo; Importer Security Filing information for vessel cargo. 103.31a Section 103.31a Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AVAILABILITY OF INFORMATION Other Information...

  10. Operation of the Australian Store.Synchrotron for macromolecular crystallography

    PubMed Central

    Meyer, Grischa R.; Aragão, David; Mudie, Nathan J.; Caradoc-Davies, Tom T.; McGowan, Sheena; Bertling, Philip J.; Groenewegen, David; Quenette, Stevan M.; Bond, Charles S.; Buckle, Ashley M.; Androulakis, Steve

    2014-01-01

    The Store.Synchrotron service, a fully functional, cloud computing-based solution to raw X-ray data archiving and dissemination at the Australian Synchrotron, is described. The service automatically receives and archives raw diffraction data, related metadata and preliminary results of automated data-processing workflows. Data are able to be shared with collaborators and opened to the public. In the nine months since its deployment in August 2013, the service has handled over 22.4 TB of raw data (∼1.7 million diffraction images). Several real examples from the Australian crystallographic community are described that illustrate the advantages of the approach, which include real-time online data access and fully redundant, secure storage. Discoveries in biological sciences increasingly require multidisciplinary approaches. With this in mind, Store.Synchrotron has been developed as a component within a greater service that can combine data from other instruments at the Australian Synchrotron, as well as instruments at the Australian neutron source ANSTO. It is therefore envisaged that this will serve as a model implementation of raw data archiving and dissemination within the structural biology research community. PMID:25286837

  11. Operation of the Australian Store.Synchrotron for macromolecular crystallography.

    PubMed

    Meyer, Grischa R; Aragão, David; Mudie, Nathan J; Caradoc-Davies, Tom T; McGowan, Sheena; Bertling, Philip J; Groenewegen, David; Quenette, Stevan M; Bond, Charles S; Buckle, Ashley M; Androulakis, Steve

    2014-10-01

    The Store.Synchrotron service, a fully functional, cloud computing-based solution to raw X-ray data archiving and dissemination at the Australian Synchrotron, is described. The service automatically receives and archives raw diffraction data, related metadata and preliminary results of automated data-processing workflows. Data are able to be shared with collaborators and opened to the public. In the nine months since its deployment in August 2013, the service has handled over 22.4 TB of raw data (∼1.7 million diffraction images). Several real examples from the Australian crystallographic community are described that illustrate the advantages of the approach, which include real-time online data access and fully redundant, secure storage. Discoveries in biological sciences increasingly require multidisciplinary approaches. With this in mind, Store.Synchrotron has been developed as a component within a greater service that can combine data from other instruments at the Australian Synchrotron, as well as instruments at the Australian neutron source ANSTO. It is therefore envisaged that this will serve as a model implementation of raw data archiving and dissemination within the structural biology research community.

  12. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  13. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164..., implementation specifications, and requirements of this subpart with respect to electronic protected health...

  14. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... specifications, and requirements of this subpart with respect to electronic protected health information. ...

  15. 21 CFR 1305.22 - Procedure for filling electronic orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to the original order and archived. (h) Registered procurement officers of the Defense Supply Center of the Defense Logistics Agency may order controlled substances for delivery to armed services...

  16. 21 CFR 1305.22 - Procedure for filling electronic orders.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to the original order and archived. (h) Registered procurement officers of the Defense Supply Center of the Defense Logistics Agency may order controlled substances for delivery to armed services...

  17. 21 CFR 1305.22 - Procedure for filling electronic orders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... to the original order and archived. (h) Registered procurement officers of the Defense Supply Center of the Defense Logistics Agency may order controlled substances for delivery to armed services...

  18. 21 CFR 1305.22 - Procedure for filling electronic orders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to the original order and archived. (h) Registered procurement officers of the Defense Supply Center of the Defense Logistics Agency may order controlled substances for delivery to armed services...

  19. 21 CFR 1305.22 - Procedure for filling electronic orders.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to the original order and archived. (h) Registered procurement officers of the Defense Supply Center of the Defense Logistics Agency may order controlled substances for delivery to armed services...

  20. Archiving Microgravity Flight Data and Samples

    NASA Technical Reports Server (NTRS)

    1996-01-01

    To obtain help in evaluating its current strategy for archiving data and samples obtained in microgravity research, NASA's Microgravity Science and Applications Division (MSAD) asked the Space Studies Board's Committee on Microgravity Research for guidance on the following questions: What data should be archived and where should it be kept? In what form should the data be maintained (electronic files, photographs, hard copy, samples)? What should the general format of the database be? To what extent should it be universally accessible and through what mechanisms? Should there be a period of time for which principal investigators have proprietary access? If so, how long should proprietary data be stored? What provisions should be made for data obtained from ground-based experiments? What should the deadline be for investigators placing their data in the archive? How long should data be saved? How long should data be easily accessible? As a prelude to making recommendations for optimum selection and storage of microgravity data and samples, the committee in this report briefly describes NASA's past archiving practices and outlines MSAD's current archiving strategy. Although the committee found that only a limited number of experiments have thus far been archived, it concluded that the general archiving strategy, characterized by MSAD as minimalist, appears viable. A central focus of attention is the Experiment Data Management Plan (EDMP), MSAD's recently instituted data management and archiving framework for flight experiments. Many of the report's recommendations are aimed at enhancing the effectiveness of the EDMP approach, which the committee regards as an appropriate data management method for MSAD. Other recommendations provide guidance on broader issues related to the questions listed above. This report does not address statutory or regulatory records retention requirements.

  1. [Italian national register of low etiological fraction occupational cancer pursuant to art. 244 of legislative decree n. 81/2008].

    PubMed

    Massari, S; Ippoliti, M; Menegozzo, S; Forastiere, F; Crosignani, P

    2011-01-01

    Legislative decree No. 81/2008 in the article n. 244 states that ISPESL, now INAIL, realizes a register of occupational cancers with low etiological fraction by means of a data collection method based exclusively on voluntary reports by GPs, healthcare and social security agencies (ReNaLOC) and a surveillance cancer monitoring system (OCCAM) based on linkage of routinely available data (cancer registries, hospital discharge records, Italian Social Security archives). ReNaLOC has produced a partial picture of the situation, it includes 1.584 cases as of June 2011. With OCCAM many situations of known risks were identified and others are worthy to be deepen.

  2. A cryptologic based trust center for medical images.

    PubMed

    Wong, S T

    1996-01-01

    To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.

  3. A cryptologic based trust center for medical images.

    PubMed Central

    Wong, S T

    1996-01-01

    OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. MEASUREMENTS: The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. RESULTS: The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. CONCLUSION: Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment. PMID:8930857

  4. Method and device for detecting impact events on a security barrier which includes a hollow rebar allowing insertion and removal of an optical fiber

    DOEpatents

    Pies, Ross E.

    2016-03-29

    A method and device for the detection of impact events on a security barrier. A hollow rebar is farmed within a security barrier, whereby the hollow rebar is completely surrounded by the security barrier. An optical fiber passes through the interior of the hollow rebar. An optical transmitter and an optical receiver are both optically connected to the optical fiber and connected to optical electronics. The optical electronics are configured to provide notification upon the detection of an impact event at the security barrier based on the detection of disturbances within the optical fiber.

  5. Development of CPR security using impact analysis.

    PubMed Central

    Salazar-Kish, J.; Tate, D.; Hall, P. D.; Homa, K.

    2000-01-01

    The HIPAA regulations will require that institutions ensure the prevention of unauthorized access to electronically stored or transmitted patient records. This paper discusses a process for analyzing the impact of security mechanisms on users of computerized patient records through "behind the scenes" electronic access audits. In this way, those impacts can be assessed and refined to an acceptable standard prior to implementation. Through an iterative process of design and evaluation, we develop security algorithms that will protect electronic health information from improper access, alteration or loss, while minimally affecting the flow of work of the user population as a whole. PMID:11079984

  6. Securing electronic mail: The risks and future of electronic mail

    NASA Astrophysics Data System (ADS)

    Weeber, S. A.

    1993-03-01

    The network explosion of the past decade has significantly affected how many of us conduct our day to day work. We increasingly rely on network services such as electronic mail, file transfer, and network newsgroups to collect and distribute information. Unfortunately, few of the network services in use today were designed with the security issues of large heterogeneous networks in mind. In particular, electronic mail, although heavily relied upon, is notoriously insecure. Messages can be forged, snooped, and even altered by users with only a moderate level of system proficiency. The level of trust that can be assigned at present to these services needs to be carefully considered. In the past few years, standards and tools have begun to appear addressing the security concerns of electronic mail. Principal among these are RFC's 1421, 1422, 1423, and 1424, which propose Internet standards in the areas of message encipherment, key management, and algorithms for privacy enhanced mail (PEM). Additionally, three PEM systems, offering varying levels of compliance with the PEM RFC's, have also recently emerged: PGP, RIPEM, and TIS/PEM. This paper addresses the motivations and requirements for more secure electronic mail, and evaluates the suitability of the currently available PEM systems.

  7. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  8. Real time test bed development for power system operation, control and cyber security

    NASA Astrophysics Data System (ADS)

    Reddi, Ram Mohan

    The operation and control of the power system in an efficient way is important in order to keep the system secure, reliable and economical. With advancements in smart grid, several new algorithms have been developed for improved operation and control. These algorithms need to be extensively tested and validated in real time before applying to the real electric power grid. This work focuses on the development of a real time test bed for testing and validating power system control algorithms, hardware devices and cyber security vulnerability. The test bed developed utilizes several hardware components including relays, phasor measurement units, phasor data concentrator, programmable logic controllers and several software tools. Current work also integrates historian for power system monitoring and data archiving. Finally, two different power system test cases are simulated to demonstrate the applications of developed test bed. The developed test bed can also be used for power system education.

  9. Lunar Prospector Data Archives

    NASA Astrophysics Data System (ADS)

    Guinness, Edward A.; Binder, Alan B.

    1998-01-01

    The Lunar Prospector (LP) is operating in a 100-km circular polar orbit around the Moon. The LP project's one-year primary mission began in January 1998. A six-month extended mission in a lower orbit is also possible. LP has five science instruments, housed on three booms: a gamma-ray spectrometer, a neutron spectrometer, an alpha-particle spectrometer, a magnetometer, and an electron reflectometer. In addition, a gravity experiment uses Doppler tracking data to derive gravity measurements. The major science objectives of LP are to determine the Moon's surface abundance of selected elements, to map the gravity and magnetic fields, to search for surface ice deposits, and to determine the locations of gas release events. The Geosciences Node of the NASA's Planetary Data System (PDS) is providing a lead role in working with the Lunar Prospector project to produce and distribute a series of archives of LP data. The Geosciences Node is developing a Web-based system to provide services for searching and browsing through the LP data archives, and for distributing the data electronically or on CDs. This system will also provide links to other relevant lunar datasets, such as Clementine image mosaics and telescopic and laboratory spectral reflectance data.

  10. NASAwide electronic publishing system: Electronic printing and duplicating, stage-2 evaluation report (GSFC)

    NASA Technical Reports Server (NTRS)

    Tuey, Richard C.; Lane, Robert; Hart, Susan V.

    1995-01-01

    The NASA Scientific and Technical Information Office was assigned the responsibility to continue with the expansion of the NASAwide networked electronic duplicating effort by including the Goddard Space Flight Center (GSFC) as an additional node to the existing configuration of networked electronic duplicating systems within NASA. The subject of this report is the evaluation of a networked electronic duplicating system which meets the duplicating requirements and expands electronic publishing capabilities without increasing current operating costs. This report continues the evaluation reported in 'NASA Electronic Publishing System - Electronic Printing and Duplicating Evaluation Report' (NASA TM-106242) and 'NASA Electronic Publishing System - Stage 1 Evaluation Report' (NASA TM-106510). This report differs from the previous reports through the inclusion of an external networked desktop editing, archival, and publishing functionality which did not exist with the previous networked electronic duplicating system. Additionally, a two-phase approach to the evaluation was undertaken; the first was a paper study justifying a 90-day, on-site evaluation, and the second phase was to validate, during the 90-day evaluation, the cost benefits and productivity increases that could be achieved in an operational mode. A benchmark of the functionality of the networked electronic publishing system and external networked desktop editing, archival, and publishing system was performed under a simulated daily production environment. This report can be used to guide others in determining the most cost effective duplicating/publishing alternative through the use of cost/benefit analysis and return on investment techniques. A treatise on the use of these techniques can be found by referring to 'NASA Electronic Publishing System -Cost/Benefit Methodology' (NASA TM-106662).

  11. Speaker Verification Using SVM

    DTIC Science & Technology

    2010-11-01

    application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic

  12. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s or business associate's workforce in relation to the protection of that information...

  13. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  14. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  15. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  16. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s or business associate's workforce in relation to the protection of that information...

  17. Ethics in Public Health Research

    PubMed Central

    Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.

    2008-01-01

    Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010

  18. Mapping the Risks. Assessing the Homeland Security Implications of Publicly Available Geospatial Information

    DTIC Science & Technology

    2004-01-01

    Defense Nuclear Facilities Safety Board 1 0.2 Export-Import Bank 1 0.2 National Archives and Records Administration 1 0.2 Supreme Court of the United...Agency Commodity Futures Trading Commission Consumer Product Safety Commission Defense Nuclear Facilities Safety Board Environmental Protection Agency...Intelligence www.cia.gov Defense Nuclear Facilities Safety Board Defense Nuclear Facilities Safety Board www.dnfsb.gov Department of

  19. 45 CFR 164.312 - Technical safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... that maintain electronic protected health information to allow access only to those persons or software... specifications: (i) Unique user identification (Required). Assign a unique name and/or number for identifying and...

  20. Archives for the Transportation and Hydrogen Newsletter | Transportation

    Science.gov Websites

    from the list below. January 2018 - 2017 Year in Review November 2017 - Videos Go Viral August 2017 Electronics & Thermal Management January 2016 - Sustainable Mobility November 2015 - Energy Storage August

  1. The 1990 annual statistics and highlights report

    NASA Technical Reports Server (NTRS)

    Green, James L.

    1991-01-01

    The National Space Science Data Center (NSSDC) has archived over 6 terabytes of space and Earth science data accumulated over nearly 25 years. It now expects these holdings to nearly double every two years. The science user community needs rapid access to this archival data and information about data. The NSSDC has been set on course to provide just that. Five years ago the NSSDC came on line, becoming easily reachable for thousands of scientists around the world through electronic networks it managed and other international electronic networks to which it connected. Since that time, the data center has developed and implemented over 15 interactive systems, operational nearly 24 hours per day, and is reachable through DECnet, TCP/IP, X25, and BITnet communication protocols. The NSSDC is a clearinghouse for the science user to find data needed through the Master Directory system whether it is at the NSSDC or deposited in over 50 other archives and data management facilities around the world. Over 13,000 users accessed the NSSDC electronic systems, during the past year. Thousands of requests for data have been satisfied, resulting in the NSSDC's sending out a volume of data last year that nearly exceeded a quarter of its holdings. This document reports on some of the highlights and distribution statistics for most of the basic NSSDC operational services for fiscal year 1990. It is intended to be the first of a series of annual reports on how well NSSDC is doing in supporting the space and Earth science user communities.

  2. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... covered entity to reasonably and appropriately implement the standards and implementation specifications...

  3. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... and appropriately implement the standards and implementation specifications as specified in this...

  4. Eclipse Megamovie 2017: How did we do?

    NASA Astrophysics Data System (ADS)

    Hudson, H. S.; Bender, M.; Collier, B. L.; Johnson, C.; Koh, J.; Konerding, D.; Martinez Oliveros, J. C.; Peticolas, L. M.; White, V.; Zevin, D.

    2017-12-01

    The Eclipse Megamovie program, as set up for the Great American Eclipse of 21 August 2017, will have completed its first phase, data acquisition, on that day or shortly thereafter. Our objective was to create (with Google's help) a vast public archive of amateur and other photography, down to the smartphone level, of the corona itself and of Baily's Beads at the 2nd and 3rd contacts. The archive and the consumer electronics enabling it open a large new domain of parameter space for eclipse science. At whatever level we have succeeded, the archive is an historical first, and we hope that the it already has been a springboard for citizen-science projects. We will discuss the execution of the program and some of its science plans/results.

  5. Author! author!: creating a digital archive of publications in a hospital library setting.

    PubMed

    Rourke, Diane; Samsundar, Devica Ramjit; Shalini, Channapatna

    2005-01-01

    Baptist Hospital of Miami has been honoring its staff authors annually during National Library Week since 1979, at the time the library was relocated. Upon "doing the math" and realizing that twenty-five years had passed, a special event was planned to celebrate the occasion in 2004. A merger of four hospitals in 1995 to form Baptist Health South Florida, and an addition of a fifth hospital in 2003 added into the complexity of these publications. Organizing the event led to the conclusion that there had to be a "better way" to manage the publication archive. This paper will include a look back at the event's past, present efforts to develop an archival database, and future plans to make articles available electronically to users, copyright permitting.

  6. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  7. Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron.

    DTIC Science & Technology

    1987-06-01

    Security Classification) Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron 12. PERSONAL AUTHOR(S) Thomas J. Kopf...Because of the great number of possible scheduling alternatives, it is difficult to find an optimal solution to-the scheduling problem. Additionally...changes to the original schedule make it even more difficult to find an optimal solution. The emergence of capable microcompu- ters, decision support

  8. 78 FR 70244 - Electronic Interim Assistance Reimbursement Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-25

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2011-0104] RIN 0960-AH45 Electronic Interim Assistance Reimbursement Program AGENCY: Social Security Administration. ACTION: Notice of.... We strongly urge you not to include in your comments any personal information, such as Social...

  9. 77 FR 13968 - Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-08

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0094] Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives AGENCY: Social Security Administration. ACTION: Revised notification of implementation of requirement. SUMMARY: We are revising the...

  10. 77 FR 4653 - Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-31

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0094] Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives AGENCY: Social Security Administration. ACTION: Notification of implementation of requirement. SUMMARY: We are announcing the requirement...

  11. Picture archiving and computing systems: the key to enterprise digital imaging.

    PubMed

    Krohn, Richard

    2002-09-01

    The utopian view of the electronic medical record includes the digital transformation of all aspects of patient information. Historically, imagery from the radiology, cardiology, ophthalmology, and pathology departments, as well as the emergency room, has been a morass of paper, film, and other media, isolated within each department's system architecture. In answer to this dilemma, picture archiving and computing systems have become the focal point of efforts to create a single platform for the collection, storage, and distribution of clinical imagery throughout the health care enterprise.

  12. OpenID Connect as a security service in cloud-based medical imaging systems.

    PubMed

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  13. Security for decentralized health information systems.

    PubMed

    Bleumer, G

    1994-02-01

    Health care information systems must reflect at least two basic characteristics of the health care community: the increasing mobility of patients and the personal liability of everyone giving medical treatment. Open distributed information systems bear the potential to reflect these requirements. But the market for open information systems and operating systems hardly provides secure products today. This 'missing link' is approached by the prototype SECURE Talk that provides secure transmission and archiving of files on top of an existing operating system. Its services may be utilized by existing medical applications. SECURE Talk demonstrates secure communication utilizing only standard hardware. Its message is that cryptography (and in particular asymmetric cryptography) is practical for many medical applications even if implemented in software. All mechanisms are software implemented in order to be executable on standard-hardware. One can investigate more or less decentralized forms of public key management and the performance of many different cryptographic mechanisms. That of, e.g. hybrid encryption and decryption (RSA+DES-PCBC) is about 300 kbit/s. That of signing and verifying is approximately the same using RSA with a DES hash function. The internal speed, without disk accesses etc., is about 1.1 Mbit/s. (Apple Quadra 950 (MC 68040, 33 MHz, RAM: 20 MB, 80 ns. Length of RSA modulus is 512 bit).

  14. A review of radio frequency identification technology for the anatomic pathology or biorepository laboratory: Much promise, some progress, and more work needed.

    PubMed

    Lou, Jerry J; Andrechak, Gary; Riben, Michael; Yong, William H

    2011-01-01

    Patient safety initiatives throughout the anatomic laboratory and in biorepository laboratories have mandated increasing emphasis on the need for accurately identifying and tracking biospecimen assets throughout their production lifecycle and for archiving/retrieval purposes. However, increasing production volume along with complex workflow characteristics, reliance on manual production processes, and required asset movement to disparate destinations throughout asset lifecycles continue to challenge laboratory efforts. Radio Frequency Identification (RFID) technology, use of radio waves to communicate data between electronic tags attached to objects and a reader, shows significant potential to facilitate and overcome these hurdles. Advantages over traditional barcode labeling include readability without direct line-of-sight alignment to the reader, ability to read multiple tags simultaneously, higher data storage capacity, faster data transmission rate, and capacity to perform multiple read-writes of data to the tag. Most importantly, use of radio waves decreases the need to manually scan each asset, and at each step, identification or tracking event is needed. Temperature monitoring by on-board sensors and three-dimensional position tracking are additional potential benefits of using RFID technology. To date, barriers to implementation of RFID systems in the anatomic laboratory include increased associated costs of tags and readers, system software, data security concerns, lack of specific data standards for stored information, and potential for technological obsolescence during decades of specimen storage. Novel RFID production techniques and increased production capacity are projected to lower costs of some tags to a few cents each. Potentially, information security concerns can be addressed by techniques such as shielding, data encryption, and tag pseudonyms. Commitment by stakeholder groups to develop RFID tag data standards for anatomic pathology and biorepository laboratories could avoid or mitigate the "islands of data" dilemma presented by barcode usage where there are innumerable standards and a consequent paucity of hardware or software "plug and play" interoperability. Work remains to be done to establish the durability and appropriate shielding of individual tag types for use in harsh laboratory environmental conditions, and for long-term archival storage. Finally, given the requirements for long-term storage of biospecimen assets, consideration should be given to ways of mitigating data isolation due to eventual technological obsolescence of a particular RFID technology or software.

  15. A review of radio frequency identification technology for the anatomic pathology or biorepository laboratory: Much promise, some progress, and more work needed

    PubMed Central

    Lou, Jerry J.; Andrechak, Gary; Riben, Michael; Yong, William H.

    2011-01-01

    Patient safety initiatives throughout the anatomic laboratory and in biorepository laboratories have mandated increasing emphasis on the need for accurately identifying and tracking biospecimen assets throughout their production lifecycle and for archiving/retrieval purposes. However, increasing production volume along with complex workflow characteristics, reliance on manual production processes, and required asset movement to disparate destinations throughout asset lifecycles continue to challenge laboratory efforts. Radio Frequency Identification (RFID) technology, use of radio waves to communicate data between electronic tags attached to objects and a reader, shows significant potential to facilitate and overcome these hurdles. Advantages over traditional barcode labeling include readability without direct line-of-sight alignment to the reader, ability to read multiple tags simultaneously, higher data storage capacity, faster data transmission rate, and capacity to perform multiple read-writes of data to the tag. Most importantly, use of radio waves decreases the need to manually scan each asset, and at each step, identification or tracking event is needed. Temperature monitoring by on-board sensors and three-dimensional position tracking are additional potential benefits of using RFID technology. To date, barriers to implementation of RFID systems in the anatomic laboratory include increased associated costs of tags and readers, system software, data security concerns, lack of specific data standards for stored information, and potential for technological obsolescence during decades of specimen storage. Novel RFID production techniques and increased production capacity are projected to lower costs of some tags to a few cents each. Potentially, information security concerns can be addressed by techniques such as shielding, data encryption, and tag pseudonyms. Commitment by stakeholder groups to develop RFID tag data standards for anatomic pathology and biorepository laboratories could avoid or mitigate the “islands of data” dilemma presented by barcode usage where there are innumerable standards and a consequent paucity of hardware or software “plug and play” interoperability. Work remains to be done to establish the durability and appropriate shielding of individual tag types for use in harsh laboratory environmental conditions, and for long-term archival storage. Finally, given the requirements for long-term storage of biospecimen assets, consideration should be given to ways of mitigating data isolation due to eventual technological obsolescence of a particular RFID technology or software. PMID:21886890

  16. The World Electric.

    ERIC Educational Resources Information Center

    Wiggins, Richard W.

    1995-01-01

    Examines types of publications available on the Internet, including informal publications, newspapers and magazines, self-published "'zines," electronic journals, preprint archives, and commercial references. Discusses related issues including navigation, commercialization, offline printing, and establishing a presence on the Internet…

  17. Document Management in Local Government.

    ERIC Educational Resources Information Center

    Williams, Bernard J. S.

    1998-01-01

    The latest in electronic document management in British local government is discussed. Finance, revenues, and benefits systems of leading vendors to local authorities are highlighted. A planning decisions archive management system and other information services are discussed. (AEF)

  18. Application of Multipurpose Cadastre to Evaluate Energy Security of Land Parcel (Case Study: Gedung A and Gedung B, Institut Teknologi Sumatra)

    NASA Astrophysics Data System (ADS)

    Alif, S. M.; Nugroho, A. P.; Leksono, B. E.

    2018-03-01

    Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.

  19. 78 FR 16471 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...

  20. Ensuring long-term reliability of the data storage on optical disc

    NASA Astrophysics Data System (ADS)

    Chen, Ken; Pan, Longfa; Xu, Bin; Liu, Wei

    2008-12-01

    "Quality requirements and handling regulation of archival optical disc for electronic records filing" is released by The State Archives Administration of the People's Republic of China (SAAC) on its network in March 2007. This document established a complete operative managing process for optical disc data storage in archives departments. The quality requirements of the optical disc used in archives departments are stipulated. Quality check of the recorded disc before filing is considered to be necessary and the threshold of the parameter of the qualified filing disc is set down. The handling regulations for the staffs in the archives departments are described. Recommended environment conditions of the disc preservation, recording, accessing and testing are presented. The block error rate of the disc is selected as main monitoring parameter of the lifetime of the filing disc and three classes pre-alarm lines are created for marking of different quality check intervals. The strategy of monitoring the variation of the error rate curve of the filing discs and moving the data to a new disc or a new media when the error rate of the disc reaches the third class pre-alarm line will effectively guarantee the data migration before permanent loss. Only when every step of the procedure is strictly implemented, it is believed that long-term reliability of the data storage on optical disc for archives departments can be effectively ensured.

  1. Achieving Learning Objectives through E-Voting Case Studies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bishop, Matt; Frincke, Deb

    2007-01-01

    The recent explosion in the use of electronic voting machines provides a wonderful opportunity to teach students about computer security. Because voting is the cornerstone of any democracy or republic, the need for secure voting systems is obvious. Further, students are familiar with how to vote. But the complexity of mapping a traditional process of voting using secret ballots to an electronic environment shows the difficulties of implementing secure processes and systems. In this article, we show a high level mapping from selected security and privacy education outcomes into a target ‘case study’ of developing electronic voting machines intended formore » traditional secret ballot elections. Our intent is to motivate both a set of lessons specifically involving e-voting, as well as illustrating the usefulness of having a mapping from outcomes to simplified case studies.« less

  2. Security aspects of electronic data interchange between a state health department and a hospital emergency department.

    PubMed

    Magnuson, J A; Klockner, Rocke; Ladd-Wilson, Stephen; Zechnich, Andrew; Bangs, Christopher; Kohn, Melvin A

    2004-01-01

    Electronic emergency department reporting provides the potential for enhancing local and state surveillance capabilities for a wide variety of syndromes and reportable conditions. The task of protecting data confidentiality and integrity while developing electronic data interchange between a hospital emergency department and a state public health department proved more complex than expected. This case study reports on the significant challenges that had to be resolved to accomplish this goal; these included application restrictions and incompatibilities, technical malfunctions, changing standards, and insufficient dedicated resources. One of the key administrative challenges was that of coordinating project security with enterprise security. The original project has evolved into an ongoing pilot, with the health department currently receiving secure data from the emergency department at four-hour intervals. Currently, planning is underway to add more emergency departments to the project.

  3. The hack attack - Increasing computer system awareness of vulnerability threats

    NASA Technical Reports Server (NTRS)

    Quann, John; Belford, Peter

    1987-01-01

    The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

  4. A national-scale authentication infrastructure.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butler, R.; Engert, D.; Foster, I.

    2000-12-01

    Today, individuals and institutions in science and industry are increasingly forming virtual organizations to pool resources and tackle a common goal. Participants in virtual organizations commonly need to share resources such as data archives, computer cycles, and networks - resources usually available only with restrictions based on the requested resource's nature and the user's identity. Thus, any sharing mechanism must have the ability to authenticate the user's identity and determine if the user is authorized to request the resource. Virtual organizations tend to be fluid, however, so authentication mechanisms must be flexible and lightweight, allowing administrators to quickly establish andmore » change resource-sharing arrangements. However, because virtual organizations complement rather than replace existing institutions, sharing mechanisms cannot change local policies and must allow individual institutions to maintain control over their own resources. Our group has created and deployed an authentication and authorization infrastructure that meets these requirements: the Grid Security Infrastructure. GSI offers secure single sign-ons and preserves site control over access policies and local security. It provides its own versions of common applications, such as FTP and remote login, and a programming interface for creating secure applications.« less

  5. Jupiter radiation measurements from enhanced Galileo/EPD data for NASA's PDS archive

    NASA Astrophysics Data System (ADS)

    Kollmann, P.; Smith, D.; Vandegriff, J. D.; Paranicas, C.; Lee-Payne, Z. H.

    2017-12-01

    The Galileo mission included the first orbiter around Jupiter. Its Energetic Particle Detector (EPD) provided an excellent survey of the radiation in this planetary magnetosphere. EPD measured electrons and various ion species in the energy range of tens of keV to tens of MeV. This data set is unique since the orbit was close to the equatorial plane, covered distances from Jupiter to its magnetopause, and included several close flybys at moons. The ongoing Juno mission in comparison only skims the equatorial plane and does not include moon flybys. Even though the Galileo mission ended in 2003, the EPD data archived through NASA's Planetary Data System (PDS) is sparse and not well calibrated. The bulk of the PDS data is from a low time resolution mode (from Galileo's "real time" mode), and is only provided as count rates. Only the 14 directionally resolved channels are provided in the PDS, but there would be also 35 additional omnidirectional channels available. Data in the higher time resolution "record mode" is archived but has not been adequately corrected. We present a preliminary version of fully cleaned, calibrated, and corrected EPD data that can be used without specialized instrument knowledge. Archive products for both the updated data and also the initial raw data (all channels and resolutions) are being prepared for delivery to the PDS. Major issues with the data from the Low Energy Magnetospheric Measurements System (EPD/LEMMS) were that some channels were saturated or contaminated. We correct for this using dead times and background values determined in flight. The raw measurements of electrons in the MeV range are not resolved in energy. We ran a forward model considering the instrument response to calculate electron MeV range spectra, which have many applications. From the Composition Measurement System (EPS/CMS), we have also extracted event data, which will also be included in our PDS delivery and can be used to derive high-resolution energy spectra. The processed EPD radiation data can be applied to a wide range of studies, from mission design to scientific studies on Jupiter's magnetosphere. Prior to publication in the PDS archive, a preliminary set of comma-delimited text files containing the newly processed data can be accessed at http://sd-www.jhuapl.edu/Galileo_EPD/

  6. Illusion Of Defeat: Egyptian Strategic Thinking And The 1973 Yom Kippur War

    DTIC Science & Technology

    2016-06-04

    jump-start a stalled political process, reclaim the Sinai Peninsula, and ultimately achieve peace with Israel. Egypt had lost tactically, but won...Israeli vulnerability, jump-start a stalled political process, reclaim the Sinai Peninsula, and ultimately achieve peace with Israel. Egypt had lost...New York: Free Press, 1990), 95. 2 William Burr, ed., “The October War and U.S. Policy,” The National Security Archive at The George Washington

  7. Security Assistance and Cooperation: Shared Responsibility of the Departments of State and Defense

    DTIC Science & Technology

    2016-04-04

    This overview is compiled from unclassified, open-source materials available at the Library of Congress. National Archive and Record Administration...Some policymakers, however, look at the mixed record of success and question whether the expenditure of billions of dollars on such programs is...Some contend that this trend stems from the substantial advantages of DOD personnel resources and Congress’s provision of a growing number of new

  8. 32 CFR Appendix G to Part 310 - Sample Amendments or Deletions to System Notices in Federal Register Format

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...

  9. 32 CFR Appendix G to Part 310 - Sample Amendments or Deletions to System Notices in Federal Register Format

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...

  10. 32 CFR Appendix G to Part 310 - Sample Amendments or Deletions to System Notices in Federal Register Format

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...

  11. 76 FR 36951 - In the Matter of Shiming U.S., Inc., Si Mei Te Food Ltd. (f/k/a China Discovery Acquisition Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-23

    ... Electronics, Inc.; Order of Suspension of Trading June 21, 2011. It appears to the Securities and Exchange... information concerning the securities of SJ Electronics, Inc. because it has not filed any periodic reports...

  12. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    ERIC Educational Resources Information Center

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  13. Web-based visualisation and analysis of 3D electron-microscopy data from EMDB and PDB.

    PubMed

    Lagerstedt, Ingvar; Moore, William J; Patwardhan, Ardan; Sanz-García, Eduardo; Best, Christoph; Swedlow, Jason R; Kleywegt, Gerard J

    2013-11-01

    The Protein Data Bank in Europe (PDBe) has developed web-based tools for the visualisation and analysis of 3D electron microscopy (3DEM) structures in the Electron Microscopy Data Bank (EMDB) and Protein Data Bank (PDB). The tools include: (1) a volume viewer for 3D visualisation of maps, tomograms and models, (2) a slice viewer for inspecting 2D slices of tomographic reconstructions, and (3) visual analysis pages to facilitate analysis and validation of maps, tomograms and models. These tools were designed to help non-experts and experts alike to get some insight into the content and assess the quality of 3DEM structures in EMDB and PDB without the need to install specialised software or to download large amounts of data from these archives. The technical challenges encountered in developing these tools, as well as the more general considerations when making archived data available to the user community through a web interface, are discussed. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.

  14. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  15. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  16. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  17. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  18. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  19. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  20. 17 CFR 242.604 - Display of customer limit orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... responsible broker or dealer, electronic communications network, national securities exchange, or national... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Display of customer limit orders. 242.604 Section 242.604 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  1. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true IT security requirements... security requirements. These IT security requirements cover all NASA contracts in which IT plays a role in...-63, Electronic Authentication Guideline) access to NASA's computer systems, networks, or IT...

  2. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  3. 36 CFR 1235.44 - What general transfer requirements apply to electronic records?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 20740, phone number (301) 837-3420. (c) When transferring digital photographs and their accompanying... Archives Services Division (NWCS) for digital photographs, 8601 Adelphi Road, College Park, MD 20740, phone number (301) 837-2903. ...

  4. The ASVIN Project: a study of electronic and printed veterinary science journals in the UK and Ireland.

    PubMed

    Davies, Bryn

    2002-03-01

    ASVIN was a Research Support for Libraries Programme (RSLP) Funded Project, whose principal aim was to develop better co-operation between nine libraries in the veterinary and animal health field. The project examined a number of library-related areas, such as journal archiving, collection development policies, development of a common Z39.50 catalogue interface, grey literature, and printed and electronic journals. This paper examines the latter, whilst also providing a detailed analysis of printed journals held in partner libraries. Comparisons of the nine partner library collections are undertaken with a range of secondary sources, and an ASVIN core list of veterinary journals was developed. It looks at some of the issues relating to e-journals, expressing the benefits and concerns that many librarians are experiencing, such as licensing arrangements, archiving and general management issues.

  5. BOOK REVIEW: Treasure-Hunting in Astronomical Plate Archives.

    NASA Astrophysics Data System (ADS)

    Kroll, Peter; La Dous, Constanze; Brauer, Hans-Juergen; Sterken, C.

    This book consists of the proceedings of a conference on the exploration of the invaluable scientific treasure present in astronomical plate archives worldwide. The book incorporates fifty scientific papers covering almost 250 pages. There are several most useful papers, such as, for example, an introduction to the world's large plate archives that serves the purpose of a guide for the beginning user of plate archives. It includes a very useful list of twelve mayor archives with many details on their advantages (completeness, number of plates, classification system and homogeneity of time coverage) and their limitations (plate quality, access, electronic catalogues, photographic services, limiting magnitudes, search software and cost to the user). Other topics cover available contemporary digitization machines, the applications of commercial flatbed scanners, technical aspects of plate consulting, astrophysical applications and astrometric uses, data reduction, data archiving and retrieval, and strategies to find astrophysically useful information on plates. The astrophysical coverage is very broad: from solar-system bodies to variable stars, sky surveys and sky patrols covering the galactic and extragalactic domain and even gravitational lensing. The book concludes by an illuminating paper on ALADIN, the reference tool for identification of astronomical sources. This work can be considered as a kind of field guide, and is recommended reading for anyone who wishes to undertake small- or large-scale consulting of photographic plate material. A shortcoming of the proceedings is the fact that very few papers have abstracts. BOOK REVIEW: Treasure-Hunting in Astronomical Plate Archives. Proceedings of the international workshop held at Sonneberg Observatory, March 4-6, 1999. Peter Kroll, Constanze la Dous and Hans-Juergen Brauer (Eds.)

  6. Present status and future directions of the Mayo/IBM PACS project

    NASA Astrophysics Data System (ADS)

    Morin, Richard L.; Forbes, Glenn S.; Gehring, Dale G.; Salutz, James R.; Pavlicek, William

    1991-07-01

    This joint project began in 1988 and was motivated by the need to develop an alternative to the archival process in place at that time (magnetic tape) for magnetic resonance imaging and neurological computed tomography. In addition, this project was felt to be an important step in gaining the necessary clinical experience for the future implementation of various aspects of electronic imaging. The initial phase of the project was conceived and developed to prove the concept, test the fundamental components, and produce performance measurements for future work. The key functions of this phase centered on attachment of imaging equipment (GE Signa) and archival processes using a non-dedicated (institutionally supplied) local area network (LAN). Attachment of imaging equipment to the LAN was performed using commercially available devices (Ethernet, PS/2, Token Ring). Image data were converted to ACR/NEMA format with retention of the vendor specific header information. Performance measurements were encouraging and led to the design of following projects. The second phase has recently been concluded. The major features of this phase have been to greatly expand the network, put the network into clinical use, establish an efficient and useful viewing station, include diagnostic reports in the archive data, provide wide area network (WAN) capability via ISDN, and establish two-way real-time video between remote sites. This phase has heightened both departmental and institutional thought regarding various issues raised by electronic imaging. Much discussion regarding both present as well as future archival processes has occurred. The use of institutional LAN resources has proven to be adequate for the archival function examined thus far. Experiments to date have shown that use of dedicated resources will be necessary for retrieval activities at even a basic level. This report presents an overview of the background present status and future directions of the project.

  7. SSC OCIO, IT SUMMIT 2011

    NASA Technical Reports Server (NTRS)

    Cottrell, Dinna L.

    2011-01-01

    The Stennis Space Center (SSC) Records Retention Facility is a centralized location for all SSC records, Records Management staff, and the SSC History Office. The building is a storm resistant facility and provides a secure environment for records housing. The Records Retention Facility was constructed in accordance with The National Archives and Records Administration (NARA) requirements for records storage, making it the first NARA compliant facility in the agency. Stennis Space Center's Records Retention Facility became operational in May 2010. The SSC Records Retention Facility ensures that the required federal records are preserved, managed and accessible to all interested personnel. The facility provides 20,000 cubic feet of records storage capacity for the purpose of managing the centers consolidated records within a central, protected environment. Records housed in the facility are in the form of paper, optical, film and magnetic media. Located within the SSC Records Retention Facility, the Records Management Office provides comprehensive records management services in the form of: a) Storage and life-cycle management of inactive records of all media types; b) Digitizing/scanning of records and documents; c) Non-textual/digital electronic records media storage, migration and transfer; d) Records Remediation.

  8. Design and implementation of disaster recovery and business continuity solution for radiology PACS.

    PubMed

    Mansoori, Bahar; Rosipko, Beverly; Erhard, Karen K; Sunshine, Jeffrey L

    2014-02-01

    In the digital era of radiology, picture archiving and communication system (PACS) has a pivotal role in retrieving and storing the images. Integration of PACS with all the health care information systems e.g., health information system, radiology information system, and electronic medical record has greatly improved access to patient data at anytime and anywhere throughout the entire enterprise. In such an integrated setting, seamless operation depends critically on maintaining data integrity and continuous access for all. Any failure in hardware or software could interrupt the workflow or data and consequently, would risk serious impact to patient care. Thus, any large-scale PACS now have an indispensable requirement to include deployment of a disaster recovery plan to ensure secure sources of data. This paper presents our experience with designing and implementing a disaster recovery and business continuity plan. The selected architecture with two servers in each site (local and disaster recovery (DR) site) provides four different scenarios to continue running and maintain end user service. The implemented DR at University Hospitals Health System now permits continuous access to the PACS application and its contained images for radiologists, other clinicians, and patients alike.

  9. DoD Physical Security Technical Support at the 1980 Winter Olympics Village.

    DTIC Science & Technology

    1980-09-02

    support were provided to the 1980 Winter Olympic Games were: (1) Physical Security, (2) Communications- Electronics , and (3) Medical via the New York Army...vibration-based Fence Pro- tection System (FPS), manufactured by General Telephone and Electronics (GT& E ) and installed for the Federal Bureau of Prisons...CM (Mr. Woomert) DRSXY-GB (Mr. R. E . Cam) Aberdeen Proving Ground, MD 21005 Commander US Army Communications and Electronics Material Readiness

  10. Privacy and security of patient data in the pathology laboratory

    PubMed Central

    Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  11. Lessons Learned while Exploring Cloud-Native Architectures for NASA EOSDIS Applications and Systems

    NASA Astrophysics Data System (ADS)

    Pilone, D.

    2016-12-01

    As new, high data rate missions begin collecting data, the NASA's Earth Observing System Data and Information System (EOSDIS) archive is projected to grow roughly 20x to over 300PBs by 2025. To prepare for the dramatic increase in data and enable broad scientific inquiry into larger time series and datasets, NASA has been exploring the impact of applying cloud technologies throughout EOSDIS. In this talk we will provide an overview of NASA's prototyping and lessons learned in applying cloud architectures to: Highly scalable and extensible ingest and archive of EOSDIS data Going "all-in" on cloud based application architectures including "serverless" data processing pipelines and evaluating approaches to vendor-lock in Rethinking data distribution and approaches to analysis in a cloud environment Incorporating and enforcing security controls while minimizing the barrier for research efforts to deploy to NASA compliant, operational environments. NASA's Earth Observing System (EOS) is a coordinated series of satellites for long term global observations. NASA's Earth Observing System Data and Information System (EOSDIS) is a multi-petabyte-scale archive of environmental data that supports global climate change research by providing end-to-end services from EOS instrument data collection to science data processing to full access to EOS and other earth science data. On a daily basis, the EOSDIS ingests, processes, archives and distributes over 3 terabytes of data from NASA's Earth Science missions representing over 6000 data products ranging from various types of science disciplines. EOSDIS has continually evolved to improve the discoverability, accessibility, and usability of high-impact NASA data spanning the multi-petabyte-scale archive of Earth science data products.

  12. An Agile Enterprise Regulation Architecture for Health Information Security Management

    PubMed Central

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

  13. An agile enterprise regulation architecture for health information security management.

    PubMed

    Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-09-01

    Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.

  14. Visual Systems for Interactive Exploration and Mining of Large-Scale Neuroimaging Data Archives

    PubMed Central

    Bowman, Ian; Joshi, Shantanu H.; Van Horn, John D.

    2012-01-01

    While technological advancements in neuroimaging scanner engineering have improved the efficiency of data acquisition, electronic data capture methods will likewise significantly expedite the populating of large-scale neuroimaging databases. As they do and these archives grow in size, a particular challenge lies in examining and interacting with the information that these resources contain through the development of compelling, user-driven approaches for data exploration and mining. In this article, we introduce the informatics visualization for neuroimaging (INVIZIAN) framework for the graphical rendering of, and dynamic interaction with the contents of large-scale neuroimaging data sets. We describe the rationale behind INVIZIAN, detail its development, and demonstrate its usage in examining a collection of over 900 T1-anatomical magnetic resonance imaging (MRI) image volumes from across a diverse set of clinical neuroimaging studies drawn from a leading neuroimaging database. Using a collection of cortical surface metrics and means for examining brain similarity, INVIZIAN graphically displays brain surfaces as points in a coordinate space and enables classification of clusters of neuroanatomically similar MRI images and data mining. As an initial step toward addressing the need for such user-friendly tools, INVIZIAN provides a highly unique means to interact with large quantities of electronic brain imaging archives in ways suitable for hypothesis generation and data mining. PMID:22536181

  15. Data mining technique for a secure electronic payment transaction using MJk-RSA in mobile computing

    NASA Astrophysics Data System (ADS)

    G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.

    2012-04-01

    Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.

  16. 76 FR 5973 - Privacy Act of 1974; Notice; Publication of the Systems of Records Managed by the Commodity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-02

    ...: Paper records are stored in file folders, binders, computer files (eLaw) and computer disks. Electronic records, including computer files, are stored on the Commission's network and other electronic media as... physical security measures. Technical security measures within CFTC include restrictions on computer access...

  17. 76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...

  18. Assuring the privacy and security of transmitting sensitive electronic health information.

    PubMed

    Peng, Charlie; Kesarinath, Gautam; Brinks, Tom; Young, James; Groves, David

    2009-11-14

    The interchange of electronic health records between healthcare providers and public health organizations has become an increasingly desirable tool in reducing healthcare costs, improving healthcare quality, and protecting population health. Assuring privacy and security in nationwide sharing of Electronic Health Records (EHR) in an environment such as GRID has become a top challenge and concern. The Centers for Disease Control and Prevention's (CDC) and The Science Application International Corporation (SAIC) have jointly conducted a proof of concept study to find and build a common secure and reliable messaging platform (the SRM Platform) to handle this challenge. The SRM Platform is built on the open standards of OASIS, World Wide Web Consortium (W3C) web-services standards, and Web Services Interoperability (WS-I) specifications to provide the secure transport of sensitive EHR or electronic medical records (EMR). Transmitted data may be in any digital form including text, data, and binary files, such as images. This paper identifies the business use cases, architecture, test results, and new connectivity options for disparate health networks among PHIN, NHIN, Grid, and others.

  19. 76 FR 60059 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services--016 Electronic... system of records titled, ``Department of Homeland Security/ U.S. Citizenship and Immigration Services... records will allow the Department of Homeland Security/U.S. Citizenship and Immigration Services to...

  20. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  1. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  2. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  3. The worldwide Protein Data Bank (wwPDB): ensuring a single, uniform archive of PDB data

    PubMed Central

    Berman, Helen; Henrick, Kim; Nakamura, Haruki; Markley, John L.

    2007-01-01

    The worldwide Protein Data Bank (wwPDB) is the international collaboration that manages the deposition, processing and distribution of the PDB archive. The online PDB archive is a repository for the coordinates and related information for more than 38 000 structures, including proteins, nucleic acids and large macromolecular complexes that have been determined using X-ray crystallography, NMR and electron microscopy techniques. The founding members of the wwPDB are RCSB PDB (USA), MSD-EBI (Europe) and PDBj (Japan) [H.M. Berman, K. Henrick and H. Nakamura (2003) Nature Struct. Biol., 10, 980]. The BMRB group (USA) joined the wwPDB in 2006. The mission of the wwPDB is to maintain a single archive of macromolecular structural data that are freely and publicly available to the global community. Additionally, the wwPDB provides a variety of services to a broad community of users. The wwPDB website at provides information about services provided by the individual member organizations and about projects undertaken by the wwPDB. PMID:17142228

  4. Electronic archival tags provide first glimpse of bathythermal habitat use by free-ranging adult lake sturgeon Acipenser fulvescens

    USGS Publications Warehouse

    Briggs, Andrew S.; Hondorp, Darryl W.; Quinlan, Henry R.; Boase, James C.; Mohr, Lloyd C.

    2016-01-01

    Information on lake sturgeon (Acipenser fulvescens) depth and thermal habitat use during non-spawning periods is unavailable due to the difficulty of observing lake sturgeon away from shallow water spawning sites. In 2002 and 2003, lake sturgeon captured in commercial trap nets near Sarnia, Ontario were implanted with archival tags and released back into southern Lake Huron. Five of the 40 tagged individuals were recaptured and were at large for 32, 57, 286, 301, and 880 days. Temperatures and depths recorded by archival tags ranged from 0 to 23.5 ºC and 0.1 to 42.4 m, respectively. For the three lake sturgeon that were at large for over 200 days, temperatures occupied emulated seasonal fluctuations. Two of these fish occupied deeper waters during winter than summer while the other occupied similar depths during non-spawning periods. This study provides important insight into depth and thermal habitat use of lake sturgeon throughout the calendar year along with exploring the feasibility of using archival tags to obtain important physical habitat attributes during non-spawning periods.

  5. Complementary concept for an image archive and communication system in a cardiological department based on CD-medical, an online archive, and networking facilities

    NASA Astrophysics Data System (ADS)

    Oswald, Helmut; Mueller-Jones, Kay; Builtjes, Jan; Fleck, Eckart

    1998-07-01

    The developments in information technologies -- computer hardware, networking and storage media -- has led to expectations that these advances make it possible to replace 35 mm film completely by digital techniques in the catheter laboratory. Besides the role of an archival medium, cine film is used as the major image review and exchange medium in cardiology. None of the today technologies can fulfill completely the requirements to replace cine film. One of the major drawbacks of cine film is the single access in time and location. For the four catheter laboratories in our institutions we have designed a complementary concept combining the CD-R, also called CD-medical, as a single patient storage and exchange medium, and a digital archive for on-line access and image review of selected frames or short sequences on adequate medical workstations. The image data from various modalities as well as all digital documents regarding to a patient are part of an electronic patient record. The access, the processing and the display of documents is supported by an integrated medical application.

  6. Structural biology data archiving - where we are and what lies ahead.

    PubMed

    Kleywegt, Gerard J; Velankar, Sameer; Patwardhan, Ardan

    2018-05-10

    For almost 50 years, structural biology has endeavoured to conserve and share its experimental data and their interpretations (usually, atomistic models) through global public archives such as the Protein Data Bank, Electron Microscopy Data Bank and Biological Magnetic Resonance Data Bank (BMRB). These archives are treasure troves of freely accessible data that document our quest for molecular or atomic understanding of biological function and processes in health and disease. They have prepared the field to tackle new archiving challenges as more and more (combinations of) techniques are being utilized to elucidate structure at ever increasing length scales. Furthermore, the field has made substantial efforts to develop validation methods that help users to assess the reliability of structures and to identify the most appropriate data for their needs. In this Review, we present an overview of public data archives in structural biology and discuss the importance of validation for users and producers of structural data. Finally, we sketch our efforts to integrate structural data with bioimaging data and with other sources of biological data. This will make relevant structural information available and more easily discoverable for a wide range of scientists. © 2018 The Authors. FEBS Letters published by John Wiley & Sons Ltd on behalf of Federation of European Biochemical Societies.

  7. HRP Data Accessibility Current Status

    NASA Technical Reports Server (NTRS)

    Sams, Clarence

    2009-01-01

    Overview of talk: a) Content of Human Life Science data; b) Data archive structure; c) Applicable legal documents and policies; and d) Methods for data access. Life Science Data Archive (LSDA) contains research data from NASA-funded experiments, primarily data from flight experiments and ground analog data collected at NASA facilities. Longitudinal Study of Astronaut Health (LSAH) contains electronic health records (medical data) of all astronauts, including mission data. Data are collected for clinical purposes. Clinical data are analyzed by LSAH epidemiologists to identify trends in crew health and implement changes in pre-, in-, or post-flight medical care.

  8. Degraded document image enhancement

    NASA Astrophysics Data System (ADS)

    Agam, G.; Bal, G.; Frieder, G.; Frieder, O.

    2007-01-01

    Poor quality documents are obtained in various situations such as historical document collections, legal archives, security investigations, and documents found in clandestine locations. Such documents are often scanned for automated analysis, further processing, and archiving. Due to the nature of such documents, degraded document images are often hard to read, have low contrast, and are corrupted by various artifacts. We describe a novel approach for the enhancement of such documents based on probabilistic models which increases the contrast, and thus, readability of such documents under various degradations. The enhancement produced by the proposed approach can be viewed under different viewing conditions if desired. The proposed approach was evaluated qualitatively and compared to standard enhancement techniques on a subset of historical documents obtained from the Yad Vashem Holocaust museum. In addition, quantitative performance was evaluated based on synthetically generated data corrupted under various degradation models. Preliminary results demonstrate the effectiveness of the proposed approach.

  9. CFD Data Sets on the WWW for Education and Testing

    NASA Technical Reports Server (NTRS)

    Globus, Al; Lasinski, T. A. (Technical Monitor)

    1995-01-01

    The Numerical Aerodynamic Simulation (NAS) Systems Division at NASA Ames Research Center has begun the development of a Computational Fluid Dynamics (CFD) data set archive on the World Wide Web (WWW) at URL http://www.nas.nasa.gov/NAS/DataSets/. Data sets are integrated with related information such as research papers, metadata, visualizations, etc. In this paper, four classes of users are identified and discussed: students, visualization developers, CFD practitioners, and management. Bandwidth and security issues are briefly reviewed and the status of the archive as of May 1995 is examined. Routine network distribution of data sets is likely to have profound implications for the conduct of science. The exact nature of these changes is subject to speculation, but the ability for anyone to examine the data, in addition to the investigator's analysis, may well play an important role in the future.

  10. Final Technical Report: Electronic Structure Workshop (ES13)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Shiwei

    The 25th Annual Workshop on Recent Developments in Electronic Structure Methods (ES2013) was successfully held at the College of William & Mary in Williamsburg VA on June 11-14, 2013. The workshop website is at http://es13.wm.edu/ , which contains updated information on the workshop and a permanent archive of the scientific contents. DOE's continued support has been instrumental to the success of the workshop.

  11. Security Science as an Applied Science?

    ERIC Educational Resources Information Center

    Smith, Clifton

    2001-01-01

    Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)

  12. Monthly Surface Air Temperature Time Series Area-Averaged Over the 30-Degree Latitudinal Belts of the Globe

    DOE Data Explorer

    Lugina, K. M. [Department of Geography, St. Petersburg State University, St. Petersburg, Russia; Groisman, P. Ya. [National Climatic Data Center, Asheville, North Carolina USA); Vinnikov, K. Ya. [Department of Atmospheric Sciences, University of Maryland, College Park, Maryland (USA); Koknaeva, V. V. [State Hydrological Institute, St. Petersburg, Russia; Speranskaya, N. A. [State Hydrological Institute, St. Petersburg, Russia

    2006-01-01

    The mean monthly and annual values of surface air temperature compiled by Lugina et al. have been taken mainly from the World Weather Records, Monthly Climatic Data for the World, and Meteorological Data for Individual Years over the Northern Hemisphere Excluding the USSR. These published records were supplemented with information from different national publications. In the original archive, after removal of station records believed to be nonhomogeneous or biased, 301 and 265 stations were used to determine the mean temperature for the Northern and Southern hemispheres, respectively. The new version of the station temperature archive (used for evaluation of the zonally-averaged temperatures) was created in 1995. The change to the archive was required because data from some stations became unavailable for analyses in the 1990s. During this process, special care was taken to secure homogeneity of zonally averaged time series. When a station (or a group of stations) stopped reporting, a "new" station (or group of stations) was selected in the same region, and its data for the past 50 years were collected and added to the archive. The processing (area-averaging) was organized in such a way that each time series from a new station spans the reference period (1951-1975) and the years thereafter. It was determined that the addition of the new stations had essentially no effect on the zonally-averaged values for the pre-1990 period.

  13. Method for secure electronic voting system: face recognition based approach

    NASA Astrophysics Data System (ADS)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  14. Timely response to secure messages from primary care patients.

    PubMed

    Rohrer, James E; North, Frederick; Angstman, Kurt B; Oberhelman, Sara S; Meunier, Matthew R

    2013-01-01

    To assess delays in response to patient secure e-mail messages in primary care. Secure electronic messages are initiated by primary care patients. Timely response is necessary for patient safety and quality. A database of secure messages. A random sample of 353 secure electronic messages initiated by primary care patients treated in 4 clinics. Message not opened after 12 hours or messages not responded to after 36 hours. A total of 8.5% of electronic messages were not opened within 12 hours, and 17.6% did not receive a response in 36 hours. Clinic location, being a clinic employee, and patient sex were not related to delays. Patients older than 50 years were more likely to receive a delayed response (25.7% delayed, P = .013). The risk of both kinds of delays was higher on weekends (P < .001 for both). The e-mail message system resulted in high rates of delayed response. Delays were concentrated on weekends (Friday-Sunday). Reducing delayed responses may require automatic rerouting of messages to message centers staffed 24-7 or other mechanisms to manage this after-hours work flow.

  15. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    PubMed

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  16. Convergence: Illicit Networks and National Security in the Age of Globalization

    DTIC Science & Technology

    2013-01-01

    four decades of combat. 52 “The FARC Files: Venezuela, Ecuador and the Secret Archives of ‘Raúl Reyes.’” The Colombian government gave the International...Why Guatemala?” Hubs versus Havens “There are so many forgotten places, out of government control, too scary for investors and tourists ,” Antonio Maria...represent the views of the Defense Department or any other agency of the Federal Government . Cleared for public release; distribution unlimited

  17. Privacy vs usability: a qualitative exploration of patients' experiences with secure Internet communication with their general practitioner.

    PubMed

    Tjora, Aksel; Tran, Trung; Faxvaag, Arild

    2005-05-31

    Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces.

  18. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces. PMID:15998606

  19. Developing a Science Commons for Geosciences

    NASA Astrophysics Data System (ADS)

    Lenhardt, W. C.; Lander, H.

    2016-12-01

    Many scientific communities, recognizing the research possibilities inherent in data sets, have created domain specific archives such as the Incorporated Research Institutions for Seismology (iris.edu) and ClinicalTrials.gov. Though this is an important step forward, most scientists, including geoscientists, also use a variety of software tools and at least some amount of computation to conduct their research. While the archives make it simpler for scientists to locate the required data, provisioning disk space, compute resources, and network bandwidth can still require significant efforts. This challenge exists despite the wealth of resources available to researchers, namely lab IT resources, institutional IT resources, national compute resources (XSEDE, OSG), private clouds, public clouds, and the development of cyberinfrastructure technologies meant to facilitate use of those resources. Further tasks include obtaining and installing required tools for analysis and visualization. If the research effort is a collaboration or involves certain types of data, then the partners may well have additional non-scientific tasks such as securing the data and developing secure sharing methods for the data. These requirements motivate our investigations into the "Science Commons". This paper will present a working definition of a science commons, compare and contrast examples of existing science commons, and describe a project based at RENCI to implement a science commons for risk analytics. We will then explore what a similar tool might look like for the geosciences.

  20. Medical image security in a HIPAA mandated PACS environment.

    PubMed

    Cao, F; Huang, H K; Zhou, X Q

    2003-01-01

    Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.

Top