10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
... material and would add new event notification requirements on the theft or loss of enhanced weapons...-2011-0017] RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event Notifications... regulations governing security event notifications. These proposed regulations are consistent with the...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
75 FR 23196 - Exchange Visitor Program-Secondary School Students
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
.... diplomatic and foreign policy goals by encouraging this positive academic and social interaction. Experience... currently requires a private vendor name and social security number check of all potential host family... check or the name and social security number criminal background check. NCMEC would interpret...
78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-10
.... Voluntary Consensus Standards XI. Finding of No Significant Environmental Impact XII. Paperwork Reduction... ML110480470 of Nuclear Energy Institute, on the proposed ``Enhanced Weapons, Firearms Background Checks and... consensus standards. XI. Finding of No Significant Environmental Impact In the proposed rule published on...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... Proposed Rule on Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY... the proposed enhanced weapons rule, the two draft regulatory guides, and the draft weapons safety.... No formal comments on the proposed enhanced weapons rule or the draft guidance documents will be...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... XI. Voluntary Consensus Standards XII. Finding of No Significant Environmental Impact XIII. Paperwork... potential advantages to NRC licensees and certificate holders to enhance security. The first advantage is... advantage is that security personnel of certain licensees or certificate holders will be permitted to...
Electronic Life Safety and Security Systems Federal Background Check Act of 2013
Rep. Luetkemeyer, Blaine [R-MO-3
2013-04-09
House - 04/30/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
29 CFR 9.12 - Contractor requirements and prerogatives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...
29 CFR 9.12 - Contractor requirements and prerogatives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...
29 CFR 9.12 - Contractor requirements and prerogatives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures
Code of Federal Regulations, 2010 CFR
2010-07-01
... responsibility in ensuring a safe and secure environment for children within DoD activities or private... installation level. An IRC will be completed on individuals with a DoD affiliation such as living or working on... checks through the SCHR to personnel offices working with law enforcement or investigative agencies. They...
32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures
Code of Federal Regulations, 2011 CFR
2011-07-01
... residences in an employment or security application. It is deemed unnecessary to conduct checks before 18... information exists regarding residence by the individual in the United States for 1 year or more since age 18... video equipment is acceptable provided it is monitored by an individual who has successfully completed a...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... holders, and other stakeholders on a draft guidance document entitled ``Weapons Safety Assessment'' (WSA... weapons under the NRC's proposed rule titled ``Enhanced Weapons, Firearms Background Checks, and Security.... You should not include any site-specific security information in your comments. Federal rulemaking Web...
Strengthening Background Checks Act of 2013
Rep. Fitzpatrick, Michael G. [R-PA-8
2013-01-22
House - 02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Fairness and Accuracy in Employment Background Checks Act of 2013
Rep. Scott, Robert C. "Bobby" [D-VA-3
2013-07-30
House - 09/13/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
Review of Private Sector Personnel Screening Practices
2000-10-01
private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor
The method of a joint intraday security check system based on cloud computing
NASA Astrophysics Data System (ADS)
Dong, Wei; Feng, Changyou; Zhou, Caiqi; Cai, Zhi; Dan, Xu; Dai, Sai; Zhang, Chuancheng
2017-01-01
The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center’s local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.
ERIC Educational Resources Information Center
Murphy, Nora Sharkey
2000-01-01
States that schools should be a safe haven for children and urges society to return schools to the safe, secure places they once were. Discusses the need to keep media far away from children in the event of a campus emergency and perform full background checks on all potential school employees. Reports that Catholic schools are providing…
46 CFR 10.214 - Security Check.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...
46 CFR 10.214 - Security Check.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...
Analyzing the cost of screening selectee and non-selectee baggage.
Virta, Julie L; Jacobson, Sheldon H; Kobza, John E
2003-10-01
Determining how to effectively operate security devices is as important to overall system performance as developing more sensitive security devices. In light of recent federal mandates for 100% screening of all checked baggage, this research studies the trade-offs between screening only selectee checked baggage and screening both selectee and non-selectee checked baggage for a single baggage screening security device deployed at an airport. This trade-off is represented using a cost model that incorporates the cost of the baggage screening security device, the volume of checked baggage processed through the device, and the outcomes that occur when the device is used. The cost model captures the cost of deploying, maintaining, and operating a single baggage screening security device over a one-year period. The study concludes that as excess baggage screening capacity is used to screen non-selectee checked bags, the expected annual cost increases, the expected annual cost per checked bag screened decreases, and the expected annual cost per expected number of threats detected in the checked bags screened increases. These results indicate that the marginal increase in security per dollar spent is significantly lower when non-selectee checked bags are screened than when only selectee checked bags are screened.
Rep. Bachus, Spencer [R-AL-6
2014-07-31
House - 09/26/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Finite-Time Performance of Local Search Algorithms: Theory and Application
2010-06-10
security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
NASA Technical Reports Server (NTRS)
Barnett, Traci M.
2004-01-01
Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.
49 CFR 1546.203 - Acceptance and screening of checked baggage.
Code of Federal Regulations, 2010 CFR
2010-10-01
... foreign air carrier must refuse to transport any individual's checked baggage or property if the...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR... deterring the carriage of any explosive or incendiary. Each foreign air carrier must use the procedures...
Child Care: State Requirements for Background Checks.
ERIC Educational Resources Information Center
Fagnoni, Cynthia
Background checks involve gathering information from state and federal databases to determine if child care providers have a history of child abuse or other criminal convictions that would make them unacceptable for working with children. Background checks include state criminal history checks, state child abuse registry checks, and Federal Bureau…
Collaborating toward improving food security in Nunavut
Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette
2013-01-01
Background Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. Objective The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. Design The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. Results In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. Conclusions The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut. PMID:23984307
The Need for an Implant Identification Card at Airport Security Check
Kosuge, Dennis; MacDowell, Andrew
2017-01-01
Background Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. Methods In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. Results All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. Conclusions It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more invasive searches at airport security. PMID:28567216
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E-Verify Self Check System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Self Check...
Congress, NRC mull utility access to FBI criminal files
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ultroska, D.
1984-08-01
Experiences at Alabama Power Company and other nuclear utilities have promped a request for institutionalizing security checks of personnel in order to eliminated convicted criminals and drug users. The Nuclear Regulatory Commission (NRC), which could provide FBI criminal history information by submitting fingerprints, does not do so, and would require new legislation to take on that duty. Believing that current malevolent employees can be managed with existing procedures, NRC allows criminal background checks only on prospective employees in order to avoid a negative social impact on personnel. Legislation to transfer criminal histories to nuclear facilities is now pending, and NRCmore » is leaning toward a request for full disclosure, partly because of terrorist threats and partly to save manpower time and costs in reviewing case histories.« less
Code of Federal Regulations, 2013 CFR
2013-01-01
... history records checks and other elements of background checks for designated categories of individuals..., identification and criminal history records checks and other elements of background checks for designated categories of individuals. Fingerprinting, and the identification and criminal history records checks...
Code of Federal Regulations, 2010 CFR
2010-01-01
... history records checks and other elements of background checks for designated categories of individuals..., identification and criminal history records checks and other elements of background checks for designated categories of individuals. Fingerprinting, and the identification and criminal history records checks...
Social Security Administration
... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...
Code of Federal Regulations, 2011 CFR
2011-07-01
... justice purposes. To conduct a name check, users must have either the social security number/foreign...) Report Date; (3) Social Security Number; (4) Last Name; (5) First Name; (6) Protected Identity (Y/N); (7...) Provost Marshals/Directors of Emergency Services will ensure that an audit trail is established and...
Code of Federal Regulations, 2010 CFR
2010-07-01
... justice purposes. To conduct a name check, users must have either the social security number/foreign...) Report Date; (3) Social Security Number; (4) Last Name; (5) First Name; (6) Protected Identity (Y/N); (7...) Provost Marshals/Directors of Emergency Services will ensure that an audit trail is established and...
Firearm Acquisition Without Background Checks: Results of a National Survey.
Miller, Matthew; Hepburn, Lisa; Azrael, Deborah
2017-02-21
In 1994, 40% of U.S. gun owners who had recently acquired a firearm did so without a background check. No contemporary estimates exist. To estimate the proportion of current U.S. gun owners who acquired their most recent firearm without a background check, by time since and manner of acquisition, for the nation as a whole and separately in states with and without legislation regulating private sales. Probability-based online survey. United States, 2015. 1613 adult gun owners. Current gun owners were asked where and when they acquired their last firearm; if they purchased the firearm; and whether, as part of that acquisition, they had a background check (or were asked to show a firearm license or permit). 22% (95% CI, 16% to 27%) of gun owners who reported obtaining their most recent firearm within the previous 2 years reported doing so without a background check. For firearms purchased privately within the previous 2 years (that is, other than from a store or pawnshop, including sales between individuals in person, online, or at gun shows), 50% (CI, 35% to 65%) were obtained without a background check. This percentage was 26% (CI, 5% to 47%) for owners residing in states regulating private firearm sales and 57% (CI, 40% to 75%) for those living in states without regulations on private firearm sales. Potential inaccuracies due to recall and social desirability bias. 22% of current U.S. gun owners who acquired a firearm within the past 2 years did so without a background check. Although this represents a smaller proportion of gun owners obtaining firearms without background checks than in the past, millions of U.S. adults continue to acquire guns without background checks, especially in states that do not regulate private firearm sales. Fund for a Safer Future and the Joyce Foundation.
NASA Astrophysics Data System (ADS)
Vijay Singh, Ran; Agilandeeswari, L.
2017-11-01
To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.
Rep. Lowenthal, Alan S. [D-CA-47
2014-01-29
House - 03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Reducing software security risk through an integrated approach
NASA Technical Reports Server (NTRS)
Gilliam, D.; Powell, J.; Kelly, J.; Bishop, M.
2001-01-01
The fourth quarter delivery, FY'01 for this RTOP is a Property-Based Testing (PBT), 'Tester's Assistant' (TA). The TA tool is to be used to check compiled and pre-compiled code for potential security weaknesses that could be exploited by hackers. The TA Instrumenter, implemented mostly in C++ (with a small part in Java), parsels two types of files: Java and TASPEC. Security properties to be checked are written in TASPEC. The Instrumenter is used in conjunction with the Tester's Assistant Specification (TASpec)execution monitor to verify the security properties of a given program.
14 CFR 91.1051 - Pilot safety background check.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Pilot safety background check. 91.1051... Operations Program Management § 91.1051 Pilot safety background check. Within 90 days of an individual beginning service as a pilot, the program manager must request the following information: (a) FAA records...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... Activities; Proposed Collection; Comment Request; Background Checks for Contractor Employees (Renewal) AGENCY... the electronic docket, go to www.regulations.gov . Title: Background Checks for Contractor Employees... consolidated in 40 CFR part 9. Abstract: The EPA uses contractors to perform services throughout the nation...
McGinty, Emma E; Wolfson, Julia A; Sell, Tara Kirk; Webster, Daniel W
2016-02-01
Gun violence is a critical public health problem in the United States, but it is rarely at the top of the public policy agenda. The 2012 mass shooting in Newtown, Connecticut, opened a rare window of opportunity to strengthen firearm policies in the United States. In this study, we examine the American public's exposure to competing arguments for and against federal- and state-level universal background check laws, which would require a background check prior to every firearm sale, in a large sample of national and regional news stories (n = 486) published in the year following the Newtown shooting. Competing messages about background check laws could influence the outcome of policy debates by shifting support and political engagement among key constituencies such as gun owners and conservatives. We found that news media messages in support of universal background checks were fact-based and used rational arguments, and opposing messages often used rights-based frames designed to activate the core values of politically engaged gun owners. Reframing supportive messages about background check policies to align with gun owners' and conservatives' core values could be a promising strategy to increase these groups' willingness to vocalize their support for expanding background checks for firearm sales. Copyright © 2016 by Duke University Press.
49 CFR 1544.203 - Acceptance and screening of checked baggage.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance and screening of checked baggage. 1544... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.203 Acceptance and screening of checked... its authorized aircraft operator representative. (c) Screening of checked baggage. Except as provided...
31 CFR 240.16 - Checks issued to minor payees.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...
31 CFR 240.16 - Checks issued to minor payees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...
On the verification of intransitive noninterference in mulitlevel security.
Ben Hadj-Alouane, Nejib; Lafrance, Stéphane; Lin, Feng; Mullins, John; Yeddes, Mohamed Moez
2005-10-01
We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 4 2012-10-01 2012-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 4 2011-10-01 2011-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 42 Public Health 4 2014-10-01 2014-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 4 2013-10-01 2013-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
2017-03-01
models of software execution, for example memory access patterns, to check for security intrusions. Additional research was performed to tackle the...considered using indirect models of software execution, for example memory access patterns, to check for security intrusions. Additional research ...deterioration for example , no longer corresponds to the model used during verification time. Finally, the research looked at ways to combine hybrid systems
Selling a gun to a stranger without a background check: acceptable behaviour?
Hemenway, David; Azrael, Deborah; Miller, Matthew
2018-06-01
One way that guns get into the wrong hands is via gun sales without a background check. While the large majority of Americans support laws requiring universal background checks, no prior study has assessed whether Americans think it is acceptable behaviour to sell a gun to a stranger without a background check, whether or not there is a law against it. We sponsored a nationally representative survey of over 3900 American adults, oversampling gun owners, using an online panel provided by the survey firm Growth for Knowledge. Over 72% of American adults agree or strongly agree with the statement that 'whether it is legal or not, it is NOT acceptable to sell a gun to a stranger without a background check' and 11% disagree or strongly disagree. Subgroups less likely to agree are young adults, men, conservatives, those with less than a high school education and gun owners. Reducing the number of guns sold without a background check could help reduce the flow of guns to felons. Changes in normative attitudes and behaviours, as well as changes in law, could help accomplish this goal. Most Americans, including gun owners, believe selling a gun to a stranger without a background check is not acceptable behaviour. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Performance optimization of internet firewalls
NASA Astrophysics Data System (ADS)
Chiueh, Tzi-cker; Ballman, Allen
1997-01-01
Internet firewalls control the data traffic in and out of an enterprise network by checking network packets against a set of rules that embodies an organization's security policy. Because rule checking is computationally more expensive than routing-table look-up, it could become a potential bottleneck for scaling up the performance of IP routers, which typically implement firewall functions in software. in this paper, we analyzed the performance problems associated with firewalls, particularly packet filters, propose a good connection cache to amortize the costly security check over the packets in a connection, and report the preliminary performance results of a trace-driven simulation that show the average packet check time can be reduced by a factor of 2.5 at the least.
32 CFR Appendix B to Part 86 - Criteria For Criminal History Background Check Disqualification
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Criteria For Criminal History Background Check Disqualification B Appendix B to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN CRIMINAL HISTORY BACKGROUND CHECKS ON INDIVIDUALS IN CHILD CARE SERVICES Pt...
32 CFR Appendix B to Part 86 - Criteria For Criminal History Background Check Disqualification
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Criteria For Criminal History Background Check Disqualification B Appendix B to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN CRIMINAL HISTORY BACKGROUND CHECKS ON INDIVIDUALS IN CHILD CARE SERVICES Pt...
32 CFR Appendix B to Part 86 - Criteria For Criminal History Background Check Disqualification
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Criteria For Criminal History Background Check Disqualification B Appendix B to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN CRIMINAL HISTORY BACKGROUND CHECKS ON INDIVIDUALS IN CHILD CARE SERVICES Pt...
32 CFR Appendix B to Part 86 - Criteria For Criminal History Background Check Disqualification
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Criteria For Criminal History Background Check Disqualification B Appendix B to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN CRIMINAL HISTORY BACKGROUND CHECKS ON INDIVIDUALS IN CHILD CARE SERVICES Pt...
32 CFR Appendix B to Part 86 - Criteria For Criminal History Background Check Disqualification
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Criteria For Criminal History Background Check Disqualification B Appendix B to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN CRIMINAL HISTORY BACKGROUND CHECKS ON INDIVIDUALS IN CHILD CARE SERVICES Pt...
Bork, Kristian H; Halkjaer-Knudsen, Vibeke; Hansen, John-Erik Stig; Heegaard, Erik D
2007-03-01
This article investigates the extent to which biosecurity measures are recognized and have been implemented in the Nordic countries, in the absence of formalized security standards and legislation. Two trials were undertaken: first, a broad combined biosafety and biosecurity questionnaire survey of the Nordic countries, and, second, a focused on-site audit of 22 facilities, with 94 laboratories, in Denmark. Both trials indicated that external security had been partially implemented but that little attention had been paid to internal security and the establishment of biosecurity. It was demonstrated that the backgrounds and identities of insiders were rarely checked and that they could have gained access to both pathogen inventory lists and freezers in many facilities. In 81% of pathogen-containing facilities, pathogens were not routinely and centrally accounted for. The authors recommend the establishment of a legal framework congruent with international standards and obligations; novel governmental national biosecurity authorities, requiring a fusion of both microbiological and technical expertise and legislative powers; and the formulation of a new code of conduct termed "Good Biosecurity Practice."
Code of Federal Regulations, 2010 CFR
2010-07-01
... continuation of assignment is not clearly consistent with the national interest. (d) Completed security forms (DD Form 398, Personnel Security Questionnaire (BI/SBI), or 398-2, Personnel Security Questionnaire (National Agency Check)) shall be forwarded to the Defense Industrial Security Clearance Office (DISCO...
Background Checks on School Personnel. ERIC Digest Series EA 55.
ERIC Educational Resources Information Center
Baas, Alan
Although it is relatively simple to check on applicants' basic professional competency, ensuring the moral competency of potential school employees is much more difficult. This digest examines major legal issues, district liabilities and responsibilities, suggested guidelines, and information sources involving employee background checks. Of more…
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
Hinds, Andrea L.; Woody, Erik Z.; Van Ameringen, Michael; Schmidt, Louis A.; Szechtman, Henry
2012-01-01
Background In obsessive-compulsive disorder (OCD), individuals feel compelled to repeatedly perform security-related behaviors, even though these behaviours seem excessive and unwarranted to them. The present research investigated two alternative ways of explaining such behavior: (1) a dysfunction of activation—a starting problem—in which the level of excitation in response to stimuli suggesting potential danger is abnormally strong; versus (2) a dysfunction of termination—a stopping problem—in which the satiety-like process for shutting down security-related thoughts and actions is abnormally weak. Method In two experiments, 70 patients with OCD (57 with washing compulsions, 13 with checking compulsions) and 72 controls were exposed to contamination cues—immersing a hand in wet diapers —and later allowed to wash their hands, first limited to 30 s and then for as long as desired. The intensity of activation of security motivation was measured objectively by change in respiratory sinus arrythmia. Subjective ratings (e.g., contamination) and behavioral measures (e.g., duration of hand washing) were also collected. Results Compared to controls, OCD patients with washing compulsions did not differ significantly in their levels of initial activation to the threat of contamination; however, they were significantly less able to reduce this activation by engaging in the corrective behavior of hand-washing. Further, the deactivating effect of hand-washing in OCD patients with checking compulsions was similar to that for controls, indicating that the dysfunction of termination in OCD is specific to the patient's symptom profile. Conclusions These results are the first to show that OCD is characterized by a reduced ability of security-related behavior to terminate motivation evoked by potential danger, rather than a heightened initial sensitivity to potential threat. They lend support to the security-motivation theory of OCD (Szechtman & Woody, 2004) and have important implications both for research into the biological mechanisms underlying OCD and for the development of new treatment approaches. PMID:22291994
7 CFR 1951.15 - Return of paid-in-full or satisfied notes to borrower.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY..., cashier's check, certified check, Postal or bank money order, bank draft, or a check issued by a... making marginal releases or satisfactions or security instruments, the notes will be held until the...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
32 CFR 154.8 - Types and scope of personnel security investigations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... interview, NAC, LACs, credit checks, developed character references (3), employment records checks... interview. While the kind of coverage provided for by the SBI determines eligibility for access to SCI, DoD... requiring resolution in the case concerned and generally consist of record checks and/or interviews with...
32 CFR 154.8 - Types and scope of personnel security investigations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... interview, NAC, LACs, credit checks, developed character references (3), employment records checks... interview. While the kind of coverage provided for by the SBI determines eligibility for access to SCI, DoD... requiring resolution in the case concerned and generally consist of record checks and/or interviews with...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... standards. The collection also requires airport operators to comply with a security directive by maintaining... airport operators maintain records of criminal history records checks and security threat assessments in... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...
31 CFR 597.307 - Financial institution.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Commission under 15 U.S.C. 78a et seq., securities or commodities brokers and dealers, investment bankers or investment companies, currency exchanges, issuers, redeemers, or cashiers of traveler's checks, checks, money...
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
Repeal of Comprehensive Background Check Policies and Firearm Homicide and Suicide.
Kagawa, Rose M C; Castillo-Carniglia, Alvaro; Vernick, Jon S; Webster, Daniel; Crifasi, Cassandra; Rudolph, Kara E; Cerdá, Magdalena; Shev, Aaron; Wintemute, Garen J
2018-04-02
In 2016, firearms killed 38,658 people in the United States. Federal law requires licensed gun dealers, but not private parties, to conduct background checks on prospective firearm purchasers with the goal of preventing prohibited persons from obtaining firearms. Our objective was to estimate the effect of the repeal of comprehensive background check laws - requiring a background check for all handgun sales, not just sales by licensed dealers - on firearm homicide and suicide rates in Indiana and Tennessee. We compared age-adjusted firearm homicide and suicide rates, measured annually from 1981-2008 and 1994-2008 in Indiana and Tennessee, respectively, to rates in control groups constructed using the synthetic control method. The average rates of firearm homicide and suicide in Indiana and Tennessee following repeal were within the range of what could be expected given natural variation (differences = 0.7 firearm homicides and 0.5 firearm suicides per 100,000 residents in Indiana and 0.4 firearm homicides and 0.3 firearm suicides per 100,000 residents in Tennessee). Sensitivity analyses resulted in similar findings. We found no evidence of an association between the repeal of comprehensive background check policies and firearm homicide and suicide rates in Indiana and Tennessee. In order to understand whether comprehensive background check policies reduce firearm deaths in the United States generally, more evidence on the impact of such policies from other states is needed.
An Analysis of Security Background Investigation Data with Relation to Subsequent Discharge
1988-09-01
Homo Susp 2 1422 Tresspass 1 1539 Fired 15 1561 Suspnd Sch 7 1564 SusCominSym 2 1600 Depression 1 1723 Leave Acct 2 1804 May Veli 1 8 1810 Nov Veh2-5 5...Burglary 4 1001 Robbery 1 1042 Theft 1 1043 DUI 1 1 1101 Tresspass 1 1539 Reck Drive 1 1805 Disord Con 1 1821 Juven Rec 1 1843...1107 Marij Arr 4 1120 Marij 1-5 2 1121 Marij 6-25 1 1122 DrgUse 1-5 2 1141 Bad Checks 5 1230 Sued Nonpa 2 1232 Unpd Bills 1 1233 Tresspass 2 1539 Hit
Secure Distributed Human Computation
NASA Astrophysics Data System (ADS)
Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart
In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.
Sub-pixel analysis to support graphic security after scanning at low resolution
NASA Astrophysics Data System (ADS)
Haas, Bertrand; Cordery, Robert; Gou, Hongmei; Decker, Steve
2006-02-01
Whether in the domain of audio, video or finance, our world tends to become increasingly digital. However, for diverse reasons, the transition from analog to digital is often much extended in time, and proceeds by long steps (and sometimes never completes). One such step is the conversion of information on analog media to digital information. We focus in this paper on the conversion (scanning) of printed documents to digital images. Analog media have the advantage over digital channels that they can harbor much imperceptible information that can be used for fraud detection and forensic purposes. But this secondary information usually fails to be retrieved during the conversion step. This is particularly relevant since the Check-21 act (Check Clearing for the 21st Century act) became effective in 2004 and allows images of checks to be handled by banks as usual paper checks. We use here this situation of check scanning as our primary benchmark for graphic security features after scanning. We will first present a quick review of the most common graphic security features currently found on checks, with their specific purpose, qualities and disadvantages, and we demonstrate their poor survivability after scanning in the average scanning conditions expected from the Check-21 Act. We will then present a novel method of measurement of distances between and rotations of line elements in a scanned image: Based on an appropriate print model, we refine direct measurements to an accuracy beyond the size of a scanning pixel, so we can then determine expected distances, periodicity, sharpness and print quality of known characters, symbols and other graphic elements in a document image. Finally we will apply our method to fraud detection of documents after gray-scale scanning at 300dpi resolution. We show in particular that alterations on legitimate checks or copies of checks can be successfully detected by measuring with sub-pixel accuracy the irregularities inherently introduced by the illegitimate process.
46 CFR 503.59 - Safeguarding classified information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Information Security Program § 503.59 Safeguarding classified information. (a) All classified information... security; (2) Takes appropriate steps to protect classified information from unauthorized disclosure or... security check; (2) To protect the classified information in accordance with the provisions of Executive...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
State background checks for gun purchase and firearm deaths: an exploratory study.
Sen, Bisakha; Panjamapirom, Anantachai
2012-10-01
This study examines the relationship between the types of background-information check required by states prior to firearm purchases, and firearm homicide and suicide deaths. Negative binomial models are used to analyze state-level data for homicides and suicides in the U.S. from 1996 to 2005. Data on types of background information are retrieved from the Surveys of State Procedures Related to Firearm Sales, and the violent death data are from the WISQARS. Several other state level factors were controlled for. More background checks are associated with fewer homicide (IRR:0.93, 95% CI:0.91-0.96) and suicide (IRR:0.98, 95% CI:0.96-1.00) deaths. Firearm homicide deaths are lower when states have checks for restraining orders (IRR:0.87, 95% CI:0.79-0.95) and fugitive status (IRR:0.79, 95% CI:0.72-0.88). Firearm suicide deaths are lower when states have background checks for mental illness (IRR:0.96, 95% CI:0.92-0.99), fugitive status (IRR:0.95, 95% CI:0.90-0.99) and misdemeanors (IRR:0.95, 95% CI:0.92-1.00). It does not appear that reductions in firearm deaths are offset by increases in non-firearm violent deaths. More extensive background checks prior to gun purchase are mostly associated with reductions in firearm homicide and suicide deaths. Several study limitations are acknowledged, and further research is called for to ascertain causality. Copyright © 2012 Elsevier Inc. All rights reserved.
Self-authentication of value documents
NASA Astrophysics Data System (ADS)
Hayosh, Thomas D.
1998-04-01
To prevent fraud it is critical to distinguish an authentic document from a counterfeit or altered document. Most current technologies rely on difficult-to-print human detectable features which are added to a document to prevent illegal reproduction. Fraud detection is mostly accomplished by human observation and is based upon the examiner's knowledge, experience and time allotted for examination of a document. Another approach to increasing the security of a value document is to add a unique property to each document. Data about that property is then encoded on the document itself and finally secured using a public key based digital signature. In such a scheme, machine readability of authenticity is possible. This paper describes a patent-applied-for methodology using the unique property of magnetic ink printing, magnetic remanence, that provides for full self- authentication when used with a recordable magnetic stripe for storing a digital signature and other document data. Traditionally the authenticity of a document is determined by physical examination for color, background printing, paper texture, printing resolution, and ink characteristics. On an initial level, there may be numerous security features present on a value document but only a few can be detected and evaluated by the untrained individual. Because security features are normally not standardized except on currency, training tellers and cashiers to do extensive security evaluation is not practical, even though these people are often the only people who get a chance to closely examine the document in a payment system which is back-end automated. In the context of this paper, one should be thinking about value documents such as commercial and personal checks although the concepts presented here can easily be applied to travelers cheques, credit cards, event tickets, passports, driver's licenses, motor vehicle titles, and even currency. For a practical self-authentication system, the false alarms should be less than 1% on the first read pass. Causes of false alarms could be the lack of robustness of the taggant discrimination algorithm, excessive document skew as it is being read, or errors in reading the recordable stripe. The false alarm rate is readily tested by reading the magnetic tags and digitally signing documents in one reader and performing authentication in at least two other reading devices. When reading the same check in the same reader where signed, the error metric is typically in the range of 0.0600. When comparing different checks in different readers, the error metric generally reports values in the range of 0.3930. It is clear from tests to date that the taggant patterns are randomly different for checks even when printed serially one after another using the same printing process. Testing results to date on the robustness of the taggant comparison and discrimination algorithms indicate that it is probable that low false alarms and very low false accept rates will be achieved.
Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication
NASA Astrophysics Data System (ADS)
Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn
2014-11-01
Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.
Small Nations in Multinational Operations and Armenian Perspectives
2014-12-12
National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2012 CFR
2012-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2014 CFR
2014-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2011 CFR
2011-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2013 CFR
2013-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2010 CFR
2010-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Liao, Yongjian; He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-10
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their "verify-then-decrypt" skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-01
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. PMID:29320418
Medical image security in a HIPAA mandated PACS environment.
Cao, F; Huang, H K; Zhou, X Q
2003-01-01
Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.
17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Definition of âcash transactionâ in section 311(b)(4). 260.11b-4 Section 260.11b-4 Commodity and Securities Exchanges SECURITIES... securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK... family, the Social Security Administration may, in its discretion, certify to any two or more of such... same household and one of them dies before the check is cashed, the Social Security Administration may...
NASA Astrophysics Data System (ADS)
Lohweg, Volker; Schaede, Johannes; Türke, Thomas
2006-02-01
The authenticity checking and inspection of bank notes is a high labour intensive process where traditionally every note on every sheet is inspected manually. However with the advent of more and more sophisticated security features, both visible and invisible, and the requirement of cost reduction in the printing process, it is clear that automation is required. As more and more print techniques and new security features will be established, total quality security, authenticity and bank note printing must be assured. Therefore, this factor necessitates amplification of a sensorial concept in general. We propose a concept for both authenticity checking and inspection methods for pattern recognition and classification for securities and banknotes, which is based on the concept of sensor fusion and fuzzy interpretation of data measures. In the approach different methods of authenticity analysis and print flaw detection are combined, which can be used for vending or sorting machines, as well as for printing machines. Usually only the existence or appearance of colours and their textures are checked by cameras. Our method combines the visible camera images with IR-spectral sensitive sensors, acoustical and other measurements like temperature and pressure of printing machines.
1999-01-01
Some means currently under investigation include domain-speci c languages which are easy to check (e.g., PLAN), proof-carrying code [NL96, Nec97...domain-speci c language coupled to an extension system with heavyweight checks. In this way, the frequent (per- packet) dynamic checks are inexpensive...to CISC architectures remains problematic. Typed assembly language [MWCG98] propagates type safety information to the assembly language level, so
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2010 CFR
2010-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2012 CFR
2012-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2013 CFR
2013-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2014 CFR
2014-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2011 CFR
2011-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
How to Be Safe and Secure against School Vandalism.
ERIC Educational Resources Information Center
Stover, Del
1990-01-01
During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…
Code of Federal Regulations, 2014 CFR
2014-01-01
... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...
40 CFR 51.363 - Quality assurance.
Code of Federal Regulations, 2011 CFR
2011-07-01
... test, the evaporative system tests, and emission control component checks (as applicable); (vi...) A check of the Constant Volume Sampler flow calibration; (5) A check for the optimization of the... selection, and power absorption; (9) A check of the system's ability to accurately detect background...
Pham, Martin H; Yu, Cheng; Rusch, Mairead; Holloway, Charles; Chang, Eric; Apuzzo, Michael L J
2014-12-01
Terrorism involving nuclear or radiologic weapons can devastate populations, city infrastructures, and entire sociopolitical systems. In our age of nuclear medicine and therapeutic radiation delivery, the unauthorized and illegal acquisition of radioactive materials needed for such an attack is always a possibility and risk. Physicians handling high-energy isotopes for medical radiotherapy must be aware of the basic security requirements as outlined by the Nuclear Regulation Commission, which include background checks and authorized access, physical protection during radionuclide use, and physical protection during its transit. The Leksell Gamma Knife and its Category 1 cobalt-60 radioactive source are discussed because of their significant potential for deployment in a weaponized device. Although this article presents a perspective relating to American rules and regulations, these precautions are applicable anywhere that similar situations exist. Understanding these materials and the security they require is essential to preventing the disastrous outcomes should these isotopes fall into terrorists' hands. Published by Elsevier Inc.
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
28 CFR 25.1 - Purpose and authority.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.1 Purpose and authority. The purpose of this subpart is to... Instant Criminal Background Check System (NICS) to be contacted by any licensed importer, licensed...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-08
... System Section Agency Information Collection Activities: Existing collection, comments requested the Voluntary Appeal File (VAF) Brochure ACTION: 60-Day Notice of Information Collection Under Review. The... Criminal Background Check System (NICS) Section has submitted the following information collection request...
32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Criminal History Background Check Procedures A Appendix A to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL...-190, section 1094, the Department of Defense requires that military members (except healthcare...
32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Criminal History Background Check Procedures A Appendix A to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL...-190, section 1094, the Department of Defense requires that military members (except healthcare...
32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Criminal History Background Check Procedures A Appendix A to Part 86 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL...-190, section 1094, the Department of Defense requires that military members (except healthcare...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-31
... Employees (Renewal) and Drug Testing for Contract Employees (Renewal) AGENCY: Environmental Protection...: EPA-HQ-OARM-2-11-0804, Drug Testing for Contractor Employees. Hand Delivery: EPA Docket Center... provide qualified personnel that meet the background check and drug testing requirements developed by EPA...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-11
... Collection, Comments Requested: The National Instant Criminal Background Check System (NICS) Point-of-Contact... Background Check System (NICS) Point-of-Contact (POC) State Final Determination Electronic Submission. (3... required to respond, as well as a brief abstract: Primary: Full Point-of-Contact (POC) States; Partial POC...
Verification and Trust: Background Investigations Preceding Faculty Appointment
ERIC Educational Resources Information Center
Finkin, Matthew W.; Post, Robert C.; Thomson, Judith J.
2004-01-01
Many employers in the United States have responded to the terrorist attacks of September 11, 2001, by initiating or expanding policies requiring background checks of prospective employees. Their ability to perform such checks has been abetted by the growth of computerized databases and of commercial enterprises that facilitate access to personal…
Verification and Trust: Background Investigations Preceding Faculty Appointment
ERIC Educational Resources Information Center
Academe, 2004
2004-01-01
Many employers in the United States have been initiating or expanding policies requiring background checks of prospective employees. The ability to perform such checks has been abetted by the growth of computerized databases and of commercial enterprises that facilitate access to personal information. Employers now have ready access to public…
29 CFR 1918.83 - Stowed cargo; tiering and breaking down.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 1918.83 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR LONGSHORING Handling Cargo § 1918.83 Stowed... cargo shall be checked in and out by the job boss. Before securing any reefer compartment, a check shall...
The ALL-OUT Library; A Design for Computer-Powered, Multidimensional Services.
ERIC Educational Resources Information Center
Sleeth, Jim; LaRue, James
1983-01-01
Preliminary description of design of electronic library and home information delivery system highlights potentials of personal computer interface program (applying for service, assuring that users are valid, checking for measures, searching, locating titles) and incorporation of concepts used in other information systems (security checks,…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-30
... TSA PRA Officer, Office of Information Technology (OIT), TSA-11, Transportation Security... technological collection techniques or other forms of information technology. Information Collection Requirement... history records check (CHRC), (2) a name-based check to determine whether the individual poses or is...
31 CFR 240.8 - Reclamation of amounts of paid checks.
Code of Federal Regulations, 2014 CFR
2014-07-01
.../check_security_new.pdf. Institutions may contact the Fiscal Service Questioned Documents Branch at (202...) Reclamation debts are due to be paid upon receipt of the reclamation by the reclamation debtor. Interest, penalties, and administrative costs associated with unpaid balances will accrue as follows: (1) Interest...
Nonimmigrant Overstays: Brief Synthesis of the Issue
2010-01-15
finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States
Code of Federal Regulations, 2012 CFR
2012-01-01
... check includes, at a minimum, a Federal Bureau of Investigation (FBI) criminal history records check (including verification of identity based on fingerprinting), employment history, education, and personal... fingerprinting and criminal history records checks before granting access to Safeguards Information. A background...
Code of Federal Regulations, 2010 CFR
2010-10-01
... background investigation shall include a review of: (a) The individual's trustworthiness, through inquiries... background check, which includes a fingerprint check through the Criminal Justice Information Services... to State and Tribal law enforcement agencies for the previous five years of residence listed on the...
48 CFR 352.237-72 - Crime Control Act-requirement for background checks.
Code of Federal Regulations, 2010 CFR
2010-10-01
... of 1990 (Act), requires that all individuals involved with the provision of child care services to children under the age of 18 undergo a criminal background check. “Child care services” include, but are not limited to, social services, health and mental health care, child (day) care, education (whether...
48 CFR 352.237-72 - Crime Control Act-requirement for background checks.
Code of Federal Regulations, 2012 CFR
2012-10-01
... of 1990 (Act), requires that all individuals involved with the provision of child care services to children under the age of 18 undergo a criminal background check. “Child care services” include, but are not limited to, social services, health and mental health care, child (day) care, education (whether...
48 CFR 352.237-72 - Crime Control Act-requirement for background checks.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of 1990 (Act), requires that all individuals involved with the provision of child care services to children under the age of 18 undergo a criminal background check. “Child care services” include, but are not limited to, social services, health and mental health care, child (day) care, education (whether...
48 CFR 352.237-72 - Crime Control Act-requirement for background checks.
Code of Federal Regulations, 2011 CFR
2011-10-01
... of 1990 (Act), requires that all individuals involved with the provision of child care services to children under the age of 18 undergo a criminal background check. “Child care services” include, but are not limited to, social services, health and mental health care, child (day) care, education (whether...
48 CFR 352.237-72 - Crime Control Act-requirement for background checks.
Code of Federal Regulations, 2014 CFR
2014-10-01
... of 1990 (Act), requires that all individuals involved with the provision of child care services to children under the age of 18 undergo a criminal background check. “Child care services” include, but are not limited to, social services, health and mental health care, child (day) care, education (whether...
ERIC Educational Resources Information Center
Patterson, Kristin
1996-01-01
Property theft at schools is a problem districts are having to confront. Deterrents include inventory checks and etching equipment with inventory control numbers. In Washington, D.C., officials are installing high-security equipment such as closed-circuit television, fiber-optics lines to secure computers, and motion detectors. (MLF)
Wintemute, Garen J
2014-04-01
Federal and state policies on eligibility to purchase and possess firearms and background check requirements for firearm transfers are undergoing intensive review and, in some cases, modification. Our objective in this third report from the Firearms Licensee Survey (FLS) is to assess support among federally licensed firearms retailers (gun dealers and pawnbrokers) for a background check requirement on all firearm transfers and selected criteria for denying the purchase of handguns based on criminal convictions, alcohol abuse, and serious mental illness. The FLS was conducted by mail during June-August, 2011 on a random sample of 1,601 licensed dealers and pawnbrokers in 43 states who were believed to sell at least 50 firearms annually. The response rate was 36.9%, typical of establishment surveys using such methods. Most respondents (55.4%) endorsed a comprehensive background check requirement; 37.5% strongly favored it. Support was more common and stronger among pawnbrokers than dealers and among respondents who believed that "it is too easy for criminals to get guns." Support was positively associated with many establishment characteristics, including sales of inexpensive handguns, sales that were denied when the purchasers failed background checks, and sales of firearms that were later subjected to ownership tracing, and were negatively associated with sales at gun shows. Support for three existing and nine potential criteria for denial of handgun purchase involving criminal activity, alcohol abuse, and mental illness exceeded 90% in six cases and fell below 2/3 in one. Support again increased with sales of inexpensive handguns and denied sales and decreased with sales of tactical (assault-type) rifles. In this survey, which was conducted prior to mass shootings in Aurora, Colorado; Oak Creek, Wisconsin; Newtown, Connecticut; and elsewhere, licensed firearm sellers exhibited moderate support for a comprehensive background check requirement and very strong support for additional criteria for denial of handgun purchases. In both cases, support was associated with the intensity of respondents' exposure to illegal activities.
Terrorist Watchlist Checks and Air Passenger Prescreening
2009-12-30
U.S. port of entry or at airport security checkpoints prior U.S. air carrier flights. For these purposes, CBP administers the Automated Targeting...Passenger Screening at Airport Security Checkpoints ................................. 14 9/11 Commission Recommendations and CAPPS II...individuals at either international ports of entries upon arrival at a U.S. port of entry or at airport security checkpoints prior U.S. air carrier
[Basic consideration on the security checking of sick travelers at airports].
Felkai, Péter; Mártai, István
2012-09-02
The authorities guarantee the safety of passengers during air travel by strict ground security measures. All of these measures are restrictive and can affect the health status of both healthy and ill travelers. Patients who are in critical condition or confined to a stretcher and have to be repatriated by stretcher on a regular flight, must pass the airport security check as well. But the developers of security system should take into account the medical safety of patients during the procedure. The relevant medical principles are painfully missing not only in Hungary, but unfortunately also at most international airports. On the basis of principles reviewed in the present publication, an unambiguous, professionally reconciled regulation is necessary that would serve as a guideline for airport management and authorities, as well as for the involved medical personnel. Although setting principles into practice requires a different solution at each airport, yet, passenger safety and patient safety have to be harmonized as soon as possible.
Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor
2013-08-01
system (OS). HyperCheck leverages the CPU System Management Mode ( SMM ), present in x86 systems, to securely generate and transmit the full state of the...HyperCheck harnesses the CPU System Management Mode ( SMM ) which is present in all x86 commodity systems to create a snapshot view of the current state of the...protect the software above it. Our assumptions are that the attacker does not have physical access to the machine and that the SMM BIOS is locked and
Physician office readiness for managing Internet security threats.
Keshavjee, K; Pairaudeau, N; Bhanji, A
2006-01-01
Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.
Physician Office Readiness for Managing Internet Security Threats
Keshavjee, K; Pairaudeau, N; Bhanji, A
2006-01-01
Internet security threats are evolving toward more targeted and focused attacks. Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done. PMID:17238600
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
Dues Check-off and Union Security Study.
ERIC Educational Resources Information Center
National Center for the Study of Collective Bargaining in Higher Education Newsletter, 1974
1974-01-01
This document presents a review of what higher education agreements say about dues checkoff and union security. This study involved review of contracts negotiated by affiliates of the three national organizations, the American Association of University Professors (AAUP), the American Federation of Teachers (AFT), and the National Education…
17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).
Code of Federal Regulations, 2010 CFR
2010-04-01
... transaction”, as used in section 311(b)(4), means any transaction in which full payment for goods or securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...
42 CFR 408.44 - Deduction from civil service annuities.
Code of Federal Regulations, 2010 CFR
2010-10-01
... not entitled to railroad retirement benefits or social security benefits, and is receiving a civil... service annuity or to social security or railroad retirement benefits, and the annuitant gives written consent, OPM also deducts the spouse's premium from the annuitant's monthly check. (c) Withdrawal of...
Britton, Juliet; Bloom, Joseph D
2015-06-01
This article describes the State of Oregon's implementation of two programs designed to comply with federal gun laws regarding reporting individuals who have received mental health adjudications in criminal and civil courts. One mandate requires that states submit names of adjudicated individuals to the National Instant Criminal Background Check System (NICS) while the second requires that the state establish a qualifying gun restoration program for those disqualified from gun ownership. In 2009, Oregon's Legislature developed an administrative approach to gun restoration and assigned the responsibility for conducting these hearing to the Oregon Psychiatric Security Review Board (PSRB). The PSRB is a state administrative board that has existed since 1977 and has been primarily focused on the supervision and treatment of adult and juvenile insanity acquittees. The gun restoration program began in 2010, but to date has only received three completed petitions requesting restoration of firearm rights. The article concludes with a discussion that surmises why very few of the Oregonians who are listed in NICS have submitted petitions for relief. Copyright © 2015 John Wiley & Sons, Ltd.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-14
... consisting of a fingerprint-based background check against applicable Federal Bureau of Investigation (FBI... completed hard-copy FBI Form FD- 258, ``Fingerprint Card,'' to the NRC as specified in Attachment 3, for all... Section 161A.b. shall be subject to a background check by the Attorney General, based on fingerprints and...
Kleshinski, James; Case, Steven T; Davis, Dwight; Heinrich, George F; Witzburg, Robert A
2011-07-01
In this commentary, the authors aim to contextualize the history and rationale for what has become the Association of American Medical Colleges-facilitated criminal background check process for entering medical students. As the process was being considered, many issues with a standardized process were identified. There were concerns that demographic or socioeconomic factors might unfairly burden certain applicants or discourage them from applying to medical school. On the other hand, a unified, national program would minimize cost and enhance quality assurance. The authors discuss these issues. Lessons learned in the first three years of the program are also addressed, including some unexpected and favorable consequences such as the identification of accepted applicants with at-risk behaviors (e.g., substance abuse), who would have otherwise gone undetected. Several challenges remain, including the fact that the criminal background check process creates an enhanced role for prehealth advisors and encourages undergraduate institutions to establish standards and processes relating to professionalism. While this is, no doubt, an evolving program which needs continued oversight and ongoing reevaluation, the authors support the continued advancement of the criminal background check process for entering medical students.
[Are the flight security measures good for the patients? The "sickurity" problem].
Felkai, Péter
2010-10-10
Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".
75 FR 24970 - FBI Records Management Division National Name Check Program Section User Fees
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
... Division National Name Check Program Section User Fees AGENCY: Federal Bureau of Investigation (FBI), Justice. ACTION: Notice. SUMMARY: This notice establishes the user fee schedule for federal agencies... user fees for federal agencies requesting noncriminal name-based background checks of the Central...
The Impact of Repeated Health Checks for Adults with Intellectual Disabilities
ERIC Educational Resources Information Center
Felce, David; Baxter, Helen; Lowe, Kathy; Dunstan, Frank; Houston, Helen; Jones, Glyn; Felce, Janet; Kerr, Michael
2008-01-01
Background: An earlier study (Baxter "et al." 2006) found that a structured health check conducted in primary care identified clinically significant previously unrecognized morbidity among adults with intellectual disabilities. The aim here was to examine whether follow-up health checks would identify equally significant newly identified morbidity…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
... Aliens and Other Designated Individuals; Security Awareness Training for Flight School Employees AGENCY... checks for all aliens and other designated individuals seeking flight instruction (``candidates'') from... OMB Control Number 1652-0021, Flight Training for Aliens and Other Designated Individuals; Security...
20 CFR 403.150 - Is there a fee for our services?
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 403.150 Employees' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND INFORMATION IN LEGAL PROCEEDINGS § 403.150 Is there a fee for our services? (a..., or testimony. Make fees payable to the Social Security Administration by check or money order. (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... Act (PRA) Officer, Office of Information Technology (OIT), TSA-11, Transportation Security..., electronic, mechanical, or other technological collection techniques or other forms of information technology... criminal history records check (CHRC). As part of the CHRC process, the individual must provide identifying...
Homeland Security Department: FY2009 Appropriations
2009-03-04
security fees 2,113 2,329 TWIC 64 9 Hazmat 18 18 TSA Registered Traveler 4 10 FEMA/EPR National Flood Insurance Fund 111 157 CBP Small airports 7...Border. f. Fees include TWIC, HAZMAT, Registered Traveler , and Alien Flight School Checks. Homeland Security Department: FY2009 Appropriations CRS...unauthorized travelers and immigrants; and enforcing more than 400 laws and regulations at the border on behalf of more than 60 government agencies
Security Controls in the Stockpoint Logistics Integrated Communications Environment (SPLICE).
1985-03-01
call programs as authorized after checks by the Terminal Management Subsystem on SAS databases . SAS overlays the TANDEM GUARDIAN operating system to...Security Access Profile database (SAP) and a query capability generating various security reports. SAS operates with the System Monitor (SMON) subsystem...system to DDN and other components. The first SAS component to be reviewed is the SAP database . SAP is organized into two types of files. Relational
2008 Homeland Security Symposium and Exposition
2008-09-10
Untitled Document 2008 Homeland Security Symposium and Exposition.html[5/19/2016 8:49:43 AM] 2008 Homeland Security Symposium and Exposition "New...national defenSe magazine Advertise in National Defense and increase your company exposure at this symposium! National Defense will be distributed to all...use the Internet Cafe to check their e-mail and search the Internet. Brand your name with maximum exposure at this high traffic area. Benefits
The Latest Information on Fort Detrick Gate Access Procedures | Poster
As of Jan. 5, all visitors to Fort Detrick are required to undergo a National Crime Information Center background check prior to entering base. The background checks are conducted at Old Farm Gate. The new access procedures may cause delays at all Fort Detrick gates, but especially at Old Farm Gate. Access requirements have not changed for employees and personnel with a
NASA Astrophysics Data System (ADS)
Kataoka, Haruno; Utsumi, Akira; Hirose, Yuki; Yoshiura, Hiroshi
Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that they are no longer revealing. DCNL checks not only phrases that directly represent sensitive information but also those that indirectly suggest it. Combinations of phrases are also checked. DCNL automatically learns the knowledge of sensitive phrases and the suggestive relations between phrases by using co-occurrence analysis and Web retrieval. The users' burden is therefore minimized, i.e., they do not need to define many disclosure control rules. DCNL complements the traditional access control in the fields where reliability needs to be balanced with enjoyment and objects classes for the access control cannot be predefined.
The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security
2013-11-12
information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and
Vernick, Jon S; Alcorn, Ted; Horwitz, Joshua
2017-03-01
There were more than 36,000 firearm-related deaths in the U.S. in 2015. Under federal law, a background check is required only for gun purchases from licensed dealers. Research suggests that some persons prohibited from owning a gun turn to private sellers, including those identified online, to attempt to obtain a firearm. State-level approaches to make it more difficult for high-risk persons to purchase or possess firearms include universal background check (UBC) and gun violence restraining order (GVRO) laws. UBC laws, on the books in 18 states as of the end of 2016, can reduce both homicide and suicide rates. After Colorado adopted a UBC law in 2013, the number of background checks conducted by private sellers for sales occurring at places other than gun shows steadily increased. GVRO laws give law enforcement and families the authority to petition a court to temporarily remove firearms from an individual who presents a danger to himself or others during times of crisis, regardless of whether that person has been diagnosed with a mental illness. California enacted a GVRO law in 2014. Data are emerging to suggest the effectiveness of GVRO-type laws at averting suicides and providing an entryway to services.
Obsessive-compulsive disorder as a disturbance of security motivation: constraints on comorbidity.
Szechtman, H; Woody, E Z
2006-10-01
Patients with OCD often meet criteria for additional psychiatric disorders, with the incidence of comorbidity being as high as 75% in some studies. Here we examine the theoretical plausibility that in OCD much of the domain of co-morbid presentations encompasses related perturbations of the security motivation system. According to a recent proposal, the security motivation system represents a biologically primitive special motivation that is activated by potential (as opposed to imminent) danger to self or intimate others and engages a set of specialized species-typical behaviors (such as checking and washing) to handle potential danger. Because the task of security motivation is open ended, in the sense that no consummatory stimuli can exist in the real world to indicate the absence of potential danger, the shutdown of security motivation is produced by a self-generated feeling of knowing, a satiety signal termed yedasentience. In this schema, OCD results from a failure to generate or respond to the yedasentience signal: without this negative feedback the patient persists abnormally long in a strong motivational state having to do with primal, basic threats to existence, a condition that leads to prolonged engagement in security-related behaviors, such as the checking and washing, characteristic of OCD compulsions and obsessions. Considering the proposed neuronatomy of security motivation system and OCD, we discuss the likelihood that the phenomenon of "spread of allied reflexes" can produce other security-related psychiatric conditions, as well as the possibility that disturbances along different pathways of the security motivation system can lead to apparently different disorders.
49 CFR 384.228 - Examiner training and record checks.
Code of Federal Regulations, 2012 CFR
2012-10-01
... regulations, updates to administering the tests, and new safety related equipment on the vehicles. (g... criminal background check must include at least the following: (i) Any felony conviction within the last 10...
A Mixed-Method Efficacy and Fidelity Study of Check and Connect
ERIC Educational Resources Information Center
Powers, Kristin; Hagans, Kristi; Linn, Megan
2017-01-01
The effectiveness of the Check and Connect dropout prevention program was examined, over the course of 2.5 years, with 54 middle school students from diverse backgrounds experiencing one or more conditions of risk for dropout. Participants were randomly assigned to receive the Check and Connect intervention or business as usual (i.e., control) in…
A review of X-ray explosives detection techniques for checked baggage.
Wells, K; Bradley, D A
2012-08-01
In recent times, the security focus for civil aviation has shifted from hijacking in the 1980s, towards deliberate sabotage. X-ray imaging provides a major tool in checked baggage inspection, with various sensitive techniques being brought to bear in determining the form, and density of items within luggage as well as other material dependent parameters. This review first examines the various challenges to X-ray technology in securing a safe system of passenger transportation. An overview is then presented of the various conventional and less conventional approaches that are available to the airline industry, leading to developments in state-of-the-art imaging technology supported by enhanced machine and observer-based decision making principles. Copyright © 2012 Elsevier Ltd. All rights reserved.
49 CFR 384.228 - Examiner training and record checks.
Code of Federal Regulations, 2013 CFR
2013-10-01
... regulations, updates to administering the tests, and new safety related equipment on the vehicles. (g... background check must include at least the following: (i) Any felony conviction within the last 10 years; or...
49 CFR 384.228 - Examiner training and record checks.
Code of Federal Regulations, 2014 CFR
2014-10-01
... regulations, updates to administering the tests, and new safety related equipment on the vehicles. (g... background check must include at least the following: (i) Any felony conviction within the last 10 years; or...
Comment on id-based remote data integrity checking with data privacy preserving
NASA Astrophysics Data System (ADS)
Zhang, Jianhong; Meng, Hongxin
2017-09-01
Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.
Code of Federal Regulations, 2010 CFR
2010-01-01
... securities of B, a non-publicly traded issuer. The agreed upon acquisition price is $99 million subject to... voting securities of B, a non-publicly traded issuer, but will accept up to 100 percent of the shares if... check or by electronic wire transfer (EWT). The fee must be paid in U.S. currency. (1) Fees paid by...
[Development of operation patient security detection system].
Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun
2008-11-01
This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.
Code of Federal Regulations, 2011 CFR
2011-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
Code of Federal Regulations, 2012 CFR
2012-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
Code of Federal Regulations, 2014 CFR
2014-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
Code of Federal Regulations, 2010 CFR
2010-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
The Role of Mental Illness Identification and Screening in Firearm Background Checks
2017-12-01
MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the...firearm. Mental illness, broadly speaking, is a prohibiting criterion for individuals to purchase a firearm, yet there are several examples of...individuals who have a history of mental illness and are able to legally pass a firearm background check. This thesis examines the tenuous relationship
Three-step semiquantum secure direct communication protocol
NASA Astrophysics Data System (ADS)
Zou, XiangFu; Qiu, DaoWen
2014-09-01
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.
Fernández-Alemán, José Luis; Toval, Ambrosio
2012-01-01
Background Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information. Objective To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. Methods We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. Results The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users’ accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Conclusions Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low. PMID:22917868
ERIC Educational Resources Information Center
Chauhan, U.; Kontopantelis, E.; Campbell, S.; Jarrett, H.; Lester, H.
2010-01-01
Background: Routine health checks have gained prominence as a way of detecting unmet need in primary care for adults with intellectual disabilities (ID) and general practitioners are being incentivised in the UK to carry out health checks for many conditions through an incentivisation scheme known as the Quality and Outcomes Framework (QOF).…
ERIC Educational Resources Information Center
Robertson, J.; Roberts, H.; Emerson, E.; Turner, S.; Greig, R.
2011-01-01
Background: Health checks for people with intellectual disabilities (ID) have been recommended as one component of health policy responses to the poorer health of people with ID. This review summarises evidence on the impact of health checks on the health and well-being of people with ID. Methods: Electronic literature searches and email contacts…
Kiuchi, T; Kaihara, S
1997-02-01
The World Wide Web-based form is a promising method for the construction of an on-line data collection system for clinical and epidemiological research. It is, however, laborious to prepare a common gateway interface (CGI) program for each project, which the World Wide Web server needs to handle the submitted data. In medicine, it is even more laborious because the CGI program must check deficits, type, ranges, and logical errors (bad combination of data) of entered data for quality assurance as well as data length and meta-characters of the entered data to enhance the security of the server. We have extended the specification of the hypertext markup language (HTML) form to accommodate information necessary for such data checking and we have developed software named AUTOFORM for this purpose. The software automatically analyzes the extended HTML form and generates the corresponding ordinary HTML form, 'Makefile', and C source of CGI programs. The resultant CGI program checks the entered data through the HTML form, records them in a computer, and returns them to the end-user. AUTOFORM drastically reduces the burden of development of the World Wide Web-based data entry system and allows the CGI programs to be more securely and reliably prepared than had they been written from scratch.
Rukke, Bjørn Arne; Soleng, Arnulf; Lindstedt, Heidi Heggen; Ottesen, Preben; Birkemoe, Tone
2014-05-01
How head lice infestations are managed by households is an important but generally neglected issue in head lice research. In the present study, we investigate actions taken against head lice by Norwegian households in association with socioeconomic status, family background, school-related variables and other key factors. Repeat questionnaires distributed to caretakers of the same elementary school children during a 2-year period enabled us to study both previous head lice management and any changes in this management through time. Households from 12 schools spanning the main socioeconomic variation found in Norway participated in the study. All students with active head lice infestation were treated in the four investigated periods. Most caretakers used a thorough head lice checking technique and informed others of own infestation. Checking frequency was low as most children were inspected less than monthly. The best determinant of increased checking frequency and thoroughness was personal experience with head lice. The increased awareness, however, seemed to be somewhat short-lived, as there was a decrease in checking frequency and thoroughness within 1 year after infestation. Personal experience with head lice also increased general knowledge related to the parasite. Parents born in developing countries checked their children for head lice more frequently, although less thoroughly, informed fewer contacts when infested, used pediculicides preventively more often and knew less about head lice than parents born in developed countries. Households with highly educated mothers had a lower checking frequency, but their knowledge and willingness to inform others was high. Single parents were more concerned about economic costs and kept children home from school longer while infested than other parents. As head lice management varied among socioeconomic groups and with parental background, differentiated advice should be considered in the control of head lice. The biannual focus on head lice during the 2 years of investigation increased checking thoroughness, while checking frequency remained unchanged. Based on the results, we suggest new head lice management guidelines for health authorities.
Technical Efficiency of Hospitals in Tehran, Iran.
Kakeman, Edris; Rahimi Forushani, Abbas; Dargahi, Hossein
2016-04-01
Nowadays, restriction on access and optimum use of resources is the main challenge of development in all organizations. Therefore, the aim of this study was to determine the technical efficiency and its factors, influencing hospitals of Tehran. This research was a descriptive-analytical and retrospective study conducted in 2014-2015. Fifty two hospitals with public, private, and social security ownership type were selected for this study. The required data was collected by a researcher-made check list in 3 sections of background data, inputs and outputs. The data was analyzed by DEAP 1.0.2, and STATA-13 technique. Seventeen (31/48) of hospitals had the efficiency score of 1 as the highest technical efficiency. The highest average score of efficiency was related to social security hospitals as 84.32, and then the public and private hospitals with the average of 84.29 and 79.64 respectively. Tobit regression results showed that the size, type of practice, and ownership of hospitals were effective on the degree of their technical efficiency. However, there was no significant correlation between teaching / non-teaching hospitals with technical efficiency. Establishment of competition system among hospitals, constitution of medium size hospitals and allocation of budget to hospitals based on national accreditation system are recommended.
HIPPA compliance for vendors and suppliers.
White, John M
2014-01-01
Between 30 to 45% of breaches in Protected Health Information (PHI) involve vendors, yet in most cases it is the hospital that is held liable for the breach. In this article, the author explores the practice of relying on vendors to conduct their own background checks of employees they assign to hospitals. He provides guidance on how hospitals can insure that such checks are up to the standards of the hospital's own background procedures without taking over that responsibility from vendors.
The impact of joint responses of devices in an airport security system.
Nie, Xiaofeng; Batta, Rajan; Drury, Colin G; Lin, Li
2009-02-01
In this article, we consider a model for an airport security system in which the declaration of a threat is based on the joint responses of inspection devices. This is in contrast to the typical system in which each check station independently declares a passenger as having a threat or not having a threat. In our framework the declaration of threat/no-threat is based upon the passenger scores at the check stations he/she goes through. To do this we use concepts from classification theory in the field of multivariate statistics analysis and focus on the main objective of minimizing the expected cost of misclassification. The corresponding correct classification and misclassification probabilities can be obtained by using a simulation-based method. After computing the overall false alarm and false clear probabilities, we compare our joint response system with two other independently operated systems. A model that groups passengers in a manner that minimizes the false alarm probability while maintaining the false clear probability within specifications set by a security authority is considered. We also analyze the staffing needs at each check station for such an inspection scheme. An illustrative example is provided along with sensitivity analysis on key model parameters. A discussion is provided on some implementation issues, on the various assumptions made in the analysis, and on potential drawbacks of the approach.
Australian DefenceScience. Volume 16, Number 2, Winter
2008-01-01
Making Virtual Advisers speedily interactive To provide an authentically interactive experience for humans working with Virtual Advisers, the Virtual...peer trusted and strong authentication for checking of security credentials without recourse to third parties or infrastructure, thus eliminating...multiple passwords, or carry around multiple security tokens.” Each CodeStick device is readied for use with a biometric authentication process. Since
[Airport security check of medical substances used during patient repatriation].
Felkai, Péter
2012-09-16
During airport security check of passenger luggage, hazardous items and substances are prohibited to be taken into the restricted safety zone of the airport and the aircraft. Among equipment of the medical staff escorting the patient, there are several devices and materials which are considered hazardous for security reasons. However, medical equipment and substances are indispensable for treating patients during the flight. The aim of the author was to present his experience obtained with the use of an instrument developed for testing liquids, aerosols and gels for security reasons. An instrument based on Raman spectroscopy was used for the identification of medical substances. The results confirmed that the instrument was able to recognize the tested medical substances. The non-destructive testing maintained sample integrity and asepsis. The data indicate that the instrument has a promising utility for the identification of medical substances. It seems important that during repatriation medical substances should be selected not only on the ground of their medical necessity, but their packaging should be also taken into consideration. It is necessary to perform more tests on different medical substances used in emergency care in order to make the database of medical substances stored in the library of instrument more complete.
2004-03-19
informal management style used during the war years was not suited to the longer-term security issues of the post-war era. As US grand strategy became...Eisenhower Doctrine in 1957. THE CASE OF LEBANON Each of the above mentioned security policies were products of American diplomacy aimed at managing the...consisting of its East and West entities, found itself a principle player in the American-led security alliance structure designed to check Soviet
NASA Astrophysics Data System (ADS)
Xie, Chang; Wen, Jing; Liu, Wenying; Wang, Jiaming
With the development of intelligent dispatching, the intelligence level of network control center full-service urgent need to raise. As an important daily work of network control center, the application of maintenance scheduling intelligent arrangement to achieve high-quality and safety operation of power grid is very important. By analyzing the shortages of the traditional maintenance scheduling software, this paper designs a power grid maintenance scheduling intelligence arrangement supporting system based on power flow forecasting, which uses the advanced technologies in maintenance scheduling, such as artificial intelligence, online security checking, intelligent visualization techniques. It implements the online security checking of maintenance scheduling based on power flow forecasting and power flow adjusting based on visualization, in order to make the maintenance scheduling arrangement moreintelligent and visual.
Privacy-preserving public auditing for data integrity in cloud
NASA Astrophysics Data System (ADS)
Shaik Saleem, M.; Murali, M.
2018-04-01
Cloud computing which has collected extent concentration from communities of research and with industry research development, a large pool of computing resources using virtualized sharing method like storage, processing power, applications and services. The users of cloud are vend with on demand resources as they want in the cloud computing. Outsourced file of the cloud user can easily tampered as it is stored at the third party service providers databases, so there is no integrity of cloud users data as it has no control on their data, therefore providing security assurance to the users data has become one of the primary concern for the cloud service providers. Cloud servers are not responsible for any data loss as it doesn’t provide the security assurance to the cloud user data. Remote data integrity checking (RDIC) licenses an information to data storage server, to determine that it is really storing an owners data truthfully. RDIC is composed of security model and ID-based RDIC where it is responsible for the security of every server and make sure the data privacy of cloud user against the third party verifier. Generally, by running a two-party Remote data integrity checking (RDIC) protocol the clients would themselves be able to check the information trustworthiness of their cloud. Within the two party scenario the verifying result is given either from the information holder or the cloud server may be considered as one-sided. Public verifiability feature of RDIC gives the privilege to all its users to verify whether the original data is modified or not. To ensure the transparency of the publicly verifiable RDIC protocols, Let’s figure out there exists a TPA who is having knowledge and efficiency to verify the work to provide the condition clearly by publicly verifiable RDIC protocols.
Tsai, Wei-Kai; Lai, Yung-Sheng; Tseng, Po-Jung; Liao, Chia-Hsien; Chan, Yang-Hsiang
2017-09-13
Semiconducting polymer dots (Pdots) have recently emerged as a novel type of ultrabright fluorescent probes that can be widely used in analytical sensing and material science. Here, we developed a dual visual reagent based on Pdots for anticounterfeiting applications. We first designed and synthesized two types of photoswitchable Pdots by incorporating photochromic dyes with multicolor semiconducting polymers to modulate their emission intensities and wavelengths. The resulting full-color Pdot assays showed that the colorimetric and fluorescent dual-readout abilities enabled the Pdots to serve as an anticounterfeiting reagent with low background interference. We also doped these Pdots into flexible substrates and prepared these Pdots as inks for pen handwriting as well as inkjet printing. We further applied this reagent in printing paper and checks for high-security anticounterfeiting purposes. We believe that this dual-readout method based on Pdots will create a new avenue for developing new generations of anticounterfeiting technologies.
28 CFR 105.26 - State agency's responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Section 105.26 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND... responsible for: (1) Determining whether to establish a fee to perform a check of state criminal history... fingerprint submissions and fees from the authorized employer; performing a check of state criminal history...
28 CFR 105.26 - State agency's responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section 105.26 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND... responsible for: (1) Determining whether to establish a fee to perform a check of state criminal history... fingerprint submissions and fees from the authorized employer; performing a check of state criminal history...
28 CFR 105.26 - State agency's responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Section 105.26 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND... responsible for: (1) Determining whether to establish a fee to perform a check of state criminal history... fingerprint submissions and fees from the authorized employer; performing a check of state criminal history...
28 CFR 105.26 - State agency's responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 105.26 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND... responsible for: (1) Determining whether to establish a fee to perform a check of state criminal history... fingerprint submissions and fees from the authorized employer; performing a check of state criminal history...
28 CFR 105.26 - State agency's responsibilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 105.26 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND... responsible for: (1) Determining whether to establish a fee to perform a check of state criminal history... fingerprint submissions and fees from the authorized employer; performing a check of state criminal history...
VIEW OF DOWNSTREAM SIDE OF CHECK DAM, CONCRETE SPILLWAY WITH ...
VIEW OF DOWNSTREAM SIDE OF CHECK DAM, CONCRETE SPILLWAY WITH MORTARED ROCK WALLS, AND CIPPOLETTI WEIR ON TUMALO RESERVOIR FEED CANAL NEAR COLLINS ROAD (IN BACKGROUND). LOOKING NORTHEAST - Tumalo Irrigation District, Tumalo Project, West of Deschutes River, Tumalo, Deschutes County, OR
Rep. McCarthy, Carolyn [D-NY-4
2013-01-03
House - 01/25/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
A New Security Paradigm for Anti-Counterfeiting: Guidelines and an Implementation Roadmap
NASA Astrophysics Data System (ADS)
Lehtonen, Mikko
Product counterfeitingand piracy continue to plague brand and trademark owners across industry sectors. This chapter analyses the reasons for ineffectiveness of past technical anti-counterfeitingstrategies and formulates managerial guidelines for effective use of RFID in anti-counterfeiting. An implementation roadmap toward secure authentication of products tagged with EPC Gen-2 tags is proposed and possible supply chain locations for product checks are discussed.
Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier
NASA Astrophysics Data System (ADS)
Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui
2018-03-01
In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.
DOT National Transportation Integrated Search
2008-09-01
Air carriers remain a front-line defense against acts of terrorism that target the nations civil aviation system. A key responsibility of air carriers is to check passengers names against terrorist watch-list records to identify persons who sho...
17 CFR 229.1003 - (Item 1003) Identity and background of filing person.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1003 (Item 1003) Identity and background of filing person. (a) Name and address. State...
17 CFR 229.1003 - (Item 1003) Identity and background of filing person.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1003 (Item 1003) Identity and background of filing person. (a) Name and address. State...
17 CFR 229.1003 - (Item 1003) Identity and background of filing person.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1003 (Item 1003) Identity and background of filing person. (a) Name and address. State...
17 CFR 229.1003 - (Item 1003) Identity and background of filing person.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1003 (Item 1003) Identity and background of filing person. (a) Name and address. State...
Asirdizer, Mahmut; Turkmen, Nursel; Akan, Okan; Yavuz, Mehmet Sunay
2014-06-01
Injury and death cases caused by booby traps are not common in forensic medicine practice. Besides, installation of booby traps including firearms is generally for suicidal and rarely for homicidal purposes. Although few patents were described about home security alarm system that were created by firearms in the United States, 1 sample of injury with a similar unconventional mechanism of home safety system was reported by Asirdizer and Yavuz in 2009. In the published case report, the story of an electrical technician who was invited to a summer house by the homeowner to check the home security alarm system was reported. In the so-called report, he was stated to be injured by the shotgun attached to the unconventional home security alarm system while checking the system. As a result, the homeowner was convicted of a possible intent to cause a life-threatening injury to the technician.The so-called homeowner and his wife died by the same shotgun attached to the same unconventional home security alarm system 4 years on from the first event. In the present case report, we have aimed to present the findings of the crime scene and the autopsies of these unusual 2 deaths and to discuss individual and legal factors in paving the way for the deaths of 2 people.
Employing the Intelligence Cycle Process Model Within the Homeland Security Enterprise
2013-12-01
the Iraq anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department and hip hop bands to spread Sharia law in the U.S. A Virginia...challenges remain with threat notification, access to information, and database management of information that may have contributed the 2013 Boston...The FBI said it took a number of investigative steps to check on the request, including looking at his travel history, checking databases for
31 CFR 103.39 - Person outside the United States.
Code of Federal Regulations, 2010 CFR
2010-07-01
... of currency, other monetary instruments, checks, investment securities, or credit to the domestic... transaction on the books of a domestic financial institution involving the account of a customer of such...
28 CFR 115.317 - Hiring and promotion decisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... records check; (2) Consult any child abuse registry maintained by the State or locality in which the... also perform a criminal background records check, and consult applicable child abuse registries, before... sexual abuse in a prison, jail, lockup, community confinement facility, juvenile facility, or other...
28 CFR 115.317 - Hiring and promotion decisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... records check; (2) Consult any child abuse registry maintained by the State or locality in which the... also perform a criminal background records check, and consult applicable child abuse registries, before... sexual abuse in a prison, jail, lockup, community confinement facility, juvenile facility, or other...
28 CFR 115.317 - Hiring and promotion decisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... records check; (2) Consult any child abuse registry maintained by the State or locality in which the... also perform a criminal background records check, and consult applicable child abuse registries, before... sexual abuse in a prison, jail, lockup, community confinement facility, juvenile facility, or other...
28 CFR 105.21 - Purpose and authority.
Code of Federal Regulations, 2014 CFR
2014-07-01
....21 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... regulate the exchange of criminal history record information (“CHRI”), as defined in 28 CFR 20.3(d), and...). Section 6402 authorizes a fingerprint-based criminal history check of state and national criminal history...
28 CFR 105.21 - Purpose and authority.
Code of Federal Regulations, 2013 CFR
2013-07-01
....21 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... regulate the exchange of criminal history record information (“CHRI”), as defined in 28 CFR 20.3(d), and...). Section 6402 authorizes a fingerprint-based criminal history check of state and national criminal history...
28 CFR 105.21 - Purpose and authority.
Code of Federal Regulations, 2012 CFR
2012-07-01
....21 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... regulate the exchange of criminal history record information (“CHRI”), as defined in 28 CFR 20.3(d), and...). Section 6402 authorizes a fingerprint-based criminal history check of state and national criminal history...
28 CFR 105.21 - Purpose and authority.
Code of Federal Regulations, 2011 CFR
2011-07-01
....21 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... regulate the exchange of criminal history record information (“CHRI”), as defined in 28 CFR 20.3(d), and...). Section 6402 authorizes a fingerprint-based criminal history check of state and national criminal history...
28 CFR 105.21 - Purpose and authority.
Code of Federal Regulations, 2010 CFR
2010-07-01
....21 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... regulate the exchange of criminal history record information (“CHRI”), as defined in 28 CFR 20.3(d), and...). Section 6402 authorizes a fingerprint-based criminal history check of state and national criminal history...
6 CFR 37.45 - Background checks for covered employees.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., the validation of references from prior employment, a name-based and fingerprint-based criminal.... States must conduct a name-based and fingerprint-based criminal history records check (CHRC) using, at a minimum, the FBI's National Crime Information Center (NCIC) and the Integrated Automated Fingerprint...
6 CFR 37.45 - Background checks for covered employees.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., the validation of references from prior employment, a name-based and fingerprint-based criminal.... States must conduct a name-based and fingerprint-based criminal history records check (CHRC) using, at a minimum, the FBI's National Crime Information Center (NCIC) and the Integrated Automated Fingerprint...
6 CFR 37.45 - Background checks for covered employees.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., the validation of references from prior employment, a name-based and fingerprint-based criminal.... States must conduct a name-based and fingerprint-based criminal history records check (CHRC) using, at a minimum, the FBI's National Crime Information Center (NCIC) and the Integrated Automated Fingerprint...
6 CFR 37.45 - Background checks for covered employees.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., the validation of references from prior employment, a name-based and fingerprint-based criminal.... States must conduct a name-based and fingerprint-based criminal history records check (CHRC) using, at a minimum, the FBI's National Crime Information Center (NCIC) and the Integrated Automated Fingerprint...
6 CFR 37.45 - Background checks for covered employees.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., the validation of references from prior employment, a name-based and fingerprint-based criminal.... States must conduct a name-based and fingerprint-based criminal history records check (CHRC) using, at a minimum, the FBI's National Crime Information Center (NCIC) and the Integrated Automated Fingerprint...
The Need for an Implant Identification Card at Airport Security Check.
Ali, Erden; Kosuge, Dennis; MacDowell, Andrew
2017-06-01
Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more invasive searches at airport security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
Code of Federal Regulations, 2012 CFR
2012-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
Code of Federal Regulations, 2014 CFR
2014-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
Code of Federal Regulations, 2011 CFR
2011-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR § 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... January 2004 (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
A model of airport security work flow based on petri net
NASA Astrophysics Data System (ADS)
Dong, Xinming
2017-09-01
Extremely long lines at airports in the United States have been sharply criticized. In order to find out the bottleneck in the existing security system and put forward reasonable improvement plans and proposal, the Petri net model and the Markov Chain are introduced in this paper. This paper uses data collected by transportation Security Agency (TSA), assuming the data can represent the average level of all airports in the Unites States, to analysis the performance of security check system. By calculating the busy probabilities and the utilization probabilities, the bottleneck is found. Moreover, recommendation is given based on the parameters’ modification in Petri net model.
76 FR 30405 - Information Collection Request Under OMB Review
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
..., the National Agency Check (NAC) Questionnaire for Peace Corps Volunteer Background Investigation (OMB... INFORMATION: The NAC Questionnaire for Peace Corps Volunteer Background Investigation Form is used to conduct... Volunteer Background Investigation. Type of Review: Reinstatement, without change, of a previously approved...
Security Awareness Bulletin. Number 2-91, September 1991
1991-09-01
governments, competitors, In our rapidly changing workplace, computers and those having criminal intent, that uncontrolled access routinely communicate with...same as above; rental fee is slightly higher. Securily A wareness Bulletin 10 Number 2-91 New AIS Requirements in the Defense Industrial Security...original file copy. But remember, check the original for viruses 6. Files grow in size. Infamous to the Nvir, this before locking and relying upon it as a
A Weakest Precondition Approach to Robustness
NASA Astrophysics Data System (ADS)
Balliu, Musard; Mastroeni, Isabella
With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.
2016-04-01
determinations are more common for certain invertebrates , such as gastropods (snails), but the taxonomy is improving rapidly. The RSI approach to resource...arrow for invertebrate animals. Check the box for Mollusca. Then check to make sure your status and location criteria remain the same, search for the...mollusk list and store. Go back to invertebrate animals and select the down arrow for “Crustacea”. Then select crayfish, isopods, amphipods, and
42 CFR 424.518 - Screening levels for Medicare providers and suppliers.
Code of Federal Regulations, 2012 CFR
2012-10-01
... this section. (ii)(A) Requires the submission of a set of fingerprints for a national background check... provider or supplier; and (B) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who...
42 CFR 424.518 - Screening levels for Medicare providers and suppliers.
Code of Federal Regulations, 2014 CFR
2014-10-01
... this section. (ii)(A) Requires the submission of a set of fingerprints for a national background check... provider or supplier; and (B) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who...
42 CFR 424.518 - Screening levels for Medicare providers and suppliers.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Requires the submission of a set of fingerprints for a national background check from all individuals who...) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who maintain a 5 percent or greater...
42 CFR 424.518 - Screening levels for Medicare providers and suppliers.
Code of Federal Regulations, 2013 CFR
2013-10-01
... this section. (ii)(A) Requires the submission of a set of fingerprints for a national background check... provider or supplier; and (B) Conducts a fingerprint-based criminal history record check of the Federal Bureau of Investigation's Integrated Automated Fingerprint Identification System on all individuals who...
Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers
2015-01-01
Background The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. Objective The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. Methods The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. Results We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. Conclusions The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost. PMID:26215155
[Advanced information technologies for financial services industry]. Final report
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
The project scope is to develop an advanced user interface utilizing speech and/or handwriting recognition technology that will improve the accuracy and speed of recording transactions in the dynamic environment of a foreign exchange (FX) trading floor. The project`s desired result is to improve the base technology for trader`s workstations on FX trading floors. Improved workstation effectiveness will allow vast amounts of complex information and events to be presented and analyzed, thus increasing the volume of money and other assets to be exchanged at an accelerated rate. The project scope is to develop and demonstrate technologies that advance interbank checkmore » imaging and paper check truncation. The following describes the tasks to be completed: (1) Identify the economics value case, the legal and regulatory issues, the business practices that are affected, and the effects upon settlement. (2) Familiarization with existing imaging technology. Develop requirements for image quality, security, and interoperability. Adapt existing technologies to meet requirements. (3) Define requirements for the imaging laboratory and design its architecture. Integrate and test technology from task 2 with equipment in the laboratory. (4) Develop and/or integrate and test remaining components; includes security, storage, and communications. (5) Build a prototype system and test in a laboratory. Install and run in two or more banks. Develop documentation. Conduct training. The project`s desired result is to enable a proof-of-concept trial in which multiple banks will exchange check images, exhibiting operating conditions which a check experiences as it travels through the payments/clearing system. The trial should demonstrate the adequacy of digital check images instead of paper checks.« less
14 CFR 1203.200 - Background and discussion.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...
14 CFR 1203.200 - Background and discussion.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...
Forensic patients--who is watching them?
White, John M
2012-01-01
Does your hospital security department have the right and/or responsibility for checking out the qualifications and practices of private contractors hired by law enforcement to guard forensic patients? In this article, the author explains why you should.
19 CFR 123.76 - Authorization by Customs for participants to use certain drivers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS RELATIONS WITH CANADA AND MEXICO Land Border Carrier... part, to conduct, to the extent allowed by law, employment and criminal history checks on all personnel...
Best Way to Get Rid of Used Needles and Other Sharps
... other options are not available. If traveling by plane, check the Transportation Security Administration (TSA) website for ... be thrown away in the common trash. Additional Consumer Information How to Get Rid of a Sharps ...
National Wind Technology Center | NREL
driver's license, passport, or military ID) to obtain a security badge before entering the site. Foreign nationals must check with their host prior to their visit to make sure that a Foreign National Data Card has
2007-03-01
software level retrieve state information that can inherently contain more contextual information . As a result, such mechanisms can be applied in more...ease by which state information can be gathered for monitoring purposes. For example, we consider soft security to allow for easier state retrieval ...files are to be checked and what parameters are to be verified. The independent auditor periodically retrieves information pertaining to the files in
Specifying and Verifying Organizational Security Properties in First-Order Logic
NASA Astrophysics Data System (ADS)
Brandt, Christoph; Otten, Jens; Kreitz, Christoph; Bibel, Wolfgang
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell-La Padula. We show that these policies can be represented by formal requirements and constraints in first-order logic. By additionally providing a formal model for the flow of data between business departments we demonstrate how security policies can be applied to a concrete organizational setting and checked with a first-order theorem prover. Our approach can be applied without requiring a deep formal expertise and it therefore promises a high potential of usability in the business.
78 FR 23872 - HIPAA Privacy Rule and the National Instant Criminal Background Check System (NICS)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-23
... any unintended adverse consequences for individuals seeking needed mental health services that may be... Check System (NICS) to help enforce these prohibitions.\\4\\ The NICS Index, a database administered by... to the NICS. Such an amendment might produce clarity regarding the Privacy Rule and help make it as...
How You Can Identify People Who Shouldn't Work with Kids.
ERIC Educational Resources Information Center
Zakariya, Sally Banks
1988-01-01
To identify applicants with past criminal records, 22 states have passed laws making F.B.I. checks mandatory for teacher certification. Because many teachers are affronted by background checks and fingerprinting, unions often block this type of proposed legislation. Insets provide tips on avoiding defamation and negligent hiring charges and on…
A methodology for secure recovery of spacecrafts based on a trusted hardware platform
NASA Astrophysics Data System (ADS)
Juliato, Marcio; Gebotys, Catherine
2017-02-01
This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.
29 CFR 1915.71 - Scaffolds or staging.
Code of Federal Regulations, 2010 CFR
2010-07-01
... large, loose or dead knots. It shall also be free from dry rot, large checks, worm holes or other... shall have a loop or eye at the top for securing the supporting hook on the block. (7) Two or more...
Helical tomotherapy quality assurance with ArcCHECK.
Chapman, David; Barnett, Rob; Yartsev, Slav
2014-01-01
To design a quality assurance (QA) procedure for helical tomotherapy that measures multiple beam parameters with 1 delivery and uses a rotating gantry to simulate treatment conditions. The customized QA procedure was preprogrammed on the tomotherapy operator station. The dosimetry measurements were performed using an ArcCHECK diode array and an A1SL ion chamber inserted in the central holder. The ArcCHECK was positioned 10cm above the isocenter so that the 21-cm diameter detector array could measure the 40-cm wide tomotherapy beam. During the implementation of the new QA procedure, separate comparative measurements were made using ion chambers in both liquid and solid water, the tomotherapy onboard detector array, and a MapCHECK diode array for a period of 10 weeks. There was good agreement (within 1.3%) for the beam output and cone ratio obtained with the new procedure and the routine QA measurements. The measured beam energy was comparable (0.3%) to solid water measurement during the 10-week evaluation period, excluding 2 of the 10 measurements with unusually high background. The symmetry reading was similarly compromised for those 2 weeks, and on the other weeks, it deviated from the solid water reading by ~2.5%. The ArcCHECK phantom presents a suitable alternative for performing helical tomotherapy QA, provided the background is collected properly. The proposed weekly procedure using ArcCHECK and water phantom makes the QA process more efficient. Copyright © 2014 American Association of Medical Dosimetrists. Published by Elsevier Inc. All rights reserved.
Helical tomotherapy quality assurance with ArcCHECK
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chapman, David; Barnett, Rob; Yartsev, Slav, E-mail: slav.yartsev@lhsc.on.ca
2014-07-01
To design a quality assurance (QA) procedure for helical tomotherapy that measures multiple beam parameters with 1 delivery and uses a rotating gantry to simulate treatment conditions. The customized QA procedure was preprogrammed on the tomotherapy operator station. The dosimetry measurements were performed using an ArcCHECK diode array and an A1SL ion chamber inserted in the central holder. The ArcCHECK was positioned 10 cm above the isocenter so that the 21-cm diameter detector array could measure the 40-cm wide tomotherapy beam. During the implementation of the new QA procedure, separate comparative measurements were made using ion chambers in both liquidmore » and solid water, the tomotherapy onboard detector array, and a MapCHECK diode array for a period of 10 weeks. There was good agreement (within 1.3%) for the beam output and cone ratio obtained with the new procedure and the routine QA measurements. The measured beam energy was comparable (0.3%) to solid water measurement during the 10-week evaluation period, excluding 2 of the 10 measurements with unusually high background. The symmetry reading was similarly compromised for those 2 weeks, and on the other weeks, it deviated from the solid water reading by ∼2.5%. The ArcCHECK phantom presents a suitable alternative for performing helical tomotherapy QA, provided the background is collected properly. The proposed weekly procedure using ArcCHECK and water phantom makes the QA process more efficient.« less
The Community College Internship Program at NREL | NREL
lower. Drug Screening and Background Check NREL coordinates a one-time background investigation and drug the drug screening, they have 72 hours to complete the required urine test. Work Hours NREL encourages
Comparing the effectiveness of monetary versus moral motives in environmental campaigning
NASA Astrophysics Data System (ADS)
Bolderdijk, J. W.; Steg, L.; Geller, E. S.; Lehman, P. K.; Postmes, T.
2013-04-01
Environmental campaigns often promote energy conservation by appealing to economic (for example, lower electricity bills) rather than biospheric concerns (for example, reduced carbon emissions), assuming that people are primarily motivated by economic self-interest. However, people also care about maintaining a favourable view of themselves (they want to maintain a `positive self-concept'), and may prefer to see themselves as `green' rather than `greedy'. Consequently, people may find economic appeals less attractive than biospheric appeals. Across two studies, participants indicated feeling better about biospheric (`Want to protect the environment? Check your car's tire pressure') than economic (`Want to save money? Check your car's tire pressure') tyre-check appeals. In a field experiment, we found that an economic tyre-check appeal (`Do you care about your finances? Get a free tire check') elicited significantly less compliance than parallel biospheric and neutral appeals. Together, these studies discredit the conventional wisdom that appealing to economic self-interest is the best way to secure behaviour change. At least in some cases, our studies suggest, this strategy is not effective.
A Look at Constitutional Checks and Balances: Study Sheets for U.S. History.
ERIC Educational Resources Information Center
Scott, Nancy
This document is intended as a resource guide for teachers to use in helping students to understand how the United States system of government operates. It examines the background, historical application, and current debate concerning the principle of checks and balances. Ten study sheets feature various figures and episodes prominently associated…
Cost Estimation of a Health-Check Intervention for Adults with Intellectual Disabilities in the UK
ERIC Educational Resources Information Center
Romeo, R.; Knapp, M.; Morrison, J.; Melville, C.; Allan, L.; Finlayson, J.; Cooper, S.-A.
2009-01-01
Background: High rates of health needs among adults with intellectual disabilities flag the need for information about the economic consequences of strategies to identify and address unmet needs. Health-check interventions are one such strategy, and have been demonstrated to effect health gains over the following 12-month period. However, little…
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Background. 1292.3 Section 1292.3 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.3 Background. Section 21 of the Internal Security Act of 1950...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Background. 1292.3 Section 1292.3 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.3 Background. Section 21 of the Internal Security Act of 1950...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Background. 1292.3 Section 1292.3 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.3 Background. Section 21 of the Internal Security Act of 1950...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Background. 1292.3 Section 1292.3 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.3 Background. Section 21 of the Internal Security Act of 1950...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Background. 1292.3 Section 1292.3 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES § 1292.3 Background. Section 21 of the Internal Security Act of 1950...
2009 Homeland Security Symposium and Exhibition
2009-09-10
electronified check, ACH or Draft • Opportunity for Merchant and Merchant employee collusion • Remote Deposit Collection (RDC) • eCommerce – a world of new...police _$; _ Units US Coast Guard _$; _ Units Urban Search & Rescue _$; _ Units Rural Search & Rescue _$; _ Units Public/ University hospitals
Code of Federal Regulations, 2010 CFR
2010-04-01
... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...
Code of Federal Regulations, 2011 CFR
2011-04-01
... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...
Code of Federal Regulations, 2014 CFR
2014-04-01
... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...
Code of Federal Regulations, 2013 CFR
2013-04-01
... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...
Code of Federal Regulations, 2012 CFR
2012-04-01
... FAMILY VIOLENCE PREVENTION Minimum Standards of Character and Suitability for Employment § 63.18 Are the... Check and Inquiries which includes a search of the OPM Security/Suitability Investigations Index (SII...
Code of Federal Regulations, 2011 CFR
2011-07-01
... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-24
...' participants (non- FDA employees) is through Building 1 where routine security check procedures will be... headquarters versus those in other locations who have less physical access. 4. How to support engagement of...
NASA Astrophysics Data System (ADS)
Chao, Luo
2015-11-01
In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.
Granberry, Nancy
2007-03-01
Occupational health nurses' ability to use email efficiently and effectively enhances their professionalism, responsiveness, and overall communications. Poorly written emails can damage the reputations of nurses and their organizations. Knowing when not to communicate by email is as important as being able to write effective emails. Many safeguards can be employed to prevent or minimize confusion and strengthen email communications. Names and addresses must be checked, appropriate subject lines used, and humor applied conscientiously. All emails should be proofread prior to sending, and replies must be carefully considered. Simple, colorless email backgrounds make downloading quicker. Sharp, clear fonts are easier on the eyes. Direct and defined requests and confirmations augment communication. Once "Send" is pressed, the email is out of the sender's control. Lack of network security, forwarding by others, and potential confidentiality breaches can lead to legal or public relations controversies. Email is an important business tool. Occupational health nurses must be competent in the skills of effective email communication, as it is an integral part of business and health care.
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
IT Security Standards and Legal Metrology - Transfer and Validation
NASA Astrophysics Data System (ADS)
Thiel, F.; Hartmann, V.; Grottker, U.; Richter, D.
2014-08-01
Legal Metrology's requirements can be transferred into the IT security domain applying a generic set of standardized rules provided by the Common Criteria (ISO/IEC 15408). We will outline the transfer and cross validation of such an approach. As an example serves the integration of Legal Metrology's requirements into a recently developed Common Criteria based Protection Profile for a Smart Meter Gateway designed under the leadership of the Germany's Federal Office for Information Security. The requirements on utility meters laid down in the Measuring Instruments Directive (MID) are incorporated. A verification approach to check for meeting Legal Metrology's requirements by their interpretation through Common Criteria's generic requirements is also presented.
Copper Soldiers: Forging New Roles for the Chilean Military
2005-09-01
post of the Chief of Staff of the Armed Forces and Carabineros.” Finally, articles 95 and 96 created a National Security Council which included the...Nacional (RN) and the Unión Demócrata Independiente (UDI), felt an “independent security power”129 such as the military served as a check on the...Democracy: Latin America and the Caribbean in the Post -Cold War Era, ed. Jorge I. Domínguez (Pittsburgh: University of Pittsburgh Press, 1998), 131
Design of an autonomous exterior security robot
NASA Technical Reports Server (NTRS)
Myers, Scott D.
1994-01-01
This paper discusses the requirements and preliminary design of robotic vehicle designed for performing autonomous exterior perimeter security patrols around warehouse areas, ammunition supply depots, and industrial parks for the U.S. Department of Defense. The preliminary design allows for the operation of up to eight vehicles in a six kilometer by six kilometer zone with autonomous navigation and obstacle avoidance. In addition to detection of crawling intruders at 100 meters, the system must perform real-time inventory checking and database comparisons using a microwave tags system.
2012-04-01
offered transparency and force limitations through clear rules of the game, enabling former enemies to keep suspicions in check. It guarantees...will have to change. Of course, it will change should oil prices drop to the point of getting Russia on its knees . Beyond such a scenario, there will...and addressing security challenges in and around Europe. Today’s declaratory policy hardly matches the facts on the ground, and the rules of the
From a Proven Correct Microkernel to Trustworthy Large Systems
NASA Astrophysics Data System (ADS)
Andronick, June
The seL4 microkernel was the world's first general-purpose operating system kernel with a formal, machine-checked proof of correctness. The next big step in the challenge of building truly trustworthy systems is to provide a framework for developing secure systems on top of seL4. This paper first gives an overview of seL4's correctness proof, together with its main implications and assumptions, and then describes our approach to provide formal security guarantees for large, complex systems.
NASA Astrophysics Data System (ADS)
Arakelyan, E. K.; Andryushin, A. V.; Mezin, S. V.; Kosoy, A. A.; Kalinina, Ya V.; Khokhlov, I. S.
2017-11-01
The principle of interaction of the specified systems of technological protections by the Automated process control system (APCS) and information safety in case of incorrect execution of the algorithm of technological protection is offered. - checking the correctness of the operation of technological protection in each specific situation using the functional relationship between the monitored parameters. The methodology for assessing the economic feasibility of developing and implementing an information security system.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Web site. (To find the current fee amount, go to the Electronic Submittals page at http://www.nrc.gov... licensee verifies information such as name, date of birth, social security number, sex, and other...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Web site. (To find the current fee amount, go to the Electronic Submittals page at http://www.nrc.gov... licensee verifies information such as name, date of birth, social security number, sex, and other...
NOAA - National Oceanic and Atmospheric Administration - Information
Council Committees Services & Programs Freedom of Information Act (FOIA) Commerce Geospatial Resources Homeland Security and Employee Check-In Information Quality NOAA Libraries NOAALink Paperwork Reduction & Information Collection Privacy Radio Frequency Management Contact Us Staff Directory IT Workforce
Security Management and Safeguards Office
NASA Technical Reports Server (NTRS)
Bewley, Nathaniel M.
2004-01-01
The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
Doing Our Homework: A Pre-Employment Screening Checklist for Better Head Start Hiring.
ERIC Educational Resources Information Center
McSherry, Jim; Caruso, Karen; Cagnetta, Mary
1999-01-01
Provides a checklist for screening potential Head Start employees. Components include checks for criminal record, credit history, motor vehicle records, social security number tracing, previous address research, education verification, work and personal reference interview, and professional license verification. (KB)
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection
Dai, Huning; Murphy, Christian; Kaiser, Gail
2010-01-01
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923
28 CFR 25.4 - Record source categories.
Code of Federal Regulations, 2010 CFR
2010-07-01
....4 Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.4 Record source categories. It is anticipated that... to the NICS Index. Information in the NCIC and III systems that will be searched during a background...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
NASA Astrophysics Data System (ADS)
Polyakov, M.; Odinokov, S.
2017-05-01
The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.
Security bound of cheat sensitive quantum bit commitment.
He, Guang Ping
2015-03-23
Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.
Security Considerations and Recommendations in Computer-Based Testing
Al-Saleem, Saleh M.
2014-01-01
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee. PMID:25254250
Security considerations and recommendations in computer-based testing.
Al-Saleem, Saleh M; Ullah, Hanif
2014-01-01
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.
Code of Federal Regulations, 2011 CFR
2011-04-01
... charge(s), child abuse charge(s), or lawsuit(s) against the agency or person, related to the provision of... background check and a child abuse clearance for any such individual in the United States in a senior... check and a child abuse clearance to the accrediting entity; (2) Completes and retains a FBI Form FD-258...
Code of Federal Regulations, 2014 CFR
2014-04-01
... charge(s), child abuse charge(s), or lawsuit(s) against the agency or person, related to the provision of... background check and a child abuse clearance for any such individual in the United States in a senior... check and a child abuse clearance to the accrediting entity; (2) Completes and retains a FBI Form FD-258...
Code of Federal Regulations, 2013 CFR
2013-04-01
... charge(s), child abuse charge(s), or lawsuit(s) against the agency or person, related to the provision of... background check and a child abuse clearance for any such individual in the United States in a senior... check and a child abuse clearance to the accrediting entity; (2) Completes and retains a FBI Form FD-258...
Code of Federal Regulations, 2012 CFR
2012-04-01
... charge(s), child abuse charge(s), or lawsuit(s) against the agency or person, related to the provision of... background check and a child abuse clearance for any such individual in the United States in a senior... check and a child abuse clearance to the accrediting entity; (2) Completes and retains a FBI Form FD-258...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-06
...] Agency Information Collection Activities: Proposed Collection; Comments Requested: Appeals of Background... Information Collection (1) Type of Information Collection: Extension of a currently approved collection. (2) Title of the Form/Collection: Appeals of Background Checks. (3) Agency form number, if any, and the...
49 CFR Appendix A to Part 1511 - Aviation Security Infrastructure Fee
Code of Federal Regulations, 2010 CFR
2010-10-01
... costs of checkpoint screening personnel. 2. Salary, benefits, overtime, retirement and other costs of exit lane monitors. 3. Salary, benefits, overtime, retirement and other costs of cargo screeners. 4. Salary, benefits, overtime, retirement and other costs of checked baggage screeners. 5. Salary, benefits...
46 CFR 111.60-21 - Cable insulation tests.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...
46 CFR 111.60-21 - Cable insulation tests.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...
46 CFR 111.60-21 - Cable insulation tests.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...
46 CFR 111.60-21 - Cable insulation tests.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...
46 CFR 111.60-21 - Cable insulation tests.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Cable insulation tests. 111.60-21 Section 111.60-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS... electric power and lighting and associated equipment must be checked for proper insulation resistance to...
38 CFR 21.4153 - Reimbursement of expenses.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., such as social security, retirement, and health, accident, or life insurance, that are payable to all... of a contract must be supported by factual vouchers and all transportation allowances must be supported by detailed claims which can be checked against work assignments in the office of the State...
78 FR 32417 - Intent To Request Renewal From OMB of One Current Public Collection of Information...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
... Officer, Office of Information Technology (OIT), TSA-11, Transportation Security Administration, 601 South... technological collection techniques or other forms of information technology. Information Collection Requirement... provide fingerprints and undergo a criminal history records check. The program implements authorities set...
Aviation Security: Background and Policy Options for Screening and Securing Air Cargo
2008-02-25
today, employees with unescorted access privileges to security identification display areas ( SIDAs ) may access secured areas and aircraft without...where all-cargo aircraft are loaded and unloaded, as security identification display areas ( SIDAs ). This effectively elevates the required security
Wildlife on the Nevada National Security Site
Longshore, Kathleen M.; Wessells, Stephen M.
2017-09-05
Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.
Current Use of Underage Alcohol Compliance Checks by Enforcement Agencies in the U.S.
Erickson, Darin J.; Lenk, Kathleen M.; Sanem, Julia R.; Nelson, Toben F.; Jones-Webb, Rhonda; Toomey, Traci L.
2014-01-01
Background Compliance checks conducted by law enforcement agents can significantly reduce the likelihood of illegal alcohol sales to underage individuals, but these checks need to be conducted using optimal methods to maintain effectiveness. Materials and Methods We conducted a national survey of local and state enforcement agencies in 2010–2011 to assess: (1) how many agencies are currently conducting underage alcohol compliance checks, (2) how many agencies that conduct compliance checks use optimal methods—including checking all establishments in the jurisdiction, conducting checks at least 3–4 times per year, conducting follow-up checks within 3 months, and penalizing the licensee (not only the server/clerk) for failing a compliance check, and (3) characteristics of the agencies that conduct compliance checks. Results Just over one third of local law enforcement agencies and over two thirds of state agencies reported conducting compliance checks. However, only a small percentage of the agencies (4–6%) reported using all of the optimal methods to maximize effectiveness of these compliance checks. Local law enforcement agencies with an alcohol-related division, those with at least one full-time officer assigned to work on alcohol, and those in larger communities were significantly more likely to conduct compliance checks. State agencies with more full-time agents and those located in states where the state agency or both state and local enforcement agencies have primary responsibility (vs. only the local law agency) for enforcing alcohol retail laws were also more likely to conduct compliance checks; however, these agency characteristics did not remain statistically significant in the multivariate analyses. Conclusions Continued effort is needed to increase the number of local and state agencies conducting compliance checks using optimal methods to reduce youth access to alcohol. PMID:24716443
Decision Engines for Software Analysis Using Satisfiability Modulo Theories Solvers
NASA Technical Reports Server (NTRS)
Bjorner, Nikolaj
2010-01-01
The area of software analysis, testing and verification is now undergoing a revolution thanks to the use of automated and scalable support for logical methods. A well-recognized premise is that at the core of software analysis engines is invariably a component using logical formulas for describing states and transformations between system states. The process of using this information for discovering and checking program properties (including such important properties as safety and security) amounts to automatic theorem proving. In particular, theorem provers that directly support common software constructs offer a compelling basis. Such provers are commonly called satisfiability modulo theories (SMT) solvers. Z3 is a state-of-the-art SMT solver. It is developed at Microsoft Research. It can be used to check the satisfiability of logical formulas over one or more theories such as arithmetic, bit-vectors, lists, records and arrays. The talk describes some of the technology behind modern SMT solvers, including the solver Z3. Z3 is currently mainly targeted at solving problems that arise in software analysis and verification. It has been applied to various contexts, such as systems for dynamic symbolic simulation (Pex, SAGE, Vigilante), for program verification and extended static checking (Spec#/Boggie, VCC, HAVOC), for software model checking (Yogi, SLAM), model-based design (FORMULA), security protocol code (F7), program run-time analysis and invariant generation (VS3). We will describe how it integrates support for a variety of theories that arise naturally in the context of the applications. There are several new promising avenues and the talk will touch on some of these and the challenges related to SMT solvers. Proceedings
Aerial surveillance vehicles augment security at shipping ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Muhammad K.; Cheng, Samuel; Sluss, James J., Jr.; Landers, Thomas L.
2008-10-01
With the ever present threat to commerce, both politically and economically, technological innovations provide a means to secure the transportation infrastructure that will allow efficient and uninterrupted freight-flow operations for trade. Currently, freight coming into United States ports is "spot checked" upon arrival and stored in a container yard while awaiting the next mode of transportation. For the most part, only fences and security patrols protect these container storage yards. To augment these measures, the authors propose the use of aerial surveillance vehicles equipped with video cameras and wireless video downlinks to provide a birds-eye view of port facilities to security control centers and security patrols on the ground. The initial investigation described in this paper demonstrates the use of unmanned aerial surveillance vehicles as a viable method for providing video surveillance of container storage yards. This research provides the foundation for a follow-on project to use autonomous aerial surveillance vehicles coordinated with autonomous ground surveillance vehicles for enhanced port security applications.
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin
2018-01-01
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
Strategy optimization for mask rule check in wafer fab
NASA Astrophysics Data System (ADS)
Yang, Chuen Huei; Lin, Shaina; Lin, Roger; Wang, Alice; Lee, Rachel; Deng, Erwin
2015-07-01
Photolithography process is getting more and more sophisticated for wafer production following Moore's law. Therefore, for wafer fab, consolidated and close cooperation with mask house is a key to achieve silicon wafer success. However, generally speaking, it is not easy to preserve such partnership because many engineering efforts and frequent communication are indispensable. The inattentive connection is obvious in mask rule check (MRC). Mask houses will do their own MRC at job deck stage, but the checking is only for identification of mask process limitation including writing, etching, inspection, metrology, etc. No further checking in terms of wafer process concerned mask data errors will be implemented after data files of whole mask are composed in mask house. There are still many potential data errors even post-OPC verification has been done for main circuits. What mentioned here are the kinds of errors which will only occur as main circuits combined with frame and dummy patterns to form whole reticle. Therefore, strategy optimization is on-going in UMC to evaluate MRC especially for wafer fab concerned errors. The prerequisite is that no impact on mask delivery cycle time even adding this extra checking. A full-mask checking based on job deck in gds or oasis format is necessary in order to secure acceptable run time. Form of the summarized error report generated by this checking is also crucial because user friendly interface will shorten engineers' judgment time to release mask for writing. This paper will survey the key factors of MRC in wafer fab.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... charge regarding the employment history of, and the publicly adjudicated disciplinary and enforcement... for a State and national criminal background check; and (2) personal history and experience, including... criminal history background reports and actions taken with respect thereto. Type of Review: Extension of a...
A new approach for willingness test in biometric systems
NASA Astrophysics Data System (ADS)
Yang, Kai; Du, Yingzi; Zhou, Zhi
2011-06-01
Biometrics identifies/verifies a person using his/her physiological or behavioral characteristics. It is becoming an important ally for law enforcement and homeland security. However, there are some safety and privacy concerns: biometric based systems can be accessed when users are under threat, reluctant or even unconscious states. In this paper, we introduce a new method which can identify a person and detect his/her willingness. Our experimental results show that the new approach can enhance the security by checking the consent signature while achieving very high recognition accuracy.
32 CFR Appendix B to Part 154 - Request Procedures
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Request Procedures B Appendix B to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... Center, Defense Investigative Service, P.O. Box 1083, Baltimore, Maryland 21203. C. National Agency Check...
32 CFR Appendix B to Part 154 - Request Procedures
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Request Procedures B Appendix B to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE... Center, Defense Investigative Service, P.O. Box 1083, Baltimore, Maryland 21203. C. National Agency Check...
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 2 2013-10-01 2013-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 2 2014-10-01 2014-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 2 2011-10-01 2011-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC... and safety tests. Operational tests and checks of all safety and limit controls, combustion controls...
17 CFR 230.419 - Offerings by blank check companies.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Deposit of securities and proceeds in escrow or trust account—(1) General. (i) Except as otherwise...: (A) An escrow account maintained by an “insured depository institution,” as that term is defined in... account established by a broker or dealer registered under the Exchange Act maintaining net capital equal...
40 CFR 63.1046 - Test methods and procedures.
Code of Federal Regulations, 2010 CFR
2010-07-01
... vapor leakage could occur) on the cover and associated closure devices shall be checked. Potential leak... test, the cover and closure devices shall be secured in the closed position. (3) The detection... constituent. (4) The detection instrument shall be calibrated before use on each day of its use by the...
ERIC Educational Resources Information Center
Trotter, Andrew
1993-01-01
Parental kidnapping could lead to a lawsuit against the school or principal. After general building security, schools need to check on custody status, network with the courts, and convince both custodial and noncustodial parents that schools are on the children's side. A summary provides 14 steps to safeguard against parental kidnapping. (MLF)
Security Protocol Verification and Optimization by Epistemic Model Checking
2010-11-05
Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the
Golden Laboratories and Offices | NREL
most research laboratories are located at our campus in Golden, Colorado, north of highway I-70 and Renewable Energy Laboratory 15013 Denver West Parkway Golden, CO 80401 303-275-3000 GPS Coordinates 39 your trip. Security Procedures Visitors must check in at the Site Entrance Building. Please see
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Payees. 410.505 Section 410.505 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK... for benefits for a month after the month of death, authority to cash the check will not be given to...
ERIC Educational Resources Information Center
Pember, Mary Annette
2007-01-01
For American Indian scholars, securing a job in higher education can sometimes be as simple as checking a box. Most of the country's colleges and universities do not require proof of tribal enrollment from faculty or staff who identify themselves as American Indians. Students looking to receive financial aid, however, must submit proof that they…
Science and Public Policy since World War II.
ERIC Educational Resources Information Center
Rossiter, Margaret W.
1985-01-01
Discusses: material/personnel shortages and surpluses around 1950; federal aid to nonmilitary research; loyalty oaths and security checks; rise of the behavioral sciences; science education, from the Cold War to creationism; antinuclear protests and the limited test ban treaty, 1954-1963; Sputnik and the space program; and health, safety, and…
Too Many Kids Are Getting Killed.
ERIC Educational Resources Information Center
Molnar, Alex
1992-01-01
For too many children, our society is a fearful wasteland that mocks adult pieties and nurtures nihilism. The threat of violence cannot be dispelled with metal detectors, weapons checks, and secured hallways. Educators must adopt classroom practices that promote and strengthen peaceful relations among students and become more effective advocates…
76 FR 22399 - HIT Policy Committee's Workgroup Meetings; Notice of Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-21
...: Meaningful Use, Privacy & Security Tiger Team, Quality Measures, Governance, Adoption/Certification, and... with the Federal Health IT Strategic Plan and that includes recommendations on the areas in which...://healthit.hhs.gov . Please check the ONC Web site for additional information or revised schedules as it...
Arms Control and National Security.
ERIC Educational Resources Information Center
Graham, Daniel O.
1985-01-01
From the Soviet perspective arms control agreements merely hold the United States in check while the Soviets, who don't feel bound by such agreements, obtain military advantages. The United States must move quickly to redress the strategic military balance that now favors the Soviets. We must emphasize areas like space. (RM)
19 CFR 122.182 - Security provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... port director may require the applicant to submit fingerprints on form FD-258 or on any other approved... fingerprint checks and the Customs administrative processing fee, the total of which must be tendered by, or... require the submission of fingerprints as provided in paragraph (c)(1)(i) of this section. The new...
19 CFR 122.182 - Security provisions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... port director may require the applicant to submit fingerprints on form FD-258 or on any other approved... fingerprint checks and the Customs administrative processing fee, the total of which must be tendered by, or... require the submission of fingerprints as provided in paragraph (c)(1)(i) of this section. The new...
Towards a Certified Lightweight Array Bound Checker for Java Bytecode
NASA Technical Reports Server (NTRS)
Pichardie, David
2009-01-01
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These dynamic checks are however expensive and several static analysis techniques have been proposed to eliminate explicit bounds checks. Such analyses require advanced numerical and symbolic manipulations that 1) penalize bytecode loading or dynamic compilation, 2) complexify the trusted computing base. Following the Foundational Proof Carrying Code methodology, our goal is to provide a lightweight bytecode verifier for eliminating array bound checks that is both efficient and trustable. In this work, we define a generic relational program analysis for an imperative, stackoriented byte code language with procedures, arrays and global variables and instantiate it with a relational abstract domain as polyhedra. The analysis has automatic inference of loop invariants and method pre-/post-conditions, and efficient checking of analysis results by a simple checker. Invariants, which can be large, can be specialized for proving a safety policy using an automatic pruning technique which reduces their size. The result of the analysis can be checked efficiently by annotating the program with parts of the invariant together with certificates of polyhedral inclusions. The resulting checker is sufficiently simple to be entirely certified within the Coq proof assistant for a simple fragment of the Java bytecode language. During the talk, we will also report on our ongoing effort to scale this approach for the full sequential JVM.
Experimentally feasible security check for n-qubit quantum secret sharing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr,more » Phys. Rev. Lett. 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.« less
A demonstration of a low cost approach to security at shipping facilities and ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.
2010-04-01
Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."
Some attributes of a language for property-based testing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neagoe, Vicentiu; Bishop, Matt
Property-based testing is a testing technique that evaluates executions of a program. The method checks that specifications, called properties, hold throughout the execution of the program. TASpec is a language used to specify these properties. This paper compares some attributes of the language with the specification patterns used for model-checking languages, and then presents some descriptions of properties that can be used to detect common security flaws in programs. This report describes the results of a one year research project at the University of California, Davis, which was funded by a University Collaboration LDRD entitled ''Property-based Testing for Cyber Securitymore » Assurance''.« less
Probabilistic Priority Message Checking Modeling Based on Controller Area Networks
NASA Astrophysics Data System (ADS)
Lin, Cheng-Min
Although the probabilistic model checking tool called PRISM has been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism has allowed CAN to become the leader in serial communication for automobile and industry control. Through modeling CAN, it is easy to analyze the characteristic of CAN for further improving the security and efficiency of automobiles. The Markov chain model helps us to model the behaviour of priority messages.
Technologies to counter aviation security threats
NASA Astrophysics Data System (ADS)
Karoly, Steve
2017-11-01
The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.
49 CFR 8.31 - Industrial security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 1 2011-10-01 2011-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...
49 CFR 8.31 - Industrial security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 1 2012-10-01 2012-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...
SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET
NASA Astrophysics Data System (ADS)
KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya
2013-02-01
Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.
The charging security study of electric vehicle charging spot based on automatic testing platform
NASA Astrophysics Data System (ADS)
Li, Yulan; Yang, Zhangli; Zhu, Bin; Ran, Shengyi
2018-03-01
With the increasing of charging spots, the testing of charging security and interoperability becomes more and more urgent and important. In this paper, an interface simulator for ac charging test is designed, the automatic testing platform for electric vehicle charging spots is set up and used to test and analyze the abnormal state during the charging process. On the platform, the charging security and interoperability of ac charging spots and IC-CPD can be checked efficiently, the test report can be generated automatically with No artificial reading error. From the test results, the main reason why the charging spot is not qualified is that the power supply cannot be cut off in the prescribed time when the charging anomaly occurs.
A secure operational model for mobile payments.
Chang, Tao-Ku
2014-01-01
Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.
A Secure Operational Model for Mobile Payments
2014-01-01
Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service. PMID:25386607
32 CFR Appendix C to Part 86 - State Information
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...
46 CFR 35.05-15 - Tank vessel security-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... scuppers, if any, unobstructed; meets any loadline or freeboard requirements; and neither leaks cargo into the water, voids, or cofferdams nor leaks water into the tanks, voids, or cofferdams; (ii) Ensuring... checks are made of every tank barge in the tow for leakage of cargo into the water, voids, or cofferdams...
2009-03-23
A Russian security member and his dog check the railroad tracks ahead of the Soyuz rocket roll out to the launch pad Tuesday, March 24, 2009 at the Baikonur Cosmodrome in Kazakhstan. The Soyuz is scheduled to launch the crew of Expedition 19 and a spaceflight participant on March 26, 2009. Photo Credit: (NASA/Bill Ingalls)
77 FR 35681 - Formations of, Acquisitions by, and Mergers of Bank Holding Companies
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-14
...)(12); and issuing and selling money orders, savings bonds, traveler's checks and similar consumer... Securities, FSB, both in Dallas, Texas, and thereby engage in the operation of a savings association pursuant..., pursuant to section 225.28(b)(7); underwriting and dealing in government obligations and money market...
32 CFR Appendix C to Part 86 - State Information
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false State Information C Appendix C to Part 86... 86—State Information All SCHR checks should be accompanied by the following: 1. State form, if... information, such as: Name, date of birth, social security number, complete addresses, etc. 2. Fingerprint set...
45 CFR 234.11 - Assistance in the form of money payments.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 2 2014-10-01 2012-10-01 true Assistance in the form of money payments. 234.11 Section 234.11 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE... Social Security Act to eligible families and individuals. Money payments are payments in cash, checks, or...
45 CFR 234.11 - Assistance in the form of money payments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 2 2011-10-01 2011-10-01 false Assistance in the form of money payments. 234.11 Section 234.11 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE... Social Security Act to eligible families and individuals. Money payments are payments in cash, checks, or...
76 FR 66618 - Airworthiness Directives; Eurocopter France (Eurocopter) Model EC225LP Helicopters
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-27
... tightening torque of the screws which secure the assembly. Since then, Eurocopter has developed a.... EASB 05A005 specifies checking the dome fairing support for a crack and readjusting the tightening torque of the dome fairing-to-dome fairing support attachment screws. If a crack is found, the EASB...
44 CFR 5.45 - Form of payment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Form of payment. 5.45 Section... SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Fees § 5.45 Form of payment. Payment shall be by check or money order payable to the Federal Emergency Management Agency and shall be addressed to the...
44 CFR 6.84 - Form of payment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Form of payment. 6.84 Section... SECURITY GENERAL IMPLEMENTATION OF THE PRIVACY ACT OF 1974 Fees § 6.84 Form of payment. Payment shall be by check or money order payable to The Federal Emergency Management Agency and shall be addressed to the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... both temporary and permanent. Locations such as post offices can take secure fingerprints for purposes... large number of applicants might require fingerprints and identification checks, and that the Coast... interim rule and work with industry to come up with a better system for fingerprint and identification...
46 CFR 108.151 - Two means required.
Code of Federal Regulations, 2014 CFR
2014-10-01
... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...
46 CFR 108.151 - Two means required.
Code of Federal Regulations, 2012 CFR
2012-10-01
... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...
46 CFR 108.151 - Two means required.
Code of Federal Regulations, 2011 CFR
2011-10-01
... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...
46 CFR 108.151 - Two means required.
Code of Federal Regulations, 2013 CFR
2013-10-01
... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...
46 CFR 108.151 - Two means required.
Code of Federal Regulations, 2010 CFR
2010-10-01
... following must have at least 2 means of escape: (1) Each accommodation space with a deck area of at least 27 sq. meters (300 sq. ft.). (2) Each space, other than an accommodation space, that is continuously manned or used on a regular working basis except for routine security checks. (3) Weather deck areas...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
2001-04-05
KENNEDY SPACE CENTER, FLA. -- During a staged mass casualty exercise in the Launch Complex 39 area, a paramedic checks an injured woman on the ground. Employees are playing the role of victims during a sniper scenario. The exercise is being staged to validate capabilities of KSC’ fire, medical, helicopter transport and security personnel to respond to such an event.
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
NASA Astrophysics Data System (ADS)
Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert
The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.
Competitive Technologies for National Security: Review and Recommendations
2008-02-29
Carafano, Brian C. Goebel, and Josh Kussman , “Coming to America: Initiatives for Better, Faster, and More Secure Visas,” Heritage Foundation Backgrounder No...First published as Heritage Foundation Backgrounder No. 2071, September 21, 2007. 20. James Jay Carafano, Brian C. Goebel, and Josh Kussman , “Coming
Collaborating toward improving food security in Nunavut.
Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette
2013-01-01
Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.
Airport Viz - a 3D Tool to Enhance Security Operations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Koch, Daniel B
2006-01-01
In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to amore » number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.« less
Derived virtual devices: a secure distributed file system mechanism
NASA Technical Reports Server (NTRS)
VanMeter, Rodney; Hotz, Steve; Finn, Gregory
1996-01-01
This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dykstra, D.; Blomer, J.
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFSmore » and Frontier.« less
An approach to geotracking patients with Alzheimer's disease.
Yuce, Yilmaz Kemal; Gulkesen, Kemal Hakan; Barcin, Ebru Nur
2012-01-01
Recently, numerous systems for geo-tracking Alzheimer's patients with dementia have been developed and reported to be functional for the purposes of security and data collection. However, studies stated possible loss of freedom and autonomy for patients, along with violations of their privacy, which may lead to loss of prestige/dignity. In this study, a geotracking system that aims to balance patients' security and their need for privacy and autonomy is proposed. The system introduces a personalized, four-level temporal geofence based tracking, warning and notification protocol that incorporates a safety check mechanism operating over Global System for Mobile Communications network.
14 CFR 91.1051 - Pilot safety background check.
Code of Federal Regulations, 2014 CFR
2014-01-01
... previous employers must include, as applicable— (1) Crew member records. (2) Drug testing—collection, testing, and rehabilitation records pertaining to the individual. (3) Alcohol misuse prevention program...
14 CFR 91.1051 - Pilot safety background check.
Code of Federal Regulations, 2010 CFR
2010-01-01
... previous employers must include, as applicable— (1) Crew member records. (2) Drug testing—collection, testing, and rehabilitation records pertaining to the individual. (3) Alcohol misuse prevention program...
Looking for something new? Check out background results of potential new cultivars for California
USDA-ARS?s Scientific Manuscript database
This report compiles basic background information on the scion and rootstock varieties most recently released or scheduled for release by the CCPP. Cultivars are organized by type and in the same order as the CCPP budwood order form, and then by Variety index (VI) number with the earliest ones on th...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... provide timely notice. Therefore, you should always check the Agency's Web site at http://www.fda.gov...]derm Voluma XC is indicated for deep (dermal/subcutaneous and/or submuscular/ supraperiosteal... the background material on its Web site prior to the meeting, the background material will be made...
Security Classification Reform: The Waiting Agenda.
ERIC Educational Resources Information Center
Relyea, Harold C.
1993-01-01
Provides an overview of security classification reform for consideration by the Clinton administration and the 103rd Congress. Historical background and current issues related to the security classification of information, personnel security clearances, and industrial safeguarding of classified information are discussed. A checklist of basic…
Credit BG. Northeast and northwest facades of Building 4496 (Security ...
Credit BG. Northeast and northwest facades of Building 4496 (Security Facility) as seen when looking south (178°) from entrance to secured area. The Control Tower (Building 4500) appears in background. The Security Facility is part of the secured Building 4505 complex - Edwards Air Force Base, North Base, Security Facility, Northeast of A Street, Boron, Kern County, CA
Firearm legislation and firearm mortality in the USA: a cross-sectional, state-level study.
Kalesan, Bindu; Mobily, Matthew E; Keiser, Olivia; Fagan, Jeffrey A; Galea, Sandro
2016-04-30
In an effort to reduce firearm mortality rates in the USA, US states have enacted a range of firearm laws to either strengthen or deregulate the existing main federal gun control law, the Brady Law. We set out to determine the independent association of different firearm laws with overall firearm mortality, homicide firearm mortality, and suicide firearm mortality across all US states. We also projected the potential reduction of firearm mortality if the three most strongly associated firearm laws were enacted at the federal level. We constructed a cross-sectional, state-level dataset from Nov 1, 2014, to May 15, 2015, using counts of firearm-related deaths in each US state for the years 2008-10 (stratified by intent [homicide and suicide]) from the US Centers for Disease Control and Prevention's Web-based Injury Statistics Query and Reporting System, data about 25 firearm state laws implemented in 2009, and state-specific characteristics such as firearm ownership for 2013, firearm export rates, and non-firearm homicide rates for 2009, and unemployment rates for 2010. Our primary outcome measure was overall firearm-related mortality per 100,000 people in the USA in 2010. We used Poisson regression with robust variances to derive incidence rate ratios (IRRs) and 95% CIs. 31,672 firearm-related deaths occurred in 2010 in the USA (10·1 per 100,000 people; mean state-specific count 631·5 [SD 629·1]). Of 25 firearm laws, nine were associated with reduced firearm mortality, nine were associated with increased firearm mortality, and seven had an inconclusive association. After adjustment for relevant covariates, the three state laws most strongly associated with reduced overall firearm mortality were universal background checks for firearm purchase (multivariable IRR 0·39 [95% CI 0·23-0·67]; p=0·001), ammunition background checks (0·18 [0·09-0·36]; p<0·0001), and identification requirement for firearms (0·16 [0·09-0·29]; p<0·0001). Projected federal-level implementation of universal background checks for firearm purchase could reduce national firearm mortality from 10·35 to 4·46 deaths per 100,000 people, background checks for ammunition purchase could reduce it to 1·99 per 100,000, and firearm identification to 1·81 per 100,000. Very few of the existing state-specific firearm laws are associated with reduced firearm mortality, and this evidence underscores the importance of focusing on relevant and effective firearms legislation. Implementation of universal background checks for the purchase of firearms or ammunition, and firearm identification nationally could substantially reduce firearm mortality in the USA. None. Copyright © 2016 Elsevier Ltd. All rights reserved.
26 CFR 301.7505-1 - Sale of personal property acquired by the United States.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Sale of personal property acquired by the... Actions by the United States § 301.7505-1 Sale of personal property acquired by the United States. (a) Sale—(1) In general. Any personal property (except bonds, notes, checks, and other securities) acquired...
26 CFR 301.7505-1 - Sale of personal property acquired by the United States.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 18 2011-04-01 2011-04-01 false Sale of personal property acquired by the... Actions by the United States § 301.7505-1 Sale of personal property acquired by the United States. (a) Sale—(1) In general. Any personal property (except bonds, notes, checks, and other securities) acquired...
17 CFR 230.430B - Prospectus in a registration statement after effective date.
Code of Federal Regulations, 2010 CFR
2010-04-01
... during the past three years neither the issuer nor any of its predecessors was: (A) A blank check company... purpose of section 5(b)(1) thereof. This provision shall not limit the information required to be... EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Form and Content of Prospectuses...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62476; File No. SR-FINRA-2010-012] Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Order Approving a Proposed Rule Change To Amend FINRA Rule 8312 (FINRA BrokerCheck Disclosure) July 8, 2010. I. Introduction On March 30, 2010, the Financial Industry Regulatory...
46 CFR 61.30-20 - Automatic control and safety tests.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 2 2012-10-01 2012-10-01 false Automatic control and safety tests. 61.30-20 Section 61.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Tests and Inspections of Fired Thermal Fluid Heaters § 61.30-20 Automatic control and safety tests. Operational tests and check...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65310; File No. SR-CBOE-2011-082] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Opening and Complex Order Price Check Parameter Features September 9, 2011. Pursuant to Section 19(b)(1)...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66207; File No. SR-CBOE-2012-004] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Automatic Execution and Complex Order Price Check Parameter Features January 20, 2012. Pursuant to Sectio...
2010-07-12
Germany, 1999. [8] L. Babai, L. Fortnow, L. A. Levin, and M. Szegedy. Checking Computations in Polylogarithmic Time. In STOC, 1991. [9] A. Ben- David ...their work. J. ACM, 42(1):269–291, 1995. [12] D. Chaum , C. Crépeau, and I. Damgard. Multiparty unconditionally secure protocols. In STOC, 1988. [13
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70880; File No. SR-FINRA-2013-047] Self... Change To Amend FINRA Rule 8312 (FINRA BrokerCheck Disclosure) To Include Information About Members and... (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on November 1, 2013, the...
26 CFR 301.7506-1 - Administration of real estate acquired by the United States.
Code of Federal Regulations, 2010 CFR
2010-04-01
... methods will enhance the possibility of obtaining a higher price for the property. (3) Time and place of... cases, the district director may also require such persons to make deposits to secure the performance of... treasurer's check drawn on any bank or trust company incorporated under the laws of the United States or...
78 FR 32527 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
... online review. Respondents are current Social Security claimants who wish to check the status of their... a decision on a claim, we post a copy of the decision notice online for the user to view. There are some exceptions to posting a copy online, such as disability denial notices (even if filed...
Trusted computation through biologically inspired processes
NASA Astrophysics Data System (ADS)
Anderson, Gustave W.
2013-05-01
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends the state-of-the-art in enterprise anti-exploitation technologies by providing collective immunity through backup and cross-checking, proactive health monitoring and adaptive/autonomic threat response, and network resource diversity.
1997-05-01
Safeguarding patient records has always been a major concern for hospitals, but it has taken on added importance with increasing computerization that makes it easier for employees to browse medical charts, usually to check on the condition of a fellow worker, friend, or neighbor. In an effort to make records more secure, two hospitals--the University of Wisconsin Hospital and Clinics, Madison, and Beth Israel-Deaconess Medical Center, Boston, MA--have included an audit trail in their computer security systems to let them know who is accessing them. Such methods to safeguard electronic records and better protect patients' privacy were strongly recommended in March 1997 by a panel of the National Research Council, an arm of the National Academy of Sciences. In this report, we'll present details of how these hospitals are proceeding.
Project #OA-FY17-0139, Feb 15, 2017.The EPA OIG plans to begin preliminary research on an audit of EPA's processes for managing background investigations of privileged users and taking action to remediate weaknesses in agency's info security program.
Continuous Security and Configuration Monitoring of HPC Clusters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garcia-Lomeli, H. D.; Bertsch, A. D.; Fox, D. M.
Continuous security and configuration monitoring of information systems has been a time consuming and laborious task for system administrators at the High Performance Computing (HPC) center. Prior to this project, system administrators had to manually check the settings of thousands of nodes, which required a significant number of hours rendering the old process ineffective and inefficient. This paper explains the application of Splunk Enterprise, a software agent, and a reporting tool in the development of a user application interface to track and report on critical system updates and security compliance status of HPC Clusters. In conjunction with other configuration managementmore » systems, the reporting tool is to provide continuous situational awareness to system administrators of the compliance state of information systems. Our approach consisted of the development, testing, and deployment of an agent to collect any arbitrary information across a massively distributed computing center, and organize that information into a human-readable format. Using Splunk Enterprise, this raw data was then gathered into a central repository and indexed for search, analysis, and correlation. Following acquisition and accumulation, the reporting tool generated and presented actionable information by filtering the data according to command line parameters passed at run time. Preliminary data showed results for over six thousand nodes. Further research and expansion of this tool could lead to the development of a series of agents to gather and report critical system parameters. However, in order to make use of the flexibility and resourcefulness of the reporting tool the agent must conform to specifications set forth in this paper. This project has simplified the way system administrators gather, analyze, and report on the configuration and security state of HPC clusters, maintaining ongoing situational awareness. Rather than querying each cluster independently, compliance checking can be managed from one central location.« less
2004-01-24
Engineers and technicians in the control room at the Dryden Flight Research Center must constantly monitor critical operations and checks during research projects like NASA's hypersonic X-43A. Visible in the photo, taken two days before the X-43's captive carry flight in January 2004, are [foreground to background]; Tony Kawano (Range Safety Officer), Brad Neal (Mission Controller), and Griffin Corpening (Test Conductor).
Dickson-Gomez, Julia B; Cromley, Ellen; Convey, Mark; Hilario, Helena
2009-04-15
Since the mid-1970s, the dominant model for U.S. federal housing policy has shifted from unit-based programs to tenant based vouchers and certificates, intended to allow recipients a choice in their housing and neighborhoods. Surprisingly little research has examined the question of where those with Section 8 housing vouchers are able to live, but some research suggests that voucher holders are more likely to reside in distressed neighborhoods than unsubsidized renter households. Further, federal housing policy has limited drug users' access to housing subsidies. In turn, neighborhood disorder has been associated with higher levels of injection drug risk behaviors, and higher drug-related mortality. This paper explores rental accessibility and neighborhood characteristics of advertised rental housing in Hartford CT. Brief telephone interviews were conducted with landlords or management companies with units to rent in Hartford to explore housing accessibility measured as initial move in costs, credit and criminal background checks, and whether rental subsidies were accepted. These data were supplemented with in-depth interviews with landlords, shelter staff and active users of heroin, crack or cocaine. Apartments for rent were geocoded and mapped using ArcGIS. We used location quotients to identify areas where low-income rental housing is concentrated. Finally, we mapped apartments in relation to drug and violent arrest rates in each neighborhood. High security deposits, criminal background and credit checks limit housing accessibility even for drug users receiving vouchers. While most landlords or management companies accepted housing subsidies, several did not. Voucher units are concentrated in neighborhoods with high poverty neighborhoods. Landlords reported little incentive to accept rental subsidies in neighborhoods with low crime rates, but appreciated the guarantee provided by Section 8 in high crime neighborhoods that were less likely to attract applicants with good jobs and credit. Housing vouchers in themselves do not greatly improve recipients' choice of neighborhood and voucher units are concentrated in the most distressed neighborhoods. Policy changes are needed to increase landlords' incentives to accept housing subsidies. Interventions to improve neighborhood conditions are needed to improve the probability of success for those recovering from drug addictions.
2012-01-01
Background General and preventive health checks are a key feature of contemporary policies of anticipatory care. Ensuring high and equitable uptake of such general health checks is essential to ensuring health gain and preventing health inequalities. This literature review explores the socio-demographic, clinical and social cognitive characteristics of those who do and do not engage with general health checks or preventive health checks for cardiovascular disease. Methods An exploratory scoping study approach was employed. Databases searched included the British Nursing Index and Archive, Cumulative Index to Nursing and Allied Health Literature (CINAHL), Cochrane Database of Systematic Reviews (CDSR) and Database of Abstracts of Reviews of Effects (DARE), EMBASE, MEDLINE, PsycINFO and the Social Sciences Citation Index (SSCI). Titles and abstracts of 17463 papers were screened; 1171 papers were then independently assessed by two researchers. A review of full text was carried out by two of the authors resulting in 39 being included in the final review. Results Those least likely to attend health checks were men on low incomes, low socio-economic status, unemployed or less well educated. In general, attenders were older than non-attenders. An individual’s marital status was found to affect attendance rates with non-attenders more likely to be single. In general, white individuals were more likely to engage with services than individuals from other ethnic backgrounds. Non-attenders had a greater proportion of cardiovascular risk factors than attenders, and smokers were less likely to attend than non-smokers. The relationship between health beliefs and health behaviours appeared complex. Non-attenders were shown to value health less strongly, have low self-efficacy, feel less in control of their health and be less likely to believe in the efficacy of health checks. Conclusion Routine health check-ups appear to be taken up inequitably, with gender, age, socio-demographic status and ethnicity all associated with differential service use. Furthermore, non-attenders appeared to have greater clinical need or risk factors suggesting that differential uptake may lead to sub-optimal health gain and contribute to inequalities via the inverse care law. Appropriate service redesign and interventions to encourage increased uptake among these groups is required. PMID:22938046
Science Undergraduate Laboratory Internship Program at NREL | NREL
domestic travel to and from NREL. By Car Travel by car and you'll be reimbursed up to $250, one way. Drug Screening and Background Check Drug Screening NREL coordinates a one-time background investigation and drug appointment for the drug screening, they have 72 hours to complete the required urine test. Work Hours NREL
8 CFR 335.2 - Examination of applicant.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Investigation that the fingerprint data submitted for the criminal background check has been rejected. (c... required for a full and true disclosure of the facts. (d) Witnesses. Witnesses, if called, shall be...
8 CFR 335.2 - Examination of applicant.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Investigation that the fingerprint data submitted for the criminal background check has been rejected. (c... required for a full and true disclosure of the facts. (d) Witnesses. Witnesses, if called, shall be...
8 CFR 335.2 - Examination of applicant.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Investigation that the fingerprint data submitted for the criminal background check has been rejected. (c... required for a full and true disclosure of the facts. (d) Witnesses. Witnesses, if called, shall be...
Choosing a Microcomputer: A Success Story.
ERIC Educational Resources Information Center
Mason, Robert M.
1983-01-01
Documentation of author's personal experience in the purchasing of a microcomputer discusses background learning, the purchase decision, needs assessment, computer literacy, general information on microcomputers, the situation assessment, and the final check. (EJS)
The changing face of Hanford security 1990--1994
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thielman, J.
The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less
78 FR 5757 - National Instant Criminal Background Check System
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-28
... NICS records to be stored by the National Archives and Records Administration (NARA) in a Federal... companies to compete with foreign-based companies in domestic and export markets. Paperwork Reduction Act of...
Child Care Criminal Background Check Act of 2013
Rep. Carson, Andre [D-IN-7
2013-05-09
House - 07/08/2013 Referred to the Subcommittee on Early Childhood, Elementary, and Secondary Education. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Child Care Criminal Background Check Act of 2011
Rep. Carson, Andre [D-IN-7
2011-05-04
House - 05/20/2011 Referred to the Subcommittee on Early Childhood, Elementary, and Secondary Education. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
NASA Astrophysics Data System (ADS)
Kang, Guo-Dong; Fang, Mao-Fa
2011-02-01
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.
The SERENITY Runtime Monitoring Framework
NASA Astrophysics Data System (ADS)
Spanoudakis, George; Kloukinas, Christos; Mahbub, Khaled
This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... designated by the entering party, without checking the NASDAQ book. If unexecuted, the order (or unexecuted... respect to BX and NYSE. The fee level is consistent with NASDAQ's long-standing practice of charging a..., regardless of the activity level of the member, the listing venue of the security, or the venue to which the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65311; File No. SR-C2-2011-018] Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Opening and Complex Order Price Check Parameter Features September 9, 2011. Pursuant to Section 19(b)(1) of the...
CAPTCHA: Impact on User Experience of Users with Learning Disabilities
ERIC Educational Resources Information Center
Gafni, Ruti; Nagar, Idan
2016-01-01
CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…
Code of Federal Regulations, 2014 CFR
2014-01-01
... licensee subject to the provisions of this subpart shall fingerprint each individual who is to be permitted... all collected fingerprints to the Commission for transmission to the FBI. The licensee shall use the... fingerprints will be used to secure a review of his or her criminal history record, and shall inform him or her...
Lessons learned in the execution of advanced x-ray material discrimination (Conference Presentation)
NASA Astrophysics Data System (ADS)
Young, Sharene
2017-05-01
Advanced X-ray Material Discrimination (AXMD) or BAA 13-05 was a broad agency announcement which was initiated in order to develop solutions to the following problem. The emergence of improvised explosive threats and their use by terrorists has placed many challenges on the aviation security screening layers. EDS and AT X-ray equipment have been presented with considerable challenges in developing a broad detection capability for improvised explosive threats during security screening of checked bags and carry-on items. Technologies are needed that increase the measurement or mathematical discrimination between improvised explosive threats and stream-of-commerce clutter in checked baggage and carry-on items. Conventional EDS utilizes two basic discriminating signatures: effective atomic number and density of screened objects. R and D is needed to identify additional discriminating signatures between improvised explosive threats and stream-of commerce clutter to improve detection capability with reduced false alarm rates. DHS S and T EXD along with stakeholders at the TSA, TSL, and the UK Home Office have been successful in funding efforts to address and potentially provide operational solutions which can be deployed as part of the Next Generation of X-ray Technologies.
Research on registration algorithm for check seal verification
NASA Astrophysics Data System (ADS)
Wang, Shuang; Liu, Tiegen
2008-03-01
Nowadays seals play an important role in China. With the development of social economy, the traditional method of manual check seal identification can't meet the need s of banking transactions badly. This paper focus on pre-processing and registration algorithm for check seal verification using theory of image processing and pattern recognition. First of all, analyze the complex characteristics of check seals. To eliminate the difference of producing conditions and the disturbance caused by background and writing in check image, many methods are used in the pre-processing of check seal verification, such as color components transformation, linearity transform to gray-scale image, medium value filter, Otsu, close calculations and labeling algorithm of mathematical morphology. After the processes above, the good binary seal image can be obtained. On the basis of traditional registration algorithm, a double-level registration method including rough and precise registration method is proposed. The deflection angle of precise registration method can be precise to 0.1°. This paper introduces the concepts of difference inside and difference outside and use the percent of difference inside and difference outside to judge whether the seal is real or fake. The experimental results of a mass of check seals are satisfied. It shows that the methods and algorithmic presented have good robustness to noise sealing conditions and satisfactory tolerance of difference within class.
Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.
Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-06-01
The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.
Metro Optical Networks for Homeland Security
NASA Astrophysics Data System (ADS)
Bechtel, James H.
Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
...; Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties Records System of Records AGENCY... of 1974 for the Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties Records.... Background The Department of Homeland Security (DHS) civil rights and civil liberties staff, including...
Education Secured? The School Performance of Adolescents in Secure Residential Youth Care
ERIC Educational Resources Information Center
Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.
2014-01-01
Background: Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Objective: Therefore, the aim of the present study is to assess adolescents' academic achievement during secure residential…
ERIC Educational Resources Information Center
Smallwood, Scott
2003-01-01
Tells the story of Paul Krueger, convicted and paroled murderer, who went on to earn two doctorates and become a faculty member at several institutions, including the Pennsylvania State University. The loss of his job, when his background was revealed, raises questions of rehabilitation, teacher responsibility, and the need for background checks.…
NASA Astrophysics Data System (ADS)
Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong
2014-08-01
We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.
High performance reconciliation for continuous-variable quantum key distribution with LDPC code
NASA Astrophysics Data System (ADS)
Lin, Dakai; Huang, Duan; Huang, Peng; Peng, Jinye; Zeng, Guihua
2015-03-01
Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.
A slippery molecular assembly allows water as a self-erasable security marker
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K.; Ajayaghosh, Ayyappanpillai
2015-01-01
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication. PMID:25940779
A slippery molecular assembly allows water as a self-erasable security marker.
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K; Ajayaghosh, Ayyappanpillai
2015-05-05
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication.
Behavioral analysis of use personal service e-balance Indonesian social security
NASA Astrophysics Data System (ADS)
Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad
2017-09-01
Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.
76 FR 45783 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... complying with mandatory background checks, i.e., Brady Handgun Violence Prevention Act (18 U.S.C. 922) and... folders and on electronic media. Retrievability: By name or other identifier of individual. Safeguards...
42 CFR 455.434 - Criminal background checks.
Code of Federal Regulations, 2012 CFR
2012-10-01
... that each such provider or person submit fingerprints. (2) The State Medicaid agency must require a... submit a set of fingerprints, in a form and manner to be determined by the State Medicaid agency, within...
42 CFR 455.434 - Criminal background checks.
Code of Federal Regulations, 2013 CFR
2013-10-01
... that each such provider or person submit fingerprints. (2) The State Medicaid agency must require a... submit a set of fingerprints, in a form and manner to be determined by the State Medicaid agency, within...
42 CFR 455.434 - Criminal background checks.
Code of Federal Regulations, 2014 CFR
2014-10-01
... that each such provider or person submit fingerprints. (2) The State Medicaid agency must require a... submit a set of fingerprints, in a form and manner to be determined by the State Medicaid agency, within...
42 CFR 455.434 - Criminal background checks.
Code of Federal Regulations, 2011 CFR
2011-10-01
... that each such provider or person submit fingerprints. (2) The State Medicaid agency must require a... submit a set of fingerprints, in a form and manner to be determined by the State Medicaid agency, within...
Options for Synthetic DNA Order Screening, Revisited.
DiEuliis, Diane; Carter, Sarah R; Gronvall, Gigi Kwik
2017-01-01
Gene synthesis providers affiliated with the International Gene Synthesis Consortium (IGSC) voluntarily screen double-stranded DNA (dsDNA) synthesis orders over 200 bp to check for matches to regulated pathogens and to screen customers. Questions have been raised, however, about the continuing feasibility and effectiveness of screening. There are technical challenges (e.g., oligonucleotides and tracts of DNA less than 200 bp are not screened) and corporate challenges (e.g., the costs of screening are high, but other costs are dropping, so screening is an increasing portion of operating costs). In this article, we describe tangible actions that should be taken to (i) preserve the effectiveness of DNA order screening as a security tool and (ii) develop additional mechanisms to increase the safety and security of DNA synthesis technologies. Screening is not a perfect solution to DNA synthesis security challenges, but we believe it is still a valuable addition to security, and it can remain effective for some time.
Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.
Keys, Yolanda; Stichler, Jaynelle F
Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.
Health information security: a case study of three selected medical centers in iran.
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-03-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.
Health Information Security: A Case Study of Three Selected Medical Centers in Iran
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-01-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients’ electronic records and health information systems have become a source for hackers. Methods This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts’ points of view. Results and discussion Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of “verification and system design, user access management, access control system”, Al Zahra Hospital in two indicators of “access management and network access control” and Amin Hospital in “equipment safety and system design”. In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place. PMID:23572861
An Adaptive Buddy Check for Observational Quality Control
NASA Technical Reports Server (NTRS)
Dee, Dick P.; Rukhovets, Leonid; Todling, Ricardo; DaSilva, Arlindo M.; Larson, Jay W.; Einaudi, Franco (Technical Monitor)
2000-01-01
An adaptive buddy check algorithm is presented that adjusts tolerances for outlier observations based on the variability of surrounding data. The algorithm derives from a statistical hypothesis test combined with maximum-likelihood covariance estimation. Its stability is shown to depend on the initial identification of outliers by a simple background check. The adaptive feature ensures that the final quality control decisions are not very sensitive to prescribed statistics of first-guess and observation errors, nor on other approximations introduced into the algorithm. The implementation of the algorithm in a global atmospheric data assimilation is described. Its performance is contrasted with that of a non-adaptive buddy check, for the surface analysis of an extreme storm that took place in Europe on 27 December 1999. The adaptive algorithm allowed the inclusion of many important observations that differed greatly from the first guess and that would have been excluded on the basis of prescribed statistics. The analysis of the storm development was much improved as a result of these additional observations.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
ERIC Educational Resources Information Center
National Crime Prevention Centre, Ottawa (Ontario).
This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…
Ways to Improve DoD 8570 IY Security Certification
ERIC Educational Resources Information Center
Bates, Justin D.
2017-01-01
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
Secure hemostasis in transhiatal esophagectomy for esophageal cancer with gauze packing
2012-01-01
Background Transhiatal esophagectomy for esophageal cancer implies blind manipulation of the intrathoracic esophagus. We report a secure hemostatic method with gauze packing in transhiatal esophagectomy. Methods The gauze-packing technique is utilized for hemostasis just after removal of the thoracic esophagus during transhiatal esophagectomy. After confirming cancer-free margins, the abdominal esophagus and cervical esophagus are transected. A vein stripper is inserted into the oral-side stump of the esophagus and led to exit from the abdominal-side stump of the esophagus. The vein stripper and the oral stump of the esophagus are affixed by silk thread. A polyester tape is then affixed to the vein stripper, as the polyester tape is left in the posterior mediastinum after removal of the esophagus toward the abdominal side. The polyester tape on the cervical side is ligated with gauze and the polyester tape is removed toward the abdominal side. The oral stump of gauze and new additional gauze are affixed. As the first gauze is pulled out from the abdominal side, the second gauze gets drawn from the cervical wound into the mediastinum. The posterior mediastinum is finally packed with gauze and possible bleeding at this site undergoes a complete astriction. The status of hemostasis with the gauze packing is checked by an observation of color and bloodstain on the gauze. Results Between January 2005 and February 2012, 13 consecutive patients with esophageal cancer underwent a transhiatal esophagectomy with the gauze-packing hemostatic technique. Hemostasis at the posterior mediastinum was performed successfully and quickly in all cases with this method, requiring up to four pieces of gauze for a complete hemostasis. Median required time for hemostasis was 1219 (range 1896 to 1293) seconds and estimated blood loss was 20.4 (range 15 to 25) ml during gauze packing. Conclusions Our technique could minimize bleeding after the removal of the thoracic esophagus. The gauze-packing method is a simple and easy technique for secure hemostasis when performing a transhiatal esophagectomy. PMID:23253358
Code of Federal Regulations, 2011 CFR
2011-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
2009-02-02
aviation security . The approach to aviation security was largely shaped by past events, such as the bombing of Pan Am flight 103 in December 1988, rather...community. Following the September 11, 2001, attacks, U.S. aviation security policy and strategy was closely linked to the changes called for in the...have been considered security sensitive thus limiting public discourse on the DHS strategy for aviation security . However, in June 2006 President
Sensitive Security Information (SSI) and Transportation Security: Background and Controversies
2004-02-05
with airport security procedures, employee accountability, passenger screening, and airport secrecy agreements. In January 2003, the Dallas/Fort... Airport Security Flaws Bring Criticism,” Los Angeles Times, July 2, 2002, p. A8. 16 Charles Piller and Ricardo Alonso-Zaldivar, “A Suspect Computer...Secrecy in Airport Security Contract Criticized,” Des Moines Register, Sept. 27, 2003, p. 1A; James Andrews, “Here in Tristate, Security’s Tighter
Temporally Aware Reactive Systems
2005-03-01
programming language , as does O’Haskell. However, there are signi cant di erences. In Ocaml , state, objects and concurrency are orthogonal aspects. They...dif- ference between the two languages is that Ocaml is strict, while expression evaluation in O’Haskell is lazy. That dif- ference, however, is not... languages ; Static Checking; Overload tolerance; Graceful degradation 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON (Monitor) a
Experience with Adaptive Security Policies.
1998-03-01
3.1 Introduction r: 3.2 Logical Groupings of audited permission checks 29 3.3 Auditing of system servers via microkernel snooping 31 3.4...performed by servers other than the microkernel . Since altering each server to audit events would complicate the integration of new servers, a...modification to the microkernel was implemented to allow the microkernel to audit the requests made of other servers. Both methods for enhancing audit
Security and Privacy Assurance Research (SPAR) Pilot Final Report
2015-11-30
for a single querier interacting with a single encrypted database. In order to deploy the technology, the underlying cryptography must support multiple...underlying cryptography . A full SPAR system should be evaluated too including the software itself. Software should be checked for consistency with...ESPADA included cryptography libraries (e.g., gnutls, nettle, and openssl). Consider a hypothetical scenario in which a vulnerability is discovered in