Department of the Navy Transformation Plan FY 2014-2016
2014-01-01
SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...with the competing realities of shrinking defense budgets and rising maritime security challenges. Throughout our history, the Navy and Marine...DON continues to support alternative energy efforts, realizing that energy independence is vital to our national security and the safety of our
A Perspective on Research Challenges in Information Security
2011-11-01
UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp
Secure Infrastructure-Less Network (SINET)
2017-06-01
Protocol CNSA Commercial National Security Algorithm COMSEC Communications Security COTS Commercial off the Shelf CSfC Commercial Solutions for...ABSTRACT (maximum 200 words) Military leaders and first responders desire the familiarity of commercial -off-the-shelf lightweight mobile devices while...since they lack reliable or secure communication infrastructure. Routine and simple mobile information-sharing tasks become a challenge over the
Addressing the Challenges of Collective Security in West Africa: In View of Recent Conflicts
2017-06-09
Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Understanding that achieving peace and security is a primary condition for an economic ...condition for an economic integration, ECOWAS has developped various approachs in resolving crises and overcoming threats within West Africa. Using...System CS Collective Security CSO Civil Society Organizations CSS Center for Security Studies EAC East Africa Community ECCAS Economic Community of
Challenge and Response: Anticipating US Military Security Concerns
1994-08-01
in the U.S. And the Russian Orthodox Church may emerge as another such political force as was evidenced by its mediative role in the turbulent days...objectives (ends) and public opinion. Recall the turmoil in the United States during the Vietnam War and how 471 internal politics affected the...ABSTRACT 15. SUBJECT TERMS Military planning - United States; National Security - United States; World politics - 1989 - 16. SECURITY CLASSIFICATION OF
Biobehavioral Correlates of Depression in Reaction to Mental and Physical Challenge
2007-03-07
positive effects on quality of life for individuals with depression. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...reactivity to challenge with potential positive effects on quality of life for individuals with depression. v Biobehavioral Correlates of...Responsiveness.............................................. 22 IV. Immune System Parameters in Depression............................................ 24
Software Assurance Curriculum Project Volume 2: Undergraduate Course Outlines
2010-08-01
Contents Acknowledgments iii Abstract v 1 An Undergraduate Curriculum Focus on Software Assurance 1 2 Computer Science I 7 3 Computer Science II...confidence that can be integrated into traditional software development and acquisition process models . Thus, in addition to a technology focus...testing throughout the software development life cycle ( SDLC ) AP Security and complexity—system development challenges: security failures
Innovative Acoustic Sensor Technologies for Leak Detection in Challenging Pipe Types
2016-12-30
correlation features to detect and pinpoint leaks in challenging pipe types, as well as metallic pipes. 15. SUBJECT TERMS Leak detection; acoustic... correlation ; water distribution systems 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18.NUMBER OF PAGES 109 19a. NAME OF...6 1.3.2 State Regulations and Voluntary Water Industry Standards .......................... 7 2.0 TECHNOLOGY DESCRIPTION
RF-Trapped Chip Scale Helium Ion Pump (RFT-CHIP)
2016-04-06
14. ABSTRACT A miniaturized (~1 cc) magnet -less RF electron trap for a helium ion pump is studied, addressing challenges associated with active...pump, ion pump, electron trap, magnet -less, MEMS, radiofrequency 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...scale ion pumps. The Penning cell structure consists of three electrodes (an anode and two cathodes) and a magnet . Planar titanium cathodes are
Realization of Configurable One-Dimensional Reflectarray
2017-08-31
Maximum 200 words) A fundamental challenge remains in dynamically controlling the steering of long wavelength radiation (λ > 8 μm) using metal... dynamic , nanoribbons 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER OF PAGES 20 19a. NAME OF RESPONSIBLE PERSON...challenge remains in dynamically controlling the steering of long wavelength radiation (λ > 8 μm) using metal nanostructures or metamaterials (with critical
Climate Change: Challenges and Opportunities for United States Pacific Command
2012-03-22
NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT UNCLASSIFED b. ABSTRACT UNCLASSIFED c . THIS PAGE UNCLASSIFED UNLIMITED 36...result in a price paid in military terms and human lives in the future.9 Climate Change as a Threat to National Security Joshua Busby , a professor at...willingness to fight those who threaten our expanding notion of national security. Busby includes climate change in this expanded definition of national
An Agile Enterprise Regulation Architecture for Health Information Security Management
Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie
2010-01-01
Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748
Irregular Warfare: The Maoist Challenge to India’s Internal Security
2012-12-01
ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 116 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b . ABSTRACT unclassified c. THIS PAGE...and its approach to the various problems. These were, briefly, as follows: 8 JSOU Report 12-9 a. India is a semi-colonial and semi-feudal country. b ...leaders like Bhaskar Rao, Subbarao Panigrahi, and Nirmala Krishnamurti were killed. These losses greatly upset the Central Committee of the CPI (ML
Threats and Challenges in Reconfigurable Hardware Security
2008-07-01
Same as Report (SAR) 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b . ABSTRACT unclassified c. THIS PAGE...g e F P G A MemoryMemory Codec A/DD/A F P G A B o a rd System Developers Avnet, Digilent, NuHorizons Application Development Stage Deployment...Rohatgi, and B . Sunar. Trojan detection using IC fingerprinting. In Proceedings of IEEE Symposium on Security and Privacy, 2007. [3] K. Austin. Data
2006-08-01
AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY...threats, or financial insecurities. Yankee Going Home: The world of 2020 looks like a confused mess! Little is clear except that the world has... statements from Proteus: Insights from 2020 are highly releant when thinking about the current strategic picture in the context of Power: “When Power
2002 Industry Studies: Education
2002-01-01
1 EDUCATION ABSTRACT United States schools are better than ever, but they are not assuring competitive advantage . Unequal access to quality...competitive advantage , and promote national security. • Demand for education continues to grow as the US transitions from an industrial to a knowledge... international assessments, pose challenges. With human capital constituting our most critical national resource, a world-class education system is vital to
Challenges for Deploying Man-Portable Robots into Hostile Environments
2000-11-01
video, JAUGS , MDARS 1. BACKGROUND In modern-day warfare the most likely battlefield is an urban environment, which poses many threats to today’s...teleoperation, reconnaissance, surveillance, digital video, JAUGS , MDARS 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...Architecture (MRHA) and the Joint Architecture for Unmanned Ground Systems ( JAUGS ). The hybrid architecture is termed SMART for Small Robotic Technology. It
Status, Vision, and Challenges of an Intelligent Distributed Engine Control Architecture (Postprint)
2007-09-18
TERMS turbine engine control, engine health management, FADEC , Universal FADEC , Distributed Controls, UF, UF Platform, common FADEC , Generic FADEC ...Modular FADEC , Adaptive Control 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON (Monitor) a. REPORT Unclassified b. ABSTRACT...Eventually the Full Authority Digital Electronic Control ( FADEC ) became the norm. Presently, this control system architecture accounts for 15 to 20% of
Counter-Terrorism and the Use of Force in International Law
2002-11-01
authority of the Council to establish such tribunals was unsuccessfully challenged in an interlocutory appeal before the Appeals Chamber of the...see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 107 19a. NAME OF RESPONSIBLE PERSON...State may resort to force as an instrument of national policy. Although States have conducted military counter-terrorist operations in the past, the
Case Series: Chikungunya and Dengue at a Forward Operating Location
2015-05-01
Journal Article 3. DATES COVERED (From – To) November 2014 – January 2015 4. TITLE AND SUBTITLE Case Series: Chikungunya and Dengue at a Forward...series and discusses the significance of this disease in the Americas and diagnostic challenges when other arboviruses such as dengue are present. 15...SUBJECT TERMS Chikungunya, dengue , mosquitoes 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 3
Duke of Wellington’s Command of the Spanish Army in the Peninsular War
2017-06-09
SUBJECT TERMS Peninsular War, Spanish Army, Command Structure , International Friction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...Horse Guards and the Secretary for War and the Colonies, poorly trained and equipped partner armies, the difficulty in creating a unity of command...armies of three nations in the Peninsula. Wellington accepted the daunting challenge of unifying disparate command structures of Spain and Britain
NASA Astrophysics Data System (ADS)
Kujinga, Krasposy; Vanderpost, Cornelis; Mmopelwa, Gagoitseope; Wolski, Piotr
Globally, water security is negatively affected by factors that include climatic and hydrological conditions, population growth, rural-urban migration, increased per-capita water use, pollution and over-abstraction of groundwater. While Botswana has made strides in providing safe and clean water to its population since independence in 1966, over the years, a combination of factors have contributed to water security problems in different settlement categories of the country (i.e., primary, secondary, tertiary and ungazetted settlements) in general and in the district of Ngamiland in particular. To study water security problems differentiated by settlement category, this study employed quantitative data collection methods (i.e. household structured questionnaires) and qualitative data collection methods (i.e. key informant interviews, observation, focus group discussions and informal interviews), complemented by a review of relevant literature. Water security in all settlements is affected by status of the settlement, i.e. gazetted or ungazetted, climatic and hydrological factors and water governance challenges. In large villages such as Maun, factors threatening water security include population growth, urbanization, management challenges, old water supply and distribution infrastructure, increased demand for individual connections and changing lifestyles. Small gazetted and ungazetted settlements encounter problems related to limited sources of water supply as well as salinity of groundwater resources. In order to enhance water security in different settlement categories, Botswana has to develop a comprehensive water resources management strategy underpinned by integrated water resources management principles aimed at addressing factors contributing to water security problems. The strategy has to be settlement category specific. Large villages have to address factors related to demographic changes, urbanization, management challenges, water supply infrastructure and the introducing of water demand management activities. Households in small villages need provision of water from more sustainable sources while ungazetted settlements need better access to clean water.
Developing a Viable Approach for Effective Tiered Systems
2007-01-17
TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT 19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (include area code ) b. ABSTRACT c. THIS PAGE 18...is changing the world. Now deal with it” (New Scientist 2006). If true, this significant message is one that would extend well beyond the realm of...system-of-systems poses formidable challenges for the acquisitions bureaucracy and the defense industries” (Dombrowski et al. 2002). “TRLs
Mexico’s National Command and Control Center Challenges and Successes
2011-06-01
Perales Pimentel Ing. Francisco Niembro Maribel Cervates Guerrero Genaro Garcia Luna Secretaría de Seguridad Pública Mexico , D.F. Point of...9841 Irvine Ctr Dr., Ste 200 Irvine, CA 92618 Alex Bonino and Fred Schellenberg Narcotics Affairs Section, US Embassy Mexico , D.F. Andres...Federal Rights License. 14. ABSTRACT Secretar?de Seguridad P?blica (The Secretariat of Public Security or SSP) has a work force of nearly 30,800 police
Study of Software Tools to Support Systems Engineering Management
2015-06-01
Management 15. NUMBER OF PAGES 137 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS...AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) According to a...PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298
Research Support for the Laboratory for Lightwave Technology
1992-12-31
34 .. . ."/ 12a. DISTRIBUTION AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE UNLIMITED 13. ABSTRACT (Mawimum 200words) 4 SEE ATTACHED ABSTRACT DT I 14. SUBJECT...8217TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT...temperature ceramic nano- phase single crystal oxides that may be produced at a high rate . The synthesis of both glasses and ceramics using novel techniques
NASA Astrophysics Data System (ADS)
Rey Vicario, D.; Holman, I.
2016-12-01
The use of water for irrigation and on-farm reservoir filling is globally important for agricultural production. In humid climates, like the UK, supplemental irrigation can be critical to buffer the effects of rainfall variability and to achieve high quality crops. Given regulatory efforts to secure sufficient environmental river flows and meet rising water demands due to population growth and climate change, increasing water scarcity is likely to compound the drought challenges faced by irrigated agriculture in this region. Currently, water abstraction from surface waters for agricultural irrigation can be restricted by the Environment Agency during droughts under Section 57 of the Water Resources Act (1991), based on abnormally low river flow levels and rainfall forecast, causing significant economic impacts on irrigated agricultural production. The aim of this study is to assess the impact that climate change may have on agricultural abstraction in the UK within the context of the abstraction restriction triggers currently in place. These triggers have been applied to the `Future Flows hydrology' database to assess the likelihood of increasing restrictions on agricultural abstraction in the future by comparing the probability of voluntary and compulsory restrictions in the baseline (1961-1990) and future period (2071-2098) for 282 catchments throughout the whole of the UK. The results of this study show a general increase in the probability of future agricultural irrigation abstraction restrictions in the UK in the summer, particularly in the South West, although there is significant variability between the 11 ensemble members. The results also indicate that UK winters are likely to become wetter in the future, although in some catchments the probability of abstraction restriction in the reservoir refilling winter months (November-February) could increase slightly. An increasing frequency of drought events due to climate change is therefore likely to lead to more water abstraction restrictions, increasing the need for irrigators to adapt their businesses to increase drought resilience and hence food security.
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada
2015-01-01
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093
Glossary: Defense Acquisition Acronyms and Terms. Revision 2
1987-07-01
Approved REPORT DOCUMENTATION PAGE OMBNo. 070-O 18 la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS % unclassified 2a. SECURITY CLASSIFICATION ...WORK UNIT Fort Belvoir, VA 22060-5426 ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification ) Glossary Defense Acquisition...DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION [RUNCLASSIFIED/UNLIMITED 0 SAME AS RPT 0 DTIC USERS unclassified 22a. NAME OF
Author-Editor Guide to Technical Publications Preparation. Revision
1990-01-01
meteorology, climatology, military technical publications. ( ") <- 15: Number of Pages: 68 17. Security Classification of Report: Unclassified 1... Security Classification of this Page: Unclassified 19. Security Classification of Abstract: Unclassified 20. Limitation of Abstract: UL Standard Form 298...34 There are, however, February 1983. numerous exceptions. Although some technical material may not be classified in accordance with security AFR 83-2, Air
Exploring stories of occupational engagement in a regional secure unit
Morris, Karen; Cox, Diane L.; Ward, Kath
2016-01-01
Abstract This paper focuses on the occupational experiences of five men living within a forensic mental health unit over a year. This study used a descriptive qualitative case study methodology to explore the meaning and value placed on daily life (activities, occupations and routines), and how this changed over time. The men’s stories showed a complex picture of their experiences of daily life. This study demonstrated the impact of the environment on the men and the ongoing challenge of the need to balance treatment/therapy with security demands and opportunities. Three interrelated themes were identified: (1) Power and Occupation; (2) Therapy or Punishment; (3) Occupational Opportunities within Restrictions. These findings serve as a reminder to clinical teams to reassess the value of occupations attributed by their patients and the impact of the secure environment, whilst also acknowledging the potential for occupations to have a negative impact on well-being. PMID:27695388
In Vivo Testing of Chemopreventive Agents Using the Dog Model of Spontaneous Prostate Carcinogenesis
2001-03-01
SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT...retarded tate Cancer Research Program (PC-970492, awarded to population. J Gerontol 1969;24:395-411. 19. Hayflick LH. How and why we age. Exp Gerontol
2011-08-01
challenges in new design methodologies . Particular examples involve an in-circuit functional timing testing of systems with millions of cores. I...TECHNIQUES Chair: Dwight Woolard, U.S. Army Research Office (ARO) 8:40-9:05 EXPERIMENTAL DESIGN OF SINGLE-CRYSTAL DNA FOR THZ SPECTROSCOPY...Detection Based Techniques EXPERIMENTAL DESIGN OF SINGLE-CRYSTAL DNA FOR THZ SPECTROSCOPY E. R. Brown, M.L. Norton, M. Rahman, W. Zhang Wright
2011-01-01
reliability, e.g., Turbo Codes [2] and Low Density Parity Check ( LDPC ) codes [3]. The challenge to apply both MIMO and ECC into wireless systems is on...REPORT Fixed-point Design of theLattice-reduction-aided Iterative Detection andDecoding Receiver for Coded MIMO Systems 14. ABSTRACT 16. SECURITY...illustrates the performance of coded LR aided detectors. 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES The views, opinions
Keeping the Routine, Routine: The Operational Risks of Challenging Chinese Excessive Maritime Claims
2004-02-09
China Turned Away U.S. Research Ship in International Waters" Stars and Stripes, 20 May 2001, <http:// ww2 .pstripes.osd.mil/01/may01/ed052001d.html...and are not necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The United States asserts that China claims rights, territory...of the Law of the Sea, but is fundamentally about national security and national policy. 15. SUBJECT TERMS UNCLOS, Excessive Maritime Claims, China
1997-07-11
REPORT DOCUMENTATION PAGE Form ApprovedOMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour...DISTRIBUTION CODE 13. ABSTRACT (Maximum 200 words) 14. SUBJECT TERMS 15. NUMBER OF PAGES 50 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY...CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT Standard Form 298(Rev. 2-89) (EG) Prescribed byANSI
Assessing the Effectiveness of Post-9/11 Intelligence Information Sharing
2010-03-01
distribution unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT see attached 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...March 2010 WORD COUNT: 5,677 PAGES: 30 KEY TERMS: Intelligence Reform, Intelligence Sharing, 9/11 Commission, Homeland Security , National Security ...such as the creation of the Department of Homeland Security (DHS). In fact, both the 2007 National Strategy for Information Sharing and the IC’s
Enhanced Patient Expectation and Antiemetic Drug Efficacy
1999-07-01
NUMBER OF PAGES 15 Breast Cancer Expectancy Antiemetic Nausea and Vomiting Patient Information Side Effect 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... SECURITY CLASSIFICATION OF THIS 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT PAGE OF ABSTRACT Unclassified Unclassified...by the introduction of the 5-HT 3 receptor antagonist class of antiemetics (ondansetron, granisetron , tropisitron) have greatly reduced chemotherapy
Intelligent Interoperable Agent Toolkit (I2AT)
2005-02-01
Agents, Agent Infrastructure, Intelligent Agents 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01...those that occur while the submarine is submerged. Using CoABS Grid/Jini service discovery events backed up with a small amount of internal bookkeeping
Protocol independent transmission method in software defined optical network
NASA Astrophysics Data System (ADS)
Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng
2016-10-01
With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.
Making the National Security Council Better In the Bahamas to Resolve Illegal Migration
2015-12-01
ABSTRACT (maximum 200 words) The Bahamas’ economy depends primarily on tourism . Unchecked crime and cross-border threats jeopardize the country’s economic... tourism , opportunistic maritime criminality, national security strategy, national insecurity, U.S.-Bahamian relations, Haitian migration, transnational...of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The Bahamas’ economy depends primarily on tourism . Unchecked
NASA Astrophysics Data System (ADS)
Rey, Dolores; Holman, Ian; Rio, Marlene; Prudhomme, Christel
2017-04-01
In humid climates around the world, supplemental irrigation is critical to buffer the effects of rainfall variability and to assure crop yield and quality. In England, abstraction for irrigation is limited by: i) a maximum volumetric limit specified in the abstraction licence and ii) restrictions on abstraction imposed by the water regulator during droughts. Given regulatory efforts to secure sufficient environmental river flows and meet rising water demands due to population growth and climate change, increasing water scarcity is likely to compound the drought challenges faced by irrigated agriculture in this region. The aim of this study is to assess the impact that climate change may have on agricultural abstraction reliability in England within the context of the abstraction and drought management regimes currently in place, and how the water abstraction reform being developed by the Government could reduce the pressure on more and more limited water resources. Firstly, explanatory relationships were derived between an annual agroclimatic aridity index and actual irrigation abstraction. Secondly, the probability of annual abstraction being close to the maximum limit was calculated for each licence for the baseline (1961-90) and future (2071-2098) period. Finally, the current water resource availability triggers for mandatory abstractions restrictions on spray irrigation licences were used to assess the probability of being under restrictions during drought in each period. The results indicate a significant increase in the proportion of the licence being used in all catchments, representing the greatest risk for abstractors in the future, mainly in the most productive agricultural areas located in eastern and southern regions. In contrast, the likelihood of mandatory drought restrictions increases significantly in central and western England due to the lower buffering capacity of groundwater. Based on our findings, this paper discusses how the reform of the water abstraction licensing system being currently designed could help farmers to reduce their water availability risks. For instance, our analysis shows that a huge percentage of licenses in the country are hardly ever used, and hence the potential for reallocation (through water trading or other mechanisms) is worth exploring. Our results highlight the increasing water availability risks for irrigators in this country, and the need of the farming community and the regulator to adapt and collaborate to reduce the impacts and to increase drought resilience and hence food security.
1988-03-31
MARCI 1988 iAm U m WI 4EUnclT CLSIIAION OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2.. SECUR ...logistics system of the future more capable of supporting the full spectrumn of war 20 OISTRIaSUTION.’AVAILAeILiTY 0" ABSTRACT 21 ABSTRACT SECURITY ... SECURITY CLASSIFICATION OT: THIS PAGF Unclas ’SCUFUTY Cý= I!FICATION OF THIS PAGE 1,Qwcont.) scenarios. Today’s logistics processes assume wartime
Empowering patients through social media: the benefits and challenges.
Househ, Mowafa; Borycki, Elizabeth; Kushniruk, Andre
2014-03-01
This article explores the range of social media platforms used by patients and examines the benefits and challenges of using these tools from a patient perspective. A literature review was performed to investigate the use of social media technology by patients. The MEDLINE database was searched using the terms "social media" and "patient." The search was conducted in September 2012 and yielded 765 abstracts. Initially, 63 abstracts were selected. All articles dating from 2004 through 2012 were included. Only 12 articles were found to be relevant for the purposes of the review. The results of this research found that there appears to be an increase in the use of social media by patients across the healthcare spectrum. The research indicates a promising future for the use of social media by patients; however, evidence related to the efficacy and effectiveness of social media is currently limited. Various challenges have also been identified relating to privacy and security concerns, usability, the manipulation of identity, and misinformation. The use of social media technology is an emerging trend for patients who are seeking health information. Conclusions are that such technology holds promise for improving patient engagement and empowerment and community building. Social media has a future in healthcare, especially with regard to patient engagement and empowerment; however, there are several challenges to overcome before the technology can achieve its potential.
Christensen, A J; Srinivasan, Venkatraman; Hart, John C; Marshall-Colon, Amy
2018-01-01
Abstract Sustainable crop production is a contributing factor to current and future food security. Innovative technologies are needed to design strategies that will achieve higher crop yields on less land and with fewer resources. Computational modeling coupled with advanced scientific visualization enables researchers to explore and interact with complex agriculture, nutrition, and climate data to predict how crops will respond to untested environments. These virtual observations and predictions can direct the development of crop ideotypes designed to meet future yield and nutritional demands. This review surveys modeling strategies for the development of crop ideotypes and scientific visualization technologies that have led to discoveries in “big data” analysis. Combined modeling and visualization approaches have been used to realistically simulate crops and to guide selection that immediately enhances crop quantity and quality under challenging environmental conditions. This survey of current and developing technologies indicates that integrative modeling and advanced scientific visualization may help overcome challenges in agriculture and nutrition data as large-scale and multidimensional data become available in these fields. PMID:29562368
Awareness-Enabled Coordination
2006-04-01
contextualization, policy, team coordination. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF ABSTRACT UNCLASSIFIED UNCLASSIFIED UL NSN 7540-01-280... netowrk . Federal Austin FBI DHS CBP BobMary Carol John Alice 1 5 Texas NJ 3 4 1 2 3 4 Xavier Yanni 5 6 2 1 2 4 3 Policy & resource flow n Policies
Advanced Fuel Properties; A Computer Program for Estimating Property Values
1993-05-01
security considerations, contractual obligations, or notice on a specific document. REPORT DOCUMENTATION PAGE Fogu Approwd I OMB No. 0704-01=5 Ps NP...found in fuels. 14. SUBJECT TERMS 15. NUMBEROF PAGES 175 Fuel properties, Physical Propertie, Thermodynamnics, Predictions 16. PRICE CODE 17. SECURITY ...CLASSIFICATION is. SECURrrY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITFATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT Unclassified
Building Community Resilience to Disasters
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S.
2011-01-01
Abstract Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation. PMID:28083162
NASA Astrophysics Data System (ADS)
Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor
Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.
Has the Department of Homeland Security (DHS) Outlived Its Usefulness?
2012-12-01
Carolyn Halladay THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this...LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT...Trinkunas Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The Department of Homeland Security
Change Detection Algorithms for Information Assurance of Computer Networks
2002-01-01
original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the
Renditions: Constraints Imposed by Laws on Torture
2007-10-12
14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 30 19a...limit or bar U.S. participation in renditions, including S. 1876, the National Security with Justice Act of 2007, and H.R. 1352, the Torture...civil case on a number of grounds, including that certain claims raised against U.S. officials implicated national security and foreign policy
Beyond Fossil Fuels: Options and Challenges
NASA Astrophysics Data System (ADS)
Thompson, Levi T.
2007-05-01
Securing our nationâÂÂs energy supply is arguably the most important challenge we face. The source and amount of energy that is available impacts nearly every aspect of our lives including our mobility, health and welfare. Presently, the U.S. depends heavily on foreign energy resources. For example, in 2006, nearly 60 percent of the crude oil consumed in the U.S. was imported; approximately one-quarter of this oil comes from the Persian Gulf. With growing demands from emerging economies, declining environmental quality and potential for global conflict, there is a pressing need to develop a more sustainable energy strategy. This presentation will review options for a sustainable energy economy including the use of hydrogen and fuel cells, and describe some of the key challenges To cite this abstract, use the following reference: http://meetings.aps.org/link/BAPS.2007.OSS07.A1.2
Assessment of the Activation State of RAS and Map Kinase in Human Breast Cancer Specimens (96Breast)
1999-09-01
Cancer 16. PRICE CODE 17. SECURITY CLASSIFICATION 18 . SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...THIS PAGE OF ABSTRACT Unclassified Unclassified Unclassified Unlimited NSN 7640-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 ...transformation and regulate cell morphology, adhesion and motility through cytoskeletal dynamics and play an important role in carcinogenesis ( 18 ). Rho
2000-07-01
receptor 120 16. PRICE CODE 17. SECURITY CLASSIFICATION 18 . SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...THIS PAGE OF ABSTRACT Unclassified Unclassified Unclassified Unlimited NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 ... 18 -26 Appended Manuscripts 3 INTRODUCTION Recent work in our laboratory has established the importance of a
State-to-State Thermal/Hyperthermal Collision Dynamics of Atmospheric Species
2012-02-28
kinetics 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT 18 . SECURITY CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION...OF ABSTRACT 20. LIMITATION OF ABSTRACT NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 298-102 AFRL...populations, though colder, are also highly excited in a non-Boltzmann distribution, [ Erot =1.0(1) kcal/mol], which indicates that a substantial fraction
Armed Services Pricing Manual (ASPM)
1986-01-01
NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 361...f. National security . g. Public interest. Two kinds of solicitations are equally acceptable: invitations for bids Fl3s), for sealed bidding, and...2.12 2-14 2-14 2-15 2-15 The objective of procurement is to secure needed supplies and services fr( nsi b I e at fair and reasonable prices calculated
1996-07-01
UNCLASSIFIED AD NUMBER ADB216343 NEW LIMITATION CHANGE TO Approved for public release, distribution unlimited FROM Distribution authorized to U.S...PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF...ABSTRACT ,Unclassified Unclassified Unclassified Limited NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-1 8 DISCLAIMER
HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract
2003-01-01
securing the routing protocols of mobile ad hoc wireless net- works has been done in prevention. Intrusion detection systems play a complimentary...TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified...hops of A would be unable to communicate with B and vice versa [1]. 1.2 The role of intrusion detection in security In order to provide reliable
Formal Verification of Large Software Systems
NASA Technical Reports Server (NTRS)
Yin, Xiang; Knight, John
2010-01-01
We introduce a scalable proof structure to facilitate formal verification of large software systems. In our approach, we mechanically synthesize an abstract specification from the software implementation, match its static operational structure to that of the original specification, and organize the proof as the conjunction of a series of lemmas about the specification structure. By setting up a different lemma for each distinct element and proving each lemma independently, we obtain the important benefit that the proof scales easily for large systems. We present details of the approach and an illustration of its application on a challenge problem from the security domain
Scalable and Precise Abstraction of Programs for Trustworthy Software
2017-01-01
calculus for core Java. • 14 months: A systematic abstraction of core Java. • 18 months: A security auditor for core Java. • 24 months: A contract... auditor for full Java. • 42 months: A web-deployed service for security auditing. Approved for Public Release; Distribution Unlimited 4 4.0 RESULTS
Printer Multiplexing Among Multiple Z-100 Microcomputers.
1985-12-01
allows the printer to be used by any one of multiple Z-l00’s at a time. The SPOOL process sends the data thru the CONTROL process to the printer or saves...the data on the (Continue) 20 OISTRIBUTION/AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION K)UNCLASSIFIEDIUNLIMITED 0 SAME AS RPT 0 DTIC...CLASSFICATION Of THIS PAG9 (l#1011 DMIat 19. ABSTRACT (Continued) disk file. - ,:1J. 4, .-.-. _ SECURITY CLASSIF9CATION OP THIS PA8EWY~en Data Enteed
Center for Seismic Studies Final Technical Report, October 1992 through October 1993
1994-02-07
SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT...Upper limit of depth error as a function of mb for estimates based on P and S waves for three netowrks : GSETr-2, ALPHA, and ALPHA + a 50 station...U 4A 4 U 4S as 1 I I I Figure 42: Upper limit of depth error as a function of mb for estimatesbased on P and S waves for three netowrk : GSETT-2o ALPHA
Service-oriented Software Defined Optical Networks for Cloud Computing
NASA Astrophysics Data System (ADS)
Liu, Yuze; Li, Hui; Ji, Yuefeng
2017-10-01
With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.g., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). This paper proposes a new service-oriented software defined optical network architecture, including a resource layer, a service abstract layer, a control layer and an application layer. We then dwell on the corresponding service providing method. Different service ID is used to identify the service a device can offer. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit different services based on the service ID in the service-oriented software defined optical network.
Chinese and Russian Policies on Climate Change: Implications for U.S. National Security Policy
2016-06-01
Second Reader: Naazneen Barma THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form ...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2...Effects in Russia These same imbalances in rainfall and other weather phenomena are being experienced throughout Russia in the form of floods, droughts
The Latent Structure of Secure Base Script Knowledge
ERIC Educational Resources Information Center
Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.
2015-01-01
There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…
Afghanistan: Key Oversight Issues
2013-02-01
2012. Afghan Security : Renewed Sharing of Biometric Data Could Strengthen U.S. Efforts to Protect U.S. Personnel from Afghan Security Force Attacks...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 59 19a. NAME OF RESPONSIBLE PERSON...Afghanistan’s Security Environment 17 Enclosure II Transition of Lead Security to Afghan Security Forces 19 Enclosure III Future Cost and
Integrating security in a group oriented distributed system
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth; Gong, LI
1992-01-01
A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.
Implications of the Budgeting Process on State-of-the-Art (SOA) Extensions.
1987-12-01
CLASSIFICATION AUTHORITY 3 DISTRIBUTION /AVAILABILITY OF REPORT Approved for public release; Zb DECLASSiFICATION1DOWNGRADING SCHEDULE Distribution is...PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO NO ACCESSION NO 11. TITLE (Include Security Classification ) IMPLICATIONS OF THE BUDGETING PROCESS ON STATE...20 DISTRIBUTIONAVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION 0 UNCLASSIFIED,UNLIMI"ED 0 SAME AS RPT QJ DTIC USERS UNCLASSIFIED 22a
Shared Electronic Health Record Systems: Key Legal and Security Challenges.
Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M
2017-11-01
Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.
Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program
2012-12-01
distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure
(YIP) Detecting, Analyzing, Modeling Adversarial Propaganda in Social Media
2015-10-26
SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c . THIS PAGE 17. LIMITATION OF...numbers as they appear in the report, e.g. F33315-86- C -5169. 5b. GRANT NUMBER. Enter all grant numbers as they appear in the report. e.g. AFOSR...classification in accordance with security classification regulations, e.g. U, C , S, etc. If this form contains classified information, stamp classification
UG311, An Oncofetal Marker Lost with Prostate Cancer Progression
2001-04-01
CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT Unclassified Unclassified...that the IGF2R facilitates the degradation of IGF-2 by transporting IGF-2 to lysozomes, thereby limiting the signal potentiated by the growth factor...integrin mediated migration. IGF-1 had no effect on this activity. IGFBP-1 is expressed in the placenta [105] where it may limit trophoblast invasion
2015-09-01
for public release; distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT While scholars study the radicalization process that...the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2015...Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT While scholars study the radicalization process that produces lone-wolf terrorists
76 FR 77052 - Proposed Collection; Comment Request for Form 8931
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
... 8931, Agricultural Chemicals Security Credit. DATES: Written comments should be received on or before... . SUPPLEMENTARY INFORMATION: Title: Agricultural Chemicals Security Credit. OMB Number: 1545-2122. Form Number: 8931. Abstract: Use Form 8931 to claim the tax credit for qualified agricultural chemicals security...
Homeland Security. Management Challenges Facing Federal Leadership
2002-12-01
Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future
1984-09-01
Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development
Acute Radiation Sickness Amelioration Analysis
1994-05-01
Emetic Drugs 16. PRICE CODE Antagonists 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19, SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF...102 UNCLASSIFIED mcuIw IA IIIcaIIin or Isis PAW CLASSFIED BY: N/A since Unclassified. DECLASSIFY ON: N/A since Unclassified. SECURITY CLASSIFICATION OF...Approximately 2000 documents relevant to the development of the candidate anti-emetic drugs ondansetron (Zofran, Glaxo Pharmaceuticals) and granisetron
78 FR 50436 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
... Justification Template. Abstract: The TSGP is an important component of the Department of Homeland Security's... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0022... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency...
2006-02-17
included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME
Development of a Lithospheric Model and Geophysical Data Base for North Africa.
1996-07-19
Department of Energy Office of Non-Proliferation and National Security MONITORED BY Phillips Laboratory CONTRACT No. F 19628-C-0104 The views and...Worldwide Standardized Seismograph Netowrk stations locatdd:.&t regional distances from magnitude greater than 5.•0 earthquakes occurring within N6rth... SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACTOF REPORT OF THIS PAGE OF ABSTRACT
Focusing America’s National Powers
2006-04-14
governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own
5 CFR 1312.11 - Challenges to classifications.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...
5 CFR 1312.11 - Challenges to classifications.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...
Enhanced Patient Expectant and Antiemetic Drug Efficacy
1999-07-01
Breast Cancer Nausea and Vomiting Expectancy Patient Information Antiemetic Side Effect 15. NUMBER OF PAGES 15 16. PRICE CODE 17. SECURITY ...CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT...5-HT3 receptor antagonist class of antiemetics (ondansetron, granisetron , tropisitron) have greatly reduced chemotherapy-related vomiting, this has
2002-04-01
Training environments; Distance learning; Information sharing; System architecture; 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public... security , and the team members generally originate from different geographical locations and different units with varied operational mission and...Use of a server provides security and flexibility in the development and updating of training material. The lessons are created in HTML, a widely
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Automated Library System Specifications.
1986-06-01
University), LIS (Georqetown Universitv Medical Center) 20 DiSTRI3UT!ON.. AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION :UNCLASSIFIED...Interface) acquisitions, patron access catalo. (Boolean search), authority Afiles, zana ~ezient reports. Serials control expected in 1985. INDIVIDUALIZATIOI
Lawlis, Tanya; Islam, Wasima; Upton, Penney
2018-04-01
Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.
Privacy, security and access with sensitive health information.
Croll, Peter
2010-01-01
This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.
Next-Generation Botnet Detection and Response
2008-06-24
REPORT Final Report of "Next-Generation Botnet Detection and Response" 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In this project, we developed...and Wenke Lee. ?In Proceedings of The 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, February 2006. 2...In Proceedings of The 16th USENIX Security Symposium ( Security ), Boston, MA, August 2007. 3. A Taxonomy of Botnet Structures. ?David Dagon, Guofei
XUV Frequency Comb Development for Precision Spectroscopy and Ultrafast Science
2015-07-28
first time and provide insight to the underlying 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...TERMS. Key words or phrases identifying major concepts in the report. 16. SECURITY CLASSIFICATION. Enter security classification in accordance with... security classification regulations, e.g. U, C, S, etc. If this form contains classified information, stamp classification level on the top and bottom
Moving Forward with Enhancements for Our Customers
2008-11-18
The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18...Materials and Testing Alion Science & Technology CBRNIAC Chemical, Biological Radiological, Nuclear Battelle Memorial CPIAC Chemical Propulsion Johns
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G
2016-05-01
The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.
2016-01-01
Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842
Enzymatic Decontamination of Environmental Organophosphorus Compounds
2006-12-04
ABSTRACT (Maximum 200 words) The abstract is below since many authors do not follow the 200 word limit 14. SUBJECT TERMS organophosphorus compounds ...5404 Enzymatic decontamination of environmental organophosphorus compounds REPORT DOCUMENTATION PAGE 18. SECURITY CLASSIFICATION ON THIS PAGE...239-18 298-102 15. NUMBER OF PAGES 20. LIMITATION OF ABSTRACT UL - 4-Dec-2006 Enzymatic decontamination of environmental organophosphorus compounds
Renditions: Constraints Imposed by Laws on Torture
2009-01-22
AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY ...suspended after the Italian government said testimony could reveal state secrets threatening Italy’s national security . “CIA-Linked Kidnapping Trial...raised against U.S. officials implicated national security and foreign policy considerations, and assessing the propriety of those considerations was
ERIC Educational Resources Information Center
Sauls, Jeff; Gudigantala, Naveen
2013-01-01
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
75 FR 43486 - Proposed Information Collection; Comment Request; Special Comprehensive License
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Special Comprehensive License AGENCY: Bureau of Industry and Security, Commerce ACTION: Notice....gov . SUPPLEMENTARY INFORMATION: I. Abstract The Special Comprehensive License (SCL) procedure...
Modelling Medications for Public Health Research
van Gaans, D.; Ahmed, S.; D’Onise, K.; Moyon, J.; Caughey, G.; McDermott, R.
2016-01-01
Most patients with chronic disease are prescribed multiple medications, which are recorded in their personal health records. This is rich information for clinical public health researchers but also a challenge to analyse. This paper describes the method that was undertaken within the Public Health Research Data Management System (PHReDMS) to map medication data retrieved from individual patient health records for population health researcher’s use. The PHReDMS manages clinical, health service, community and survey research data within a secure web environment that allows for data sharing amongst researchers. The PHReDMS is currently used by researchers to answer a broad range of questions, including monitoring of prescription patterns in different population groups and geographic areas with high incidence/prevalence of chronic renal, cardiovascular, metabolic and mental health issues. In this paper, we present the general notion of abstraction network, a higher level network that sits above a terminology and offers compact and more easily understandable view of its content. We demonstrate the utilisation of abstraction network methodology to examine medication data from electronic medical records to allow a compact and more easily understandable view of its content. PMID:28149446
Compatibility of Army Systems with Anthropometric Characteristics of Female Soldiers
1997-09-01
M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For Unclassified/ Limited ...of female soldiers. Participation was limited to female soldiers whose height did not exceed 5’ 5", the 5th percentile value of male soldiers’ height...CLASSIFICATION tffcMSSIFIED 18. SECURITY CLASSIFICATION uffdLÄS^FIED 19. SECURITY CLASSIFICATION ST*—FIED 20. LIMITATION OF ABSTRACT SAR
Microcomputer Polling Improvements for AFSATCOM.
1981-06-01
AGENCY NAME A AODRESS(il differ~,.ru C~ntrolling Office) IS. SECURITY CLASS. (of this report) 2/’ .iUNCLASSI FIED 1/ 5a. DECLASSIFICATION DOWNGRADING...enhance (over) DD I1JAN 73 1473, UNCLASSIFIED - ~~~ SECURITY CLASSIFICATION OF THIS PAGE (When Dots Enterd’I.. SECURITY CLASSIaICATION OF THIS PAGE(ahnm...Data Entered) 20. ABSTRACT (Continued) /7 hetting capabilities for the satellite-user community /V 4. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
2016-07-14
of the important properties of secure computation . In particular, it is known that full fairness cannot be achieved in the case of two-party com...Jakobsen, J. Nielsen, and C. Orlandi. A framework for outsourcing of secure computation . In ACM Workshop on Cloud Computing Security (CCSW), pages...Function Evaluation with Applications to Genomic Computation Abstract: Computation based on genomic data is becoming increasingly popular today, be it
The Enterprise 2.0 Concept: Challenges on Data and Information Security
NASA Astrophysics Data System (ADS)
Silva, Ana; Moreira, Fernando; Varajão, João
The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.
A forensic identification case and DPid - can it be a useful tool?
de QUEIROZ, Cristhiane Leão; BOSTOCK, Ellen Marie; SANTOS, Carlos Ferreira; GUIMARÃES, Marco Aurélio; da SILVA, Ricardo Henrique Alves
2017-01-01
Abstract Objective The aim of this study was to show DPid as an important tool of potential application to solve cases with dental prosthesis, such as the forensic case reported, in which a skull, denture and dental records were received for analysis. Material and Methods Human identification is still challenging in various circumstances and Dental Prosthetics Identification (DPid) stores the patient’s name and prosthesis information and provides access through an embedded code in dental prosthesis or an identification card. All of this information is digitally stored on servers accessible only by dentists, laboratory technicians and patients with their own level of secure access. DPid provides a complete single-source list of all dental prosthesis features (materials and components) under complete and secure documentation used for clinical follow-up and for human identification. Results and Conclusion If DPid tool was present in this forensic case, it could have been solved without requirement of DNA exam, which confirmed the dental comparison of antemortem and postmortem records, and concluded the case as a positive identification. PMID:28678955
76 FR 23645 - Proposed Collection; Comment Request for Form 8937
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
... 8937, Report of Organizational Actions Affecting Basis of Securities. DATES: Written comments should [email protected] . SUPPLEMENTARY INFORMATION: Title: Report of Organizational Actions Affecting Basis of Securities. OMB Number: 1545-XXXX. Form Number: 8937. Abstract: Organizational actions that...
78 FR 41032 - Proposed Information Collection; Comment Request; Special Comprehensive License
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-09
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Special Comprehensive License AGENCY: Bureau of Industry and Security. ACTION: Notice. [email protected] . SUPPLEMENTARY INFORMATION: I. Abstract The Special Comprehensive License (SCL) procedure...
SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE
2017-04-06
the organizational built up of the German Cyber Command. iii Abstract When former National Security Agency contractor Edward Snowden...Introduction In June 2013, former National Security Agency (NSA) contractor Edward Snowden revealed that the United States was spying on 122
In House HSV PCR, Process Improvement and Cost Effectiveness Analysis
2017-09-15
TYPE 09/15/2017 Poster 4. TITLE AND SUBTITLE Cost-Analysis: In-hous(l HSV P(’R capabilities 6. AUTHOR(S) Ma.i Nich() las R CaJT 7. PERFORMING...ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMIT A TIC ".’ OF 18. NUMBER a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT OF PAGES 3
The new risk paradigm for chemical process security and safety.
Moore, David A
2004-11-11
The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.
Sports Venue Security: Public Policy Options for Sear 4-5 Events
2014-06-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited SPORTS VENUE...Thesis 4. TITLE AND SUBTITLE SPORTS VENUE SECURITY: PUBLIC POLICY OPTIONS FOR SEAR 4–5 EVENTS 5. FUNDING NUMBERS 6. AUTHOR(S) James M. Gehring...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Although the United States made considerable advances in improving sport venue security
Toward Privacy-preserving Content Access Control for Information Centric Networking
2014-03-01
REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting
Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges
2010-07-01
the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity
EU Failing FAO Challenge to Improve Global Food Security.
Smyth, Stuart J; Phillips, Peter W B; Kerr, William A
2016-07-01
The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.
2011-05-04
evolving security challenges. Issues such as terrorism, proliferation of weapons of mass destruction, impacts of climate change , and the ever...impacts of climate change , and the ever-growing competition for valuable natural resources are a few of the these challenges. As an integral part...destruction, impacts of climate change , and the ever-growing competition for valuable natural resources have resulted in a new set of security
Security of Quantum Repeater Network Operation
2016-10-03
AFRL-AFOSR-JP-TR-2016-0079 Security of Quantum Repeater Network Operation Rodney Van Meter KEIO UNIVERSITY Final Report 10/03/2016 DISTRIBUTION A...To) 29 May 2014 to 28 May 2016 4. TITLE AND SUBTITLE Security of Quantum Repeater Network Operation 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386...ABSTRACT Much of the work on quantum networks , both entangled and unentangled, has been about the uses of quantum networks to enhance end- host security
1984-12-01
52242 Prepared for the AIR FORCE OFFICE OF SCIENTIFIC RESEARCH Under Grant No. AFOSR 82-0322 December 1984 ~ " ’w Unclassified SECURITY CLASSIFICATION4...OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS Unclassified None 20 SECURITY CLASSIFICATION...designer .and computer- are 20 DIiRIBUTION/AVAILABI LIT Y 0P ABSTR4ACT 21 ABSTRACT SECURITY CLASSIFICA1ONr UNCLASSIFIED/UNLIMITED SAME AS APT OTIC USERS
1988-03-01
Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-27
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: National Explosives Detection Canine Team Program (NEDCTP... Explosives Detection Canine Team Program (NEDCTP) canine handlers. Abstract: The FAMS/CTES Explosives...
7 Key Challenges for Visualization in Cyber Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Best, Daniel M.; Endert, Alexander; Kidwell, Dan
In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.
Tyfield, David
2011-07-01
There is a growing consensus that we are facing epochal challenges in global food security. Moreover, these challenges are multiple and complex. Meeting these challenges will involve nothing less than a wholesale socio-technical transition of the agri-food system. Optimizing the efficacy of the contribution of research to such a food security agenda will probably also need new institutional mechanisms and career structures to facilitate new kinds of collaborations and ongoing, longer-term projects. In short, the multiple challenges of food security demand a different political economy of research for effective intervention by science. In making this argument, the paper summarizes the major findings of a recent report regarding the potential impact of so-called 'disruptive' low-carbon innovations in China.
Interactive Synthesis of Code Level Security Rules
2017-04-01
Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University
To Legalize or not to Legalize? That is the Question
2009-04-01
and international community to improve security and promote development in Afghanistan. The negative effect on the nations overall security, the...the problem/solution methodology. The research explores the current illicit opium cultivation in Afghanistan and its effect on the current...negative effect on the current development efforts. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF
Maintaining the Status Quo in the Taiwan Strait
2013-03-01
of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) U.S. Army...Count: 5,308 14. ABSTRACT In order to ensure vital U.S. interests concerning security and economic freedom in the region, the status quo in the...international/regional support of Taiwan, Taiwanese military deterrence backed by strategically ambiguous U.S. assurances of security , intertwined
Water Quality Conditions at Tributary Projects in the Omaha District: 2008 Report
2009-01-01
SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public release... distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as... Plankton
A System Architecture to Support a Verifiably Secure Multilevel Security System.
1980-06-01
4] Newmann, P.G., R. Fabry, K. Levitt, L. Robin - provide a tradeoff between cost and system secur- son, J. Wensley , "On the Design of a Provably ity...ICS-80/05 NL 112. 11W1 --1.25 1111 6 Mli,’O~ll Rl OIIION W AII .q3 0 School of Information and Computer Science S =GEORGIA INSTITUTE OF TECHNOLOGY 808...Multilevel Security Systemt (Extended Abstract) George I. Davida Department of Electical Engineering and Computer Science University of Wisconsin
Technologies for an aging society: a systematic review of "smart home" applications.
Demiris, G; Hensel, B K
2008-01-01
A "smart home" is a residence wired with technology features that monitor the well-being and activities of their residents to improve overall quality of life, increase independence and prevent emergencies. This type of informatics applications targeting older adults, people with disabilities or the general population is increasingly becoming the focus of research worldwide. The aim of this study was to provide a comprehensive review of health related smart home projects and discuss human factors and other challenges. To cover not only the medical but also the social sciences and electronics literature, we conducted extensive searches across disciplines (e.g., Medline, Embase, CINAHL, PsycINFO, Electronics and Communications Abstracts, Web of Science etc.). In order to be inclusive of all new initiatives and efforts in this area given the innovativeness of the concept, we manually searched for relevant references in the retrieved articles as well as published books on smart homes and gerontechnology. A total of 114 publications (including papers, abstracts and web pages) were identified and reviewed to identify the overarching projects. Twenty one smart home projects were identified (71% of the projects include technologies for functional monitoring, 67% for safety monitoring, 47% for physiological monitoring, 43% for cognitive support or sensory aids, 19% for monitoring security and 19% to increase social interaction). Evidence for their impact on clinical outcomes is lacking. The field of smart homes is a growing informatics domain. Several challenges including not only technical but also ethical ones need to be addressed.
78 FR 34161 - Proposed Collection: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-06
... Time Deposits. PD F 4144-1--Account Information for U.S. Treasury Securities State and Local Government.... Abstract: The information is requested to establish and maintain accounts for the owners of securities of... agencies to take this opportunity to comment on proposed and/or continuing information collections, as...
77 FR 37475 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-21
... 8931, Agricultural Chemicals Security Credit. Form: 8931. Abstract: Form 8931 is used to claim the tax credit for qualified agricultural chemicals security costs paid or incurred by eligible agricultural businesses. All the costs must be paid or incurred to protect specified agricultural chemicals at a facility...
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
Analysis for Non-Traditional Security Challenges: Methods and Tools
2006-11-20
PMESII Modeling Challenges modeling or where data is not available to support the model, would aid decision Domain is large, nebulous, complex, and...traditional challenges . This includes enlisting the aid of the inter-agency and alliance/coalition communities. Second, we need to realize this...20 November 2006 MILITARY OPERATIONS RESEARCH SOCIETY MIFh MORS Workshop Analysis for Non-Traditional Security Challenges : Methods and Tools 21-23
Conflict vs Co-evolution: The Future of Sino-American Relations
2013-04-18
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Marine Corps University...was the largest foreign holder of U.S. treasury securities , at $1.16 trillion. This is only slightly greater than Japan at $1.13 trillion, but much...territory, geostrategy, and energy security , impacting China’s relations with its neighbors.”10 In reality, the emotional influences of national
USSOF OPERATIONS IN AFRICA: PROSPECTS FOR FUTURE ENGAGEMENTS IN THE SAHEL
2017-04-03
Mechanical Engineering. He also obtained a Master of Arts degree in Terrorism , Organized Crime and Global Security from the Coventry University, United...was a staff officer in the Headquarters Nigerian Air Force, Abuja. iv Abstract As part of the Global War on Terror , AFRICOM was established...to secure the US security interests in Africa. AFRICOM, through the Trans-Saharan Counter Terrorism Partnership uses USSOF to engage Sahelian
Conflict Containment in the Balkans: Testing Extended Deterrence.
1995-03-01
STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited. 13. ABSTRACT This thesis critically analyzes a prominent theoretical...Containment 15. NUMBER OF in the Balkans; Deterrence; Coercive Diplomacy; Balance of Forces. PAGES: 161 16. PRICE CODE 17. SECURITY CLASSIFI- 18. SECURITY...Department of National Security Affai sAccesion For NTIS CRA&I DTtC TAB Unannounced Justifca ........... By- Distribution Availability Codes Avail and/or Dist
Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service
2007-12-07
MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a...such as the TACLANE, have developed unique discovery methods to establish Plain Text Domain (PTD) Security Associations (SA). All of these techniques...can include network and host Internet Protocol (IP) addresses, Information System Security Office (ISSO) point of contact information and PTD status
Geostationary Orbital Crowding: An Analysis of Problems and Solutions
1990-05-16
PAGES 237 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...later chapters. Those with technical backgrounds may still wish to skim this chapter as kind of a refresher of rarely used information. The purpose of...increased, by economic reason, so must supply. Basically, when prices are high the market will drive the availability of new resources 5 through
Translations on Eastern Europe, Scientific Affairs, Number 537
1977-03-07
Security Class (This Report) UNCLASSIFIED 20. Security Class (This Page UNCLASSIFIED 21. No. of Pages 22. Price KORM N riS-:i5 1R17.V...the new five-year plan too, the rapid.and secure development of industry is tied directly to the expansion of the mineral extracting and processing... cybernetic aspects supplied those foundations for generalizations and possibilities of abstraction, which the individual sciences needed. Not until
Foundational Security Principles for Medical Application Platforms* (Extended Abstract)
Vasserman, Eugene Y.; Hatcliff, John
2014-01-01
We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096
A security architecture for health information networks.
Kailar, Rajashekar; Muralidhar, Vinod
2007-10-11
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.
A Security Architecture for Health Information Networks
Kailar, Rajashekar
2007-01-01
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862
Water Quality Conditions at Tributary Projects in the Omaha District: 2006 Annual Report
2007-12-01
ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...14 2.3.3 Plankton
A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks
2001-01-01
00-00-2001 to 00-00-2001 4. TITLE AND SUBTITLE A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Netowrks 5a. CONTRACT NUMBER...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE
Modelling a Network of Decision Makers
2004-06-01
DATES COVERED 00-00-2004 to 00-00-2004 4. TITLE AND SUBTITLE Modelling a Netowrk of Decision Makers (Briefing Charts) 5a. CONTRACT NUMBER 5b...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 31 19a
2006-05-16
LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Chairman, JMO Dept a. REPORT UNCLASSIFIED b . ABSTRACT UNCLASSIFIED...Mann, Sloan., Bajraktari , Yiber., Karam, Patricia. Donor Activities and Civil Society Potential in Iraq. Special Report 124, United States
75 FR 75453 - Proposed Information Collection; Comment Request; Technical Data Letter of Explanation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
... Request; Technical Data Letter of Explanation AGENCY: Bureau of Industry and Security. ACTION: Notice....gov . SUPPLEMENTARY INFORMATION: I. Abstract These technical data letters of explanation will assure the Bureau of Industry and Security that U.S.-origin technical data will be exported only for...
78 FR 69099 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-18
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0033... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency... 089-17, RCPT Membership List. Abstract: The RCPGP is an important tool among a comprehensive set of...
Challenges on the epidemiological and economic burden of diabetes and hypertension in Mexico
Arredondo, Armando; Orozco, Emanuel; Alcalde-Rabanal, Jaqueline; Navarro, Juan; Azar, Alejandra
2018-01-01
ABSTRACT OBJECTIVE To analyze the epidemiological and economic burden of the health services demand due to diabetes and hypertension in Mexico. METHODS Evaluation study based on a time series study that had as a universe of study the assured and uninsured population that demands health services from the three main institutions of the Health System in Mexico: The Health Department, the Mexican Institute of Social Security, and Institute of Services and Social Security for State Workers. The financing method was based on instrumentation and consensus techniques for medium case management. In order to estimate the epidemiological changes and financial requirements, a time series of observed cases for diabetes and hypertension 1994–2013 was integrated. Probabilistic models were developed based on the Box-Jenkins technique for the period of 2013–2018 with 95% confidence intervals and p < 0.05. RESULTS Comparing results from 2013 versus 2018, in the five regions, different incremental trends of 14%–17% in epidemiological changes and 58%-66% in the economic burden for both diseases were observed. CONCLUSIONS If the risk factors and the different models of care remained as they currently are in the three institutions analyzed, the financial consequences would be of greater impact for the Mexican Institute of Social Security, following in order of importance the Institute of Services and Social Security for State Workers and lastly the Health Department. The financial needs for both diseases will represent approximately 13%–15% of the total budget allocated to the uninsured population and 15%–17% for the population insured depending on the region. PMID:29489993
Romania and the New Cold War Security Challenges
2017-06-09
social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic , political...and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... course of the two challenge months, satisfy the requirements described above for receiving assignment of... Qualified Security, the assignment of Qualified Securities to a Group will be based on factors that include... become the LMM for such Qualified Security, it may initiate a challenge by notifying the Exchange of its...
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
Non-Cr Paint Systems on Commercial Aircraft - Current Status and Future Direction
2014-11-01
have been used on all metal parts, including aluminum, titanium, and stainless steel alloys. Over 75% of the plane is coated with chromated...Sustainable Surface Engineering for Aerospace and Defense, 18-20 Nov 2014, Fort Myer, VA. 14. ABSTRACT 15 . SUBJECT TERMS 16. SECURITY CLASSIFICATION...OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT
Context Aware Middleware Architectures: Survey and Challenges
Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio
2015-01-01
Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
Examining Long Term Climate Related Security Risks through the Use of Gaming and Scenario Planning
2016-10-24
114 Examining Long-Term Climate-Related Security Risks through the Use of Gaming and Scenario Planning Catherine M. Schkoda, Shawna G. Cuan, and...E. D. McGrady Abstract: This paper examines four possible climate change-related security risks that emerged from an international game and scenario...potential for an emerging disparity between regions over the consensus and control of climate change-related technologies. Keywords: gaming , scenario
The Regulation of International Coercion: Legal Authorities and Political Constraints
2005-10-01
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 158 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...humanitarian crises that may come before the UN, if unanimity among the five permanent members of the Security Council continues to be a requirement. Only the...United Kingdom, Belgium, and Germany, among the NATO participants, have directly addressed the matter and found that the authorization of the Security
Homeland Security: A Selected Bibliography
2011-04-01
ProQuest Witzleb, Robert W., and Scott C . Truver. "Not Just a Bad Hair Day." [underwater mines] Proceedings: U.S. Naval Institute 134, no. 10...SAR) 18. NUMBER OF PAGES 35 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified...IP_15_09_MigrationAndBorderSecurity.pdf Haddal, Chad C . Border Security: Key Agencies and Their Missions. Washington, DC: Library of Congress, Congressional Research Service
The Dynamic Community of Interest and Its Realization in ZODIAC
2009-10-01
the ZODIAC project. ZODIAC is a network architecture that puts security first and foremost, with security broken down into confidentiality, integrity...hosts, a unified solution for MANETs will work for hosts or routers as well. DYNAMIC COMMUNITIES OF INTEREST The basis of the ZODIAC design is a new dis...narrow scope of each DCoI limits attack propagation, and supports confidentiality ABSTRACT The ZODIAC project has been exploring a security first
Economy Over Security: Why Crises Fail to Impact Economic Behavior in East Asia
2017-12-01
SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST ASIA by Aaron R. Sipos December 2017 Thesis Advisor: Michael Glosny Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ECONOMY OVER SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST...release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) This study examines changes in economic behavior in
Isolation of Signaling Molecules Involved in Angiogenic Pathways Mediated Alpha v Integrins
2004-05-01
67 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMITATION OF ABSTRACT OF REPORT OF THIS PAGE... comparison to the controls (Figure 7C). Penetratin or the VVISYSMPD peptide alone were used as negative controls and had no effect under identical...A., O’Connor, W., King , K., Overholser, J., Hooper, A., Pytowski, B., Witte, L. et al., 1999. Antivascular endothelial growth factor receptor (fetal
Army Communicator. Volume 28, Number 1, Spring 2003
2003-01-01
SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 72 19a. NAME OF RESPONSIBLE PERSON ...does business to meet these requirements and the growing expectations from the president and his staff for instantaneous, global, secure , reliable and...by COL Tim Gibson Do you have access to a secure Internet-protocol router network terminal on a regular basis? If you answered yes, you’re wrong
Evaluation of the Efficiency of Liquid Cooling Garments using a Thermal Manikin
2005-05-01
temperatures. The software also calculates thermal resistances and evaporative resistances. TM tests were run dry (i.e. no sweating ) and wet (i.e...REPORT DOCUMENTATION PAGE Form ApprovedOMB No . 0704-0188 SECURITY CLASSIFICATION OF REPORT SECURITY CLASSIFICATION OF THIS PAGE SECURITY CLASSIFICATION...OF ABSTRACT 8. M05-17 1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE EVALUATION OF THE EFFICIENCY OF LIQUID COOLING GARMENTS USING A THERMAL
Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists
Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin
2017-01-01
Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774
Dynamic Red Queen Explains Patterns in Fatal Insurgent Attacks
2011-03-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 25 19a. NAME OF RESPONSIBLE PERSON a. REPORT...2010) 3. R.D. Sagarin, Natural Security : A Darwinian Approach to a Dangerous World, Eds. R. Sagarin and T. Taylor, (Univ. California Press, 2009), p...American Security , Washington, 2010) 17. A. Cho, Science, 325, 406 (2009) 18. A. Guttfraind, Studies in Conflict and Terrorism, 32, 45 (2009) 19
Strategic Paralysis: An Airpower Theory for the Present
1992-05-01
Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Control as: �The role that encompasses all actions taken to secure and control the aerospace environment and to deny the use of that environment to the...destruction is to damage one�s own future prosperity, and, by sowing the seeds of revenge, to jeopardize one�s future security .�48 This is a hauntingly
Resource Allocation: The Department of Defense’s Achielle’s Heel
2003-05-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 68 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...reorganization was The National Security Act of 1947 (NSA), the first major reorganization following WWII. The NSA was the result of compromise between...1935.4 Though amended several times, the Isolationist view of the war ended in 1941 at Pearl Harbor. The National Security Act Of 1947
Practical challenges in quantum key distribution
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...
2016-11-08
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Practical challenges in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran
2014-01-01
As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.
Cyber security challenges in Smart Cities: Safety, security and privacy.
Elmaghraby, Adel S; Losavio, Michael M
2014-07-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.
32 CFR 2700.14 - Challenges to classification.
Code of Federal Regulations, 2011 CFR
2011-07-01
... NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.14 Challenges to classification. If holders of classified information believe the information is improperly or unnecessarily... the OMSN Information Security Oversight Committee, established pursuant to § 2700.51. Action on such...
Identification of Tumor Suppressor Genes by Genetic and Epigenetic Genome-Scanning
2008-04-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U...oncogene-related sequences in human neuroblastomas. Cell 35: 359-67; 1983. 3. Capon, D. J.; Seeburg, P. H.; McGrath, J. P.; Hayflick , J. S.; Edman
The Effects of Combat Exposure on Reenlistment and Attrition
2011-03-01
confounded with the job assignment, but the amount of bias should be minimal given that most people would stay within their trained specialty. C...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed...CONCLUSIONS ............................................................................................87 B. STUDY LIMITATIONS
76 FR 51472 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... CUBES. Form: PD F 1832 E. Abstract: Used to certify assignments of U.S. registered definitive securities. Affected Public: Individuals or Households. Estimated Total Burden Hours: 1,250. OMB Number: 1535-0113... Consent with Respect to United States Savings Bond/Notes. Form: PD F 1849 E. Abstract: Used to obtain a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...
Unlocking the Power of Big Data at the National Institutes of Health
Coakley, Meghan F.; Leerkes, Maarten R.; Barnett, Jason; Gabrielian, Andrei E.; Noble, Karlynn; Weber, M. Nick
2013-01-01
Abstract The era of “big data” presents immense opportunities for scientific discovery and technological progress, with the potential to have enormous impact on research and development in the public sector. In order to capitalize on these benefits, there are significant challenges to overcome in data analytics. The National Institute of Allergy and Infectious Diseases held a symposium entitled “Data Science: Unlocking the Power of Big Data” to create a forum for big data experts to present and share some of the creative and innovative methods to gleaning valuable knowledge from an overwhelming flood of biological data. A significant investment in infrastructure and tool development, along with more and better-trained data scientists, may facilitate methods for assimilation of data and machine learning, to overcome obstacles such as data security, data cleaning, and data integration. PMID:27442200
Security Challenges in the Gulf of Guinea Sub-Region: Strategy for Nigeria
2008-06-01
Gas Fisheries Defense of Shipping Data Sea Power Functioning Ecosystem Nation-States Pollution & Misuse Criminal Activities Poaching ...region, these increased activities have created challenging security issues including increased piracy, poaching , terrorism, militant youth activities... impact its economic, social and political development. Also, the GoG’s vast sea area presents great challenges to the Nigerian nation and the
2009-10-01
parameters for a large number of species. These authors provide many sample calculations with the JCZS database incorporated in CHEETAH 2.0, including...FORM (highest classification of Title, Abstract, Keywords) DOCUMENT CONTROL DATA (Security classification of title, body of abstract and...CLASSIFICATION OF FORM 13. ABSTRACT (a brief and factual summary of the document. It may also appear elsewhere in the body of the document itself
Boundary‐spanning actors in complex adaptive governance systems: The case of multisectoral nutrition
Gervais, Suzanne; Hafeez‐ur‐Rehman, Hajra; Sanou, Dia; Tumwine, Jackson
2017-01-01
Abstract A growing literature highlights complexity of policy implementation and governance in global health and argues that the processes and outcomes of policies could be improved by explicitly taking this complexity into account. Yet there is a paucity of studies exploring how this can be achieved in everyday practice. This study documents the strategies, tactics, and challenges of boundary‐spanning actors working in 4 Sub‐Saharan Africa countries who supported the implementation of multisectoral nutrition as part of the African Nutrition Security Partnership in Burkina Faso, Mali, Ethiopia, and Uganda. Three action researchers were posted to these countries during the final 2 years of the project to help the government and its partners implement multisectoral nutrition and document the lessons. Prospective data were collected through participant observation, end‐line semistructured interviews, and document analysis. All 4 countries made significant progress despite a wide range of challenges at the individual, organizational, and system levels. The boundary‐spanning actors and their collaborators deployed a wide range of strategies but faced significant challenges in playing these unconventional roles. The study concludes that, under the right conditions, intentional boundary spanning can be a feasible and acceptable practice within a multisectoral, complex adaptive system in low‐ and middle‐income countries. PMID:29024002
1989-12-24
training; 16 . PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...to be leased is 205. One hundred aircraft will be VFR aircraft only. One hundred and five aircraft will be instrument flight rules ( IFR ) certified, 55...of which will be IFR equipped. The other IFR -certified aircraft will be visual flight rules equipped. c. The total lease cost is based on an assumed
1996-10-01
Diet 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE...approach, Frank et al. (1993) compared DDE and PCB residues in the general diet with blood levels of Ontario residents. Blood samples were obtained from...sources of PCBs and HCB in this geographical region. In a similar study, Kashyap et al. (1994) monitored DDT levels in duplicate diet samples and
1994-01-01
Wodf , 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS...then there was a knock on the rickety aluminum door of the trailer. She got up and put on the faded rose-colored terry cloth robe and slippers she had...Summer 1990, p. 2. 20. Dennis M. Drew, "How Television Shapes Foreign Policy ," AirFore.. Mime, November 29, 1993, p. 39. 21. Peter Brock, "Dateline
Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants
2017-02-12
group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research
The Effects of Evaluation and Production Blocking on the Performance of Brainstorming Groups
1992-08-01
NUMBER OF PAGES 701 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LMIITATION OF ABSTRACT OF...special interest group. Once again, the people in the above examples share many things in common such as a sense of civil duty, an employer, a love for a...people respond differently in the presence of others, a phenomenon Zajonc refers to as compresence . In group settings, social facilitation can be
Managing business compliance using model-driven security management
NASA Astrophysics Data System (ADS)
Lang, Ulrich; Schreiner, Rudolf
Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.
ERIC Educational Resources Information Center
Reddy, Dinesh Sampangirama
2017-01-01
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Methodological challenges in qualitative content analysis: A discussion paper.
Graneheim, Ulla H; Lindgren, Britt-Marie; Lundman, Berit
2017-09-01
This discussion paper is aimed to map content analysis in the qualitative paradigm and explore common methodological challenges. We discuss phenomenological descriptions of manifest content and hermeneutical interpretations of latent content. We demonstrate inductive, deductive, and abductive approaches to qualitative content analysis, and elaborate on the level of abstraction and degree of interpretation used in constructing categories, descriptive themes, and themes of meaning. With increased abstraction and interpretation comes an increased challenge to demonstrate the credibility and authenticity of the analysis. A key issue is to show the logic in how categories and themes are abstracted, interpreted, and connected to the aim and to each other. Qualitative content analysis is an autonomous method and can be used at varying levels of abstraction and interpretation. Copyright © 2017 Elsevier Ltd. All rights reserved.
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Proof Compression and the Mobius PCC Architecture for Embedded Devices
NASA Technical Reports Server (NTRS)
Jensen, Thomas
2009-01-01
The EU Mobius project has been concerned with the security of Java applications, and of mobile devices such as smart phones that execute such applications. In this talk, I'll give a brief overview of the results obtained on on-device checking of various security-related program properties. I'll then describe in more detail how the concept of certified abstract interpretation and abstraction-carrying code can be applied to polyhedral-based analysis of Java byte code in order to verify properties pertaining to the usage of resources of a down-loaded application. Particular emphasis has been on finding ways of reducing the size of the certificates that accompany a piece of code.
Cyber security challenges in Smart Cities: Safety, security and privacy
Elmaghraby, Adel S.; Losavio, Michael M.
2014-01-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517
Protecting water and wastewater infrastructure from cyber attacks
NASA Astrophysics Data System (ADS)
Panguluri, Srinivas; Phillips, William; Cusimano, John
2011-12-01
Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.
Pavone, Vincenzo; Esposti, Sara Degli
2012-07-01
As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.
Security Planning and Policies to Meet the Challenges of Climate Change
2010-07-01
Security Climate change poses challenges to societies and governments that go far beyond the alteration of our environment. The physical impacts of...capacity of governments to respond. In this sense, the growing likelihood of events such as mass migrations, crop failures, economic shocks, public...riots and violence, floods and other natural disasters, widespread epidemics, and competition for resources pose serious challenges for governments and
2015-06-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U c... 18 Other achievements...nuclear expression at the protein level. A similar correlation between ATRX and ALT activity was also found in pediatric glioblastomas (10
Behavioral Analysis of Physical Security Job Analyses. Volume 1.
1980-10-01
Job Analyses Personnel Reliability Program Junior Officers Physical Security Morale Motivation 20. ABSTRACT (Continue an reverese ode It neceearly and...internal motivation factors. Assignment of some auxiliary duties to enlisted personnel is possibly conducive to lowered efficiency in physical...subordinates; scheduling pressures; operational alerts and emergencies; relative lack of extrinsic rewards; constant necessity to prove credibility and
DARKDROID: Exposing the Dark Side of Android Marketplaces
2016-06-01
Moreover, our approaches can detect apps containing both intentional and unintentional vulnerabilities, such as unsafe code loading mechanisms and...Security, Static Analysis, Dynamic Analysis, Malware Detection , Vulnerability Scanning 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...applications in a DoD context. ................... 1 1.2.2 Develop sophisticated whole-system static analyses to detect malicious Android applications
Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
NASA Astrophysics Data System (ADS)
Wu, Raymond; Seki, Keisuke; Sakamoto, Ryusuke; Hisada, Masayuki
Web security became an alert in internet computing. To cope with ever-rising security complexity, semantic analysis is proposed to fill-in the gap that the current approaches fail to commit. Conventional methods limit their focus to the physical source codes instead of the abstraction of semantics. It bypasses new types of vulnerability and causes tremendous business loss.
Hardware Based Function Level Mandatory Access Control for Memory Structures
2008-04-01
tagging 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON Lok Kwong Yan a. REPORT U b . ABSTRACT U c. THIS PAGE U 17. LIMITATION...www.phrack.org/issues.html?issue=58&id=4#article [13] Suh, G. E., Lee, J. W., Zhang, D., and Devadas , S. “Secure program execution via dynamic information
System and Network Security Acronyms and Abbreviations
2009-09-01
hazards of electromagnetic radiation to fuel HERO hazards of electromagnetic radiation to ordnance HERP hazards of electromagnetic ...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 System and Network Security Acronyms...authentication and key management ALG application layer gateway ANSI American National Standards Institute AP access point API application
Polnaszek, Brock; Gilmore-Bykovskyi, Andrea; Hovanes, Melissa; Roiland, Rachel; Ferguson, Patrick; Brown, Roger; Kind, Amy J H
2016-10-01
Unstructured data encountered during retrospective electronic medical record (EMR) abstraction has routinely been identified as challenging to reliably abstract, as these data are often recorded as free text, without limitations to format or structure. There is increased interest in reliably abstracting this type of data given its prominent role in care coordination and communication, yet limited methodological guidance exists. As standard abstraction approaches resulted in substandard data reliability for unstructured data elements collected as part of a multisite, retrospective EMR study of hospital discharge communication quality, our goal was to develop, apply and examine the utility of a phase-based approach to reliably abstract unstructured data. This approach is examined using the specific example of discharge communication for warfarin management. We adopted a "fit-for-use" framework to guide the development and evaluation of abstraction methods using a 4-step, phase-based approach including (1) team building; (2) identification of challenges; (3) adaptation of abstraction methods; and (4) systematic data quality monitoring. Unstructured data elements were the focus of this study, including elements communicating steps in warfarin management (eg, warfarin initiation) and medical follow-up (eg, timeframe for follow-up). After implementation of the phase-based approach, interrater reliability for all unstructured data elements demonstrated κ's of ≥0.89-an average increase of +0.25 for each unstructured data element. As compared with standard abstraction methodologies, this phase-based approach was more time intensive, but did markedly increase abstraction reliability for unstructured data elements within multisite EMR documentation.
Challenges and Security in Cloud Computing
NASA Astrophysics Data System (ADS)
Chang, Hyokyung; Choi, Euiin
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
Application Security Automation
ERIC Educational Resources Information Center
Malaika, Majid A.
2011-01-01
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
2016-10-14
ABSTRACT DTAGs have proven to be a valuable tool for the study of marine mammal acoustics and fine scale motion. The success of the DTAG has resulted in...Underwater Acoustics , Digital Communications 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT u u u...continuously monitor and improve the tag design.\\ OBJECTIVES Dtags have proven to be a valuable tool for the study of marine mammal acoustics and fine
2012-09-01
Pentagon, U.S. National Parks and Monuments and Reagan National Airport. Amidst the PCC sits Pentagon City Mall, home to more than 170 stores, a movie...integrated into the homeland security apparatus. As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the...Advisor Dan Moran, PhD Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This thesis
Ideas, Concepts, Doctrine: Basic Thinking in the United States Air Force, 1907-1960. Volume 1
1989-12-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 684 19a. NAME OF RESPONSIBLE PERSON a. REPORT...reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and...lecture have been cleared with the lecturer, even though they may have been unclassified as to military security . To a man these lecturers have been
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Insider Threat Security Reference Architecture
2012-04-01
this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture
Security Certification Challenges in a Cloud Computing Delivery Model
2010-04-27
Relevant Security Standards, Certifications, and Guidance NIST SP 800 series ISO /IEC 27001 framework Cloud Security Alliance Statement of...CSA Domains / Cloud Features ISO 27001 Cloud Service Provider Responsibility Government Agency Responsibility Analyze Security gaps Compensating
AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges
2002-07-25
circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify
Threats to US energy security: the challenge of Arab oil
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.
1979-08-13
Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.
Aviation Security: Efforts to Measure Effectiveness and Address Challenges
2003-11-05
AND SUBTITLE AVIATION SECURITY Efforts to Meassure Effectiveness and Address Challenges 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...screeners in becoming more adept at detecting hard -to-spot threat objects. However, TIP was shut down immediately following the September 11
He, Ying; Johnson, Chris
2017-12-01
Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.
2014-12-12
and military doctrines , all contribute to slowing down the process of military integration in Southeast Asia. This thesis will argue for the...prevented Cambodia from playing a more constructive part in the ASEAN security stage. Indonesia, an archipelagic state with a thousand islands, is the...second largest archipelagic state in Southeast Asia, faces many security challenges. As a “typhoon-torn” country, it will benefit from a stronger
46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.
Code of Federal Regulations, 2010 CFR
2010-10-01
... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information Security...
Climate challenges, vulnerabilities, and food security
Nelson, Margaret C.; Ingram, Scott E.; Dugmore, Andrew J.; Streeter, Richard; Peeples, Matthew A.; McGovern, Thomas H.; Hegmon, Michelle; Arneborg, Jette; Brewington, Seth; Spielmann, Katherine A.; Simpson, Ian A.; Strawhacker, Colleen; Comeau, Laura E. L.; Torvinen, Andrea; Madsen, Christian K.; Hambrecht, George; Smiarowski, Konrad
2016-01-01
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017
Climate challenges, vulnerabilities, and food security.
Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad
2016-01-12
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.
ERIC Educational Resources Information Center
Cummings, E. Mark
2003-01-01
Advocates renewed efforts toward assessing attachment on a single continuum of emotional security. Contends that theory is essential to guide attachment assessment and that the constructs of secure base and emotional security provide the needed conceptual foundation. Addresses challenges to the scoring of attachment on a security continuum.…
Security Metrics: A Solution in Search of a Problem
ERIC Educational Resources Information Center
Rosenblatt, Joel
2008-01-01
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-09-28
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-01-01
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042
Adaptive Instructional Systems
2005-09-01
Research Institute for the Behavior and Social Sciences 20050928 000 Approved for public release; distribution is unlimited. REPORT DOCUMENTATION PAGE...ADDRESS(ES) 10. MONITOR ACRONYM U. S. Army Research Institute for the Behavioral & Social ARI Sciences ATTN Rotary Wing Aviation Research Unit 11...Training Technology SECURITY CLASSIFICATION OF 19. LIMITATION OF 20. NUMBER 21. RESPONSIBLE PERSON ABSTRACT OF PAGES 16. REPORT 17. ABSTRACT 18. THIS
Former Spencer Artillery Range, Tennessee Classification Demonstration Open Field and Dynamic Areas
2016-01-01
DEMONSTRATION REPORT Former Spencer Artillery Range, Tennessee Classification Demonstration Open Field and Dynamic Areas ESTCP...AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c. THIS PAGE 17...2016 Technical Report N/A Former Spencer Artillery Range, Tennessee Classification Demonstration Open Field and Dynamic Areas Richard MacNeil, USA
The abstract is only allowed to be 500 words maximum and is supposed to represent the theme of the conference so I am focusing my information more on the background of why phosphorus is important to recovery then giving a little less detail on the material I've made for this purp...
Downstream on the Mekong: Contrasting Cambodian and Vietnamese Responses to Chinese Water Control
2017-06-01
Barma Co-Advisor: Michael Malley THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev... form balancing coalitions against their stronger competitors.37 34 Alexander L. Vuving, “Vietnam in
Cooperative Autonomous Robots for Reconnaissance
2009-03-06
REPORT Cooperative Autonomous Robots for Reconnaissance 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Collaborating mobile robots equipped with WiFi ...Cooperative Autonomous Robots for Reconnaissance Report Title ABSTRACT Collaborating mobile robots equipped with WiFi transceivers are configured as a mobile...equipped with WiFi transceivers are configured as a mobile ad-hoc network. Algorithms are developed to take advantage of the distributed processing
New Therapies for Fibrofatty Infiltration
2017-08-01
14. ABSTRACT The goal of this project is to test three classes of compounds in animal models of muscular dystrophy, and evaluate their therapeutic...inhibitor compound to be tested in animal models of disease, as a more efficacious drug was identified with similar substrate specificity. 15...SUBJECT TERMS Fibrofatty infiltration, drug testing , muscular dystrophy, fibrosis. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER
Educating Normal Breast Mucosa to Prevent Breast Cancer
2013-05-01
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average...cells 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U...b. ABSTRACT U c. THIS PAGE U UU 19b. TELEPHONE NUMBER (include area code) Table of Contents Page
Polymerization of a Quinone-Crosslinked Marine Bioadhesive
1989-10-01
with type II collagen, essentially shielding the latter from digestion by clostridial collagenase. No such shielding was conferred by the Fasciola ...been characterized from Fasciola hepatica. 20. DISTRIBUTION /iAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSiFICATION 0UNCLASSIFIED/UNLIMITED 0...collagen. Moreover, the digestion of collagen by collagenase is undeterred by vitelline protein B, a DOPA-containing protein from Fasciola hepatica (Waite
Explorations on Just War: Has It Ever Existed?
2006-06-01
II . C. WORLD WAR II Pope Pius XII, in an address to the United Nations in 1952, said “The enormous violence of modern warfare means that...to the global community, Pope John Paul II cited “conscience of humanity and international humanity law” and claimed that nations and the...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UL ii
Using Artificial Physics to Control Agents
1999-11-01
unlimited 13. SUPPLEMENTARY NOTES IEEE International Conference on Information, Intelligence, and Systems, Oct 31 -Nov 3,1999. Bethesda, MD 14. ABSTRACT...distributed control can also perform distributed computation. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...1995. [9] H. Pattee. Artificial life needs a real epistemology. In Moran, Moreno, Merelo, and Chacon , editors, Advances in Artificial Life, pages
Combatting Inherent Vulnerabilities of CFAR Algorithms and a New Robust CFAR Design
1993-09-01
elements of any automatic radar system. Unfortunately, CFAR systems are inherently vulnerable to degradation caused by large clutter edges, multiple ...edges, multiple targets, and electronic countermeasures (ECM) environments. 20 Distribution, Availability of Abstract 21 Abstract Security...inherently vulnerable to degradation caused by large clutter edges, multiple targets and jamming environments. This thesis presents eight popular and studied
SURVIVABILITY THROUGH OPTIMIZING RESILIENT MECHANISMS (STORM)
2017-04-01
STATEMENT Approved for Public Release; Distribution Unlimited. PA# 88ABW-2017-0894 Date Cleared: 07 Mar 2017 13. SUPPLEMENTARY NOTES 14. ABSTRACT Game ...quantitatively about cyber-attacks. Game theory is the branch of applied mathematics that formalizes strategic interaction among intelligent rational agents...mechanism based on game theory. This work has applied game theory to numerous cyber security problems: cloud security, cyber threat information sharing
Radiological Dispersal Devices: Select Issues in Consequence Management
2004-12-07
STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Surveying the Security Risks, Center for Nonproliferation Studies, Monterey Institute of International Studies, January 2003; Anthony H. Cordesman...the radiation-exposure-related damage itself. For example, the DOD uses granisetron , an anti-vomiting drug, to allow soldiers to complete mission
Evaluating the Generality and Limits of Blind Return-Oriented Programming Attacks
2015-12-01
consider a recently proposed information disclosure vulnerability called blind return-oriented programming (BROP). Under certain conditions, this...implementation disclosure attacks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF...Science iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT We consider a recently proposed information disclosure vulnerability called blind return
Ultra-Dense Quantum Communication Using Integrated Photonic Architecture: First Annual Report
2011-08-24
REPORT Ultra-Dense Quantum Communication Using Integrated Photonic Architecture: First Annual Report 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: The...goal of this program is to establish a fundamental information-theoretic understand of quantum secure communication and to devise a practical...scalable implementation of quantum key distribution protocols in an integrated photonic architecture. We report our progress on experimental and
2011-01-01
OS level, Flume [22] has even been shown to be information flow secure through abstractions such as processes, pipes, file systems etc, while seL4 ...Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4 : formal verification of an
Simultaneous Inversion of UXO Parameters and Background Response
2012-03-01
11. SUPPLEMENTARY NO TES 12a. DISTRIBUTION/AVAILABILITY STATEMENT Unclassified/Unlimited 12b. DISTRIBUTIO N CODE 13. ABSTRACT (Maximum 200...demonstrated an ability to accurate recover dipole parameters using the simultaneous inversion method. Numerical modeling code for solving Maxwell’s...magnetics 15. NUMBER O F PAGES 160 16. PRICE CODE 17. SECURITY CLASSIFICATIO N OF REPORT Unclassified 18. SECURITY
Making Technology Work for Campus Security
ERIC Educational Resources Information Center
Floreno, Jeff; Keil, Brad
2010-01-01
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
DOT National Transportation Integrated Search
2003-09-09
Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...
Polnaszek, Brock; Gilmore-Bykovskyi, Andrea; Hovanes, Melissa; Roiland, Rachel; Ferguson, Patrick; Brown, Roger; Kind, Amy JH
2014-01-01
Background Unstructured data encountered during retrospective electronic medical record (EMR) abstraction has routinely been identified as challenging to reliably abstract, as this data is often recorded as free text, without limitations to format or structure. There is increased interest in reliably abstracting this type of data given its prominent role in care coordination and communication, yet limited methodological guidance exists. Objective As standard abstraction approaches resulted in sub-standard data reliability for unstructured data elements collected as part of a multi-site, retrospective EMR study of hospital discharge communication quality, our goal was to develop, apply and examine the utility of a phase-based approach to reliably abstract unstructured data. This approach is examined using the specific example of discharge communication for warfarin management. Research Design We adopted a “fit-for-use” framework to guide the development and evaluation of abstraction methods using a four step, phase-based approach including (1) team building, (2) identification of challenges, (3) adaptation of abstraction methods, and (4) systematic data quality monitoring. Measures Unstructured data elements were the focus of this study, including elements communicating steps in warfarin management (e.g., warfarin initiation) and medical follow-up (e.g., timeframe for follow-up). Results After implementation of the phase-based approach, inter-rater reliability for all unstructured data elements demonstrated kappas of ≥ 0.89 -- an average increase of + 0.25 for each unstructured data element. Conclusions As compared to standard abstraction methodologies, this phase-based approach was more time intensive, but did markedly increase abstraction reliability for unstructured data elements within multi-site EMR documentation. PMID:27624585
The human qualities needed to complete the global eradication of polio
2013-01-01
Abstract Although the 99% decrease seen in global polio incidence between 1988 and 2000 represented remarkable progress towards polio eradication, tackling the last 1% of polio has proved tantalizingly difficult. Pockets of endemic transmission currently persist both on the border between Afghanistan and Pakistan and in northern Nigeria. These pockets have permitted the reinfection of countries that were previously polio-free. Global strategic plans for polio eradication set out the activities, resources and financing needed to overcome the managerial, technical and security challenges faced by those tasked with the interruption of poliovirus transmission. However, polio eradication also depends on the less tangible but equally important human qualities of energy, realism, articulacy, determination, imagination, collaboration, adaptability, tactical awareness, innovation, openness and nimbleness (the initial letters of which give the acronym “ERADICATION”). By paying attention to these human qualities, the stakeholders involved may be more likely to achieve global polio eradication. PMID:23599552
Efficient Authorization of Rich Presence Using Secure and Composed Web Services
NASA Astrophysics Data System (ADS)
Li, Li; Chou, Wu
This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.
Formal Abstraction in Engineering Education--Challenges and Technology Support
ERIC Educational Resources Information Center
Neuper, Walther A.
2017-01-01
This is a position paper in the field of Engineering Education, which is at the very beginning in Europe. It relates challenges in the new field to the emerging technology of (Computer) Theorem Proving (TP). Experience shows, that "teaching" abstract models, for instance the wave equation in mechanical engineering and in electrical…
Curiac, Daniel-Ioan
2016-04-07
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.
Risks and responses to universal drinking water security.
Hope, Robert; Rouse, Michael
2013-11-13
Risks to universal drinking water security are accelerating due to rapid demographic, climate and economic change. Policy responses are slow, uneven and largely inadequate to address the nature and scale of the global challenges. The challenges relate both to maintaining water security in increasingly fragile supply systems and to accelerating reliable access to the hundreds of millions who remain water-insecure. A conceptual framework illustrates the relationship between institutional, operational and financial risks and drinking water security outcomes. We apply the framework to nine case studies from rural and urban contexts in South Asia and sub-Saharan Africa. Case studies are purposively selected based on established and emerging examples of political, technological or institutional reforms that address water security risks. We find broad evidence that improved information flows reduce institutional costs and promote stronger and more transparent operational performance to increase financial sustainability. However, political barriers need to be overcome in all cases through internal or external interventions that require often decadal time frames and catalytic investments. No single model exists, though there is sufficient evidence to demonstrate that risks to drinking water security can be reduced even in the most difficult and challenging contexts.
2004-05-03
A special thanks to all of these folks (Glenn Starnes, Lee Gutierrez, Bill Rapp, Joel Hillison, Carlos Gomez, Steve Fraunfelter, Janie Hopkins, Dave ...DiClemente, Joe Nunez, John Bonin , and Steve Nerheim). viii INFORMATION TECHNOLOGY CHALLENGES FACING THE STRATEGIC LEADERS OF HOMELAND SECURITY IN THE 21ST
Abstraction networks for terminologies: Supporting management of "big knowledge".
Halper, Michael; Gu, Huanying; Perl, Yehoshua; Ochs, Christopher
2015-05-01
Terminologies and terminological systems have assumed important roles in many medical information processing environments, giving rise to the "big knowledge" challenge when terminological content comprises tens of thousands to millions of concepts arranged in a tangled web of relationships. Use and maintenance of knowledge structures on that scale can be daunting. The notion of abstraction network is presented as a means of facilitating the usability, comprehensibility, visualization, and quality assurance of terminologies. An abstraction network overlays a terminology's underlying network structure at a higher level of abstraction. In particular, it provides a more compact view of the terminology's content, avoiding the display of minutiae. General abstraction network characteristics are discussed. Moreover, the notion of meta-abstraction network, existing at an even higher level of abstraction than a typical abstraction network, is described for cases where even the abstraction network itself represents a case of "big knowledge." Various features in the design of abstraction networks are demonstrated in a methodological survey of some existing abstraction networks previously developed and deployed for a variety of terminologies. The applicability of the general abstraction-network framework is shown through use-cases of various terminologies, including the Systematized Nomenclature of Medicine - Clinical Terms (SNOMED CT), the Medical Entities Dictionary (MED), and the Unified Medical Language System (UMLS). Important characteristics of the surveyed abstraction networks are provided, e.g., the magnitude of the respective size reduction referred to as the abstraction ratio. Specific benefits of these alternative terminology-network views, particularly their use in terminology quality assurance, are discussed. Examples of meta-abstraction networks are presented. The "big knowledge" challenge constitutes the use and maintenance of terminological structures that comprise tens of thousands to millions of concepts and their attendant complexity. The notion of abstraction network has been introduced as a tool in helping to overcome this challenge, thus enhancing the usefulness of terminologies. Abstraction networks have been shown to be applicable to a variety of existing biomedical terminologies, and these alternative structural views hold promise for future expanded use with additional terminologies. Copyright © 2015 Elsevier B.V. All rights reserved.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Azad, Kishwar; Fernandez, Armida; Manandhar, Dharma S; Mwansambo, Charles W; Tripathy, Prasanta; Costello, Anthony M
2009-01-01
Abstract Public health interventions usually operate at the level of groups rather than individuals, and cluster randomized controlled trials (RCTs) are one means of evaluating their effectiveness. Using examples from six such trials in Bangladesh, India, Malawi and Nepal, we discuss our experience of the ethical issues that arise in their conduct. We set cluster RCTs in the broader context of public health research, highlighting debates about the need to reconcile individual autonomy with the common good and about the ethics of public health research in low-income settings in general. After a brief introduction to cluster RCTs, we discuss particular challenges we have faced. These include the nature of – and responsibility for – group consent, and the need for consent by individuals within groups to intervention and data collection. We discuss the timing of consent in relation to the implementation of public health strategies, and the problem of securing ethical review and approval in a complex domain. Finally, we consider the debate about benefits to control groups and the standard of care that they should receive, and the issue of post-trial adoption of the intervention under test. PMID:19876544
The Terry-Wiseman Security Policy Model and Examples of Its Use
1990-03-01
Wiseman Security Policy Model and Examples of Its Use Author: C L Harrold Date: March 1990 Abstract This paper presents a model of security for computer ...Evolution of the Model 7. Summary and References Annex: An Overviev , of the Z N-,,tion Ace5sston For N?.1S (tRA&1DTIC TM-, [ U mr, ),inced El ,v l I...a computer . The files, objects or register locations in which the information may be stored are modelled by the black boxes. The robots model the
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0002, abstracted below that we will submit to OMB for renewal in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. These programs require airport operators to maintain and update records to ensure compliance with security provisions outlined in 49 CFR part 1542.
1981-02-01
8217 manwfacoturer. ’Pim in thl rv.-.opt deea it -wnetitid. indordeme’t of any coowacioL prodwt. _UNjr L S.A~qT F FnD SECURITY CLASSIFICATION OF THIS PAGE tjPY...SIFICATION OF THIS PIGE (Uh1¶ Dat. Ent.,ed) [INNCLARSsIFTTD SECURITY CLASSIFICATION OF THIS PAOE(Iha, Datea Diersd 20. ABSTRACT (Continued): one experiment...value of any parameter or initial condition can be held fixed or adjusted by FINLIE. UNCLASSIFIED SECURITY CLASSIFICATION OF’ THIS PAGE(W7h.n Data
Security: Progress and Challenges
ERIC Educational Resources Information Center
Luker, Mark A.
2004-01-01
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Microstructural Evolution in Friction Stir Welding of Ti-5111
2010-08-01
titanium and titanium aluminide alloys—an overview.” Materials Science and Engineering A243 (1998) 1-24 [Semiatin 1999] S.L. Semiatin, V...ABSTRACT Titanium and titanium alloys have shown excellent mechanical, physical, and corrosion properties. To address the needs of future naval...Texture; Phase Transformation Ti-5111 Titanium 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 174 19a
Rapid Equipping Force (REF) Analytical Support
2007-06-01
document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 44...interface and performs actions via Excel formulae, ActiveX controls, and VBA code. – Plan to provide both simple and complex weighting and scoring methods...Requirements Quad Chart. –Solution Set Information Worksheet: A spreadsheet containing detailed information concerning every potential solution considered
Legacy System Engineering, VPERC Consortium
2009-09-01
REPORT Legacy System Engineering, VPERC Consortium, Final Report, University of Utah for Work Ending Joly 15, 2009. 14. ABSTRACT 16. SECURITY...Engineering, VPERC Consortium, Final Report, University of Utah for Work Ending Joly 15, 2009. Report Title ABSTRACT This paper is one of three...Sons, 1995. [3] Turner MJ, Clough RW, Martin HC, Topp LJ. “Stiffness and deflection analysis of complex structures.” Journal of the Aeronautical
Computer Modeling and Optimization of OBOGS with Contaminants
1988-02-15
respect to system parameters such as cycle time and bed and valve dimensions. _-- 20. DISTRIBUTION /AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY...schematic (Solenoid valves are numbered 1 to 4 from the top) ..................................................... 46 Figure 12: Dual bed apparatus...most basic continuous PSA system is shown in Figure 1. Here a switching valve imposes supply pressure on Bed #1 and exhaust pressure on Bed #2. As the
Radiation Induced Vaccination to Breast Cancer
2016-12-01
in supporting a memory CD8 T cell response and decreased MDSCs but in reality the small patient numbers and the relatively short survival times...ABSTRACT Inhibiting TGFβ in the context of focal irradiation seems to create a favorable systemic immune landscape that drives T cell memory ...differentiation while limiting myeloid suppression. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES
The Servicemembers Civil Relief Act (P.L. 108-189)
2004-04-20
Remedies 22 Inappropriate use of the Act 22 Certification 22 Interlocutory orders 22 VII Further Relief 22 Anticipatory relief 22 Extension of power of...distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER...that has been subject to differing interpretations by courts and modifies or expands certain benefits The SCRA provides protections for
Design Methodology for Automated Construction Machines
1987-12-11
along with the design of a pair of machines which automate framework installation.-,, 20. DISTRIBUTION IAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY... Development Assistant Professor of Civil Engineering and Laura A . Demsetz, David H. Levy, Bruce Schena Graduate Research Assistants December 11, 1987 U.S...are discussed along with the design of a pair of machines which automate framework installation. Preliminary analysis and testing indicate that these
Cloning Components of Human Telomerase.
1998-07-01
absent, and the cells are unable to double further. Somatic cells have a limited replicative capacity ( Hayflick 1961), and the lack of telomerase... Hayflick limit (Bodnar et al. 1998). Immortal cells must have a method of maintaining telomeres, and indeed it has been found that immortalized cell lines...THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 15. NUMBER OF PAGES 12 16. PRICE CODE 20. LIMITATION OF ABSTRACT
Optimized Granularity Analysis of Maximum Power Point Trackers in Low Power Applications
2017-06-01
Second Reader: Robert Ashton THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...5 Figure 2. Germanium Atoms Sharing Outermost Shell Electrons That Form Covalent Bonds. Source: [6
The Uzbekistan Kyrgyzstan Border: Institutional Legitimacy and Regional Stability
2017-06-01
Advisor: David Yost THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...this thesis analyzes the subjective forms of border legitimacy and obedience in relation to local perceptions and social behavior. While scholarly
Passive Sensor Materials Based on Liquid Crystals
2011-03-12
REPORT Passive Sensor Materials based on Liquid Crystals 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Research supported by this grant entitled “Passive...Sensor Materials Based on Liquid Crystals” revolved around an investigation of liquid crystalline materials for use in passive sensors for chemical... based on Liquid Crystals Report Title ABSTRACT Research supported by this grant entitled “Passive Sensor Materials Based on Liquid Crystals” revolved
Navigating between Scylla and Charybdis: The Odyssean Leader in a Complex Environment
2008-10-21
of action capable of being shared across the organization). See also David A. Kolb , Experiential Learning : Experience as the Source of Learning ...Army GHQ Maneuvers of 1941. Washington D.C.: United States Army Center of Military History, 1991. Kolb , David A. Experiential Learning : Experience...ABSTRACT See Abstract 15. SUBJECT TERMS Leadership, organizational design, complexity, organizational theory , learning organization 16. SECURITY
2013-01-01
ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...the US Agency for International Development [USAID] or the military) have distributed the aid, the results have been disappointing.10 Individual
Educating Normal Breast Mucosa to Prevent Breast Cancer
2014-05-01
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to...immunization, T cells 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a...REPORT U b. ABSTRACT U c. THIS PAGE U UU 23 19b. TELEPHONE NUMBER (include area code) Table of Contents
2016-07-01
14. ABSTRACT The Warrior Injury Assessment Manikin was developed to provide an instrumented anthropomorphic test device (ATD) specifically...underbody blasts . To achieve that goal, the ATD used numerous polymeric materials for component parts that simulate human tissue and enable compliance in...strain rate, underbody blast , mechanical testing, tension, compression 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT
Simulation Learning PC Screen-Based vs. High Fidelity
2011-08-01
D., Burgess, L., Berg, B . and Connolly, K . (2009). Teaching mass casualty triage skills using iterative multimanikin simulations. Prehospital...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b . ABSTRACT U...learning PC screen-based vs. high fidelity – progress chart Attachment B . Approved Protocol - Simulation Learning: PC-Screen Based (PCSB) versus High
1982-09-01
ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 20 19a. NAME OF RESPONSIBLE...progressed; and, on netowrks of a higher level. This feature enables the user to reschedule work as the situation changes. Moreover, impact of late
2007-07-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18 . NUMBER OF PAGES 22 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 Molecular Dynamics Simulations of Surface...phase. O + Oad + silica -------> O2(v,j) + silica ( 18 ) The first step is
A Digital Radio Receiver for Ionospheric Research
2006-06-01
amplification, the signals are digitized and then processed by a digital down converter ( DDC ) and decimating low-pass filter. The resultant digital...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 41 19a. NAME OF...the University of Calgary under a Contributions Agreement contract awarded by the Canadian Space Agency. The present paper follows an earlier article
Sino-African Relationship: Its Implications on U.S. National Security Interests
2017-03-20
AIR WAR COLLEGE AIR UNIVERSITY SINO-AFRICAN RELATIONSHIP : ITS IMPLICATIONS ON U.S. NATIONAL SECURITY INTERESTS by Kimberly S. Vinson... Management Apprentice after graduating from tech school, but converted to a Personnel Apprentice in 1998. Chief Vinson has been assigned to bases in...Maryland, South Korea, Germany, Nevada, Italy, New Mexico, Ohio, South Dakota, and Texas. iv Abstract The Sino-African relationship has
A Joint Force Medical Command is Required to Fix Combat Casualty Care
2017-10-05
that poses an operations security risk. Author: ☒ PA: ☒ 13. SUPPLEMENTARY NOTES Word Count: 10,665 14. ABSTRACT The Military Health System...15. SUBJECT TERMS Military Health System, Joint Trauma System, Defense Health Agency, PROFIS 16. SECURITY CLASSIFICATION OF: 17...The Military Health System (MHS) is required to provide medical operational forces for military and contingency operations while also providing
Maritime Cyber Security University Research
2016-05-01
traffic so vital to the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously...Abstract (MAXIMUM 200 WORDS) Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping...integrity of the entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime
Cloning and Characterization of a Cell Senescence Gene for Breast Cancer Cells
2004-07-01
have already established the inducible expression system in a retroviral vector for these studies. F. References 1. Hayflick , L. (1965). The limited ...CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OFABSTRACT Unclassified...13-14 Annual report A. Introduction Normal diploid mammalian cells display a limited proliferative life span in culture (1-3
Mobile Tracking and Location Awareness in Disaster Relief and Humanitarian Assistance Situations
2012-09-01
establishing mobile ad - hoc networks. Smartphones also have accelerometers that are used to detect any motion by the device. Furthermore, almost every...AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words...Picture, Situational Awareness 15. NUMBER OF PAGES 55 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY
U.S.-Egypt Security Cooperation after Egypt’s January 2011 Revolution
2011-12-01
SECURITY CLASSIFICATION OF: (U) 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 70 19a. NAME OF RESPONSIBLE PERSON Thomas C. Graves COL, U.S...Monograph Director Scott Gorman, Ph.D. ___________________________________ Director, Thomas C. Graves, COL, IN School of Advanced Military...a broad network of dairy farms, milk processing facilities, cattle feed lots, poultry farms, and fish farms. The military produced eighteen percent
Illicit Drug Trade-Impact on United States National Health Care
2013-03-01
pobreza en Mexico sube a 52 milliones,” CNN Expansion, July 29, 2011, http://www.cnnexpansion.com/ economia /2011/07/29/pobreza- mexico -2010 (accessed...Unlimited. 13. SUPPLEMENTARY NOTES Word Count: 5,569 14. ABSTRACT The United States and Mexico face a myriad of threats to national security...Policy Classification: Unclassified The United States and Mexico face a myriad of threats to national security
Energy Security: Emerging Challenges and Opportunities
2010-08-01
46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy
Challenges and Responses to Asian Food Security
NASA Astrophysics Data System (ADS)
Teng, Paul P. S.; Oliveros, Jurise A. P.
2015-10-01
Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.
BIGCHEM: Challenges and Opportunities for Big Data Analysis in Chemistry
Engkvist, Ola; Koch, Uwe; Reymond, Jean‐Louis; Chen, Hongming
2016-01-01
Abstract The increasing volume of biomedical data in chemistry and life sciences requires the development of new methods and approaches for their handling. Here, we briefly discuss some challenges and opportunities of this fast growing area of research with a focus on those to be addressed within the BIGCHEM project. The article starts with a brief description of some available resources for “Big Data” in chemistry and a discussion of the importance of data quality. We then discuss challenges with visualization of millions of compounds by combining chemical and biological data, the expectations from mining the “Big Data” using advanced machine‐learning methods, and their applications in polypharmacology prediction and target de‐convolution in phenotypic screening. We show that the efficient exploration of billions of molecules requires the development of smart strategies. We also address the issue of secure information sharing without disclosing chemical structures, which is critical to enable bi‐party or multi‐party data sharing. Data sharing is important in the context of the recent trend of “open innovation” in pharmaceutical industry, which has led to not only more information sharing among academics and pharma industries but also the so‐called “precompetitive” collaboration between pharma companies. At the end we highlight the importance of education in “Big Data” for further progress of this area. PMID:27464907
Israel security in the 21st century: Risks and opportunities. Research report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eisenkot, G.
Unlike the United States which publicizes its national security strategy and national military strategy in official public documents, Israel, does not produce such documents for the general public. This may appear paradoxical in that the State of Israel, from its very inception, has invested enormous energy in its security. Nevertheless, Israel has no detailed security doctrine approved and updated by the Cabinet, the Knesset (Israel`s parliament) or the General Staff. The lack of an official, published, security doctrine does not imply that Israel lacks a coherent political and military strategy based on doctrine-like concepts. Israel`s political and military successes aremore » proof to the contrary. Our purpose, then, is to identify a number of the critical Security Principles that have shaped Israeli strategy. This will provide us the foundation for our main discussion which is the risks and challenges to Israeli security in the 21st century and possible responses to those challenges.« less
Smith, Helen; Ameh, Charles; Godia, Pamela; Maua, Judith; Bartilol, Kigen; Amoth, Patrick; Mathai, Matthews; van den Broek, Nynke
2017-01-01
ABSTRACT Maternal death surveillance and response (MDSR) constitutes a quality improvement approach to identify how many maternal deaths occur, what the underlying causes of death and associated factors are, and how to implement actions to reduce the number of preventable stillbirths and maternal and neonatal deaths. This requires a coordinated approach, ensuring both national- and district-level stakeholders are enabled and supported and can implement MDSR in a “no name, no blame” environment. This field action report from Kenya provides an example of how MDSR can be implemented in a “real-life” setting by summarizing the experiences and challenges faced thus far by maternal death assessors and Ministry of Health representatives in implementing MDSR. Strong national leadership via a coordinating secretariat has worked well in Kenya. However, several challenges were encountered including underreporting of data, difficulties with reviewing the data, and suboptimal aggregation of data on cause of death. To ensure progress toward a full national enquiry of all maternal deaths, we recommend improving the notification of maternal deaths, ensuring regular audits and feedback at referral hospitals lead to continuous quality improvement, and strengthening community linkages with health facilities to expedite maternal death reporting. Ultimately, both a top-down and bottom-up approach is needed to ensure success of an MDSR system. Perinatal death surveillance and response is planned as a next phase of MDSR implementation in Kenya. To ensure the process continues to evolve into a full national enquiry of all maternal deaths, we recommend securing longer-term budget allocation and financial commitment from the ministry, securing a national legal framework for MDSR, and improving processes at the subnational level. PMID:28963171
2010-11-30
legislature should help the government secure approval of its policy agenda, the political crisis left the new President with daunting challenges...The Lobo government faces significant challenges in fostering economic development in one of the hemisphere’s poorest countries; securing...indicators. The government has little room to address these issues as the country’s fiscal balance has deteriorated in recent years despite benefiting
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.
2018-01-01
We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.
Curiac, Daniel-Ioan
2016-01-01
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601
Common Capabilities for Trust and Security in Service Oriented Infrastructures
NASA Astrophysics Data System (ADS)
Brossard, David; Colombo, Maurizio
In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.
ERIC Educational Resources Information Center
Lopez, Robert H.
2012-01-01
The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…
Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.
2013-01-01
Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029
Boltzmann Transport in Hybrid PIC HET Modeling
2015-07-01
Paper 3. DATES COVERED (From - To) July 2015-July 2015 4. TITLE AND SUBTITLE Boltzmann transport in hybrid PIC HET modeling 5a. CONTRACT NUMBER In...reproduce experimentally observed mobility trends derived from HPHall, a workhorse hybrid- PIC HET simulation code. 15. SUBJECT TERMS 16. SECURITY...CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Justin Koo a. REPORT Unclassified b. ABSTRACT
Learning and Olfaction: Understanding and Enhancing a Critical Information Channel
2013-05-13
a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a ...REPORT Learning and Olfaction: Understanding and Enhancing a Critical Information Channel 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: This research...Prescribed by ANSI Std. Z39.18 - 14-Feb-2013 Learning and Olfaction: Understanding and Enhancing a Critical Information Channel Report Title ABSTRACT This
Molecular Determinants of Radioresponse in Prostate Cancer
2002-08-01
SECURITY CLASSIFICATION OF ABSTRACT Unclassified 15. NUMBER OF PAGES 72 16. PRICE CODE 20. LIMITATION OF ABSTRACT Unlimited Standard Form...irradiated LNCaP cells; right panel, irradiated RAT-1 HO 15.19 positive control cells (magnification lOOOx); (b) Time course of IR-induced apoptosis... right ) at 5 days post-irradiation following doses of OGy (control, mock- irradiated), 2Gy and lOGy. Shown is a representative experiment with total cell
Alcohol-to-Jet (ATJ) Fuel Blending Study
2015-09-01
distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT The U.S. Army sought to study the effect of blending highly iso-paraffinic ATJ blending...stock into JP-8 in order to understand the effect ATJ fuel blends will have on ground vehicle engines and support equipment. This subtask under Work... Synthetic Fuel, JP-8, diesel engine, combustion 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF
Spring 2004 Industry Study: Space Industry
2004-01-01
a heavier spacecraft mass direct to geostationary orbit or place a payload into a higher perigee. The Sea Launch web site is located at http...NOTES The original document contains color images . 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...other people, the citizens of the U.S. rely on the commercial space sector for their way of life. Remote sensing by optical, radar and infrared
Development of a Ballistic Impact Detection System
2004-09-01
body surface remains the largest variable to overcome. The snug fit of the body amour stabilizes the sensors and their response . The data from the...estimated to average 1 hour per response , including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 22 19a. NAME OF RESPONSIBLE PERSON
Molecular Basis of Essential Thrombocytosis
2006-06-01
penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR...intact protein synthetic capabilities, remarkably little is known about platelet mRNAs. The pathogenesis of essential thrombocytosis (ET), a disease of...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a . REPORT U b. ABSTRACT U
Intelligence Spending: Public Disclosure Issues
2006-09-25
would have affirmed the Court of Appeals holding that the taxpayer had standing to sue. 54 418 U.S. at 179. Judicial Interpretation Further insight may...court lacked jurisdiction over an interlocutory appeal of a district court order granting the CIA’s summary judgment motion on plaintiff’s FOIA...unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES
A Critical Review of Options for Tool and Workpiece Sensing
1989-06-02
Tool Temperature Control ." International Machine Tool Design Res., Vol. 7, pp. 465-75, 1967. 5. Cook, N. H., Subramanian, K., and Basile, S. A...if necessury and identify by block riumber) FIELD GROUP SUB-GROUP 1. Detectors 3. Control Equipment 1 08 2. Sensor Characteristics 4. Process Control ...will provide conceptual designs and recommend a system (Continued) 20. DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION 0
Identification and Validation of PTEN Complex, Associated Proteins
2006-11-01
Signal Transduction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC...a. REPORT U b. ABSTRACT U c. THIS PAGE U UU 18 19b. TELEPHONE NUMBER (include area code) Standard Form 298 (Rev. 8-98) Prescribed...nonsense, frame-shift, deletion or insertion mutations, (reviewed in [14]) are observed in prostate cancer, as well as in endometrial cancer, glioblastoma
Study of the Effects of Drugs upon the Cardiovascular and Respiratory Systems
1986-06-01
ed. The C.V. Mosby Company, St . Louis, 1971. Spence, 3.T., Underwood, B.3., Duncan, C.P., and Cotton, J.W. Elementary Statistics. Appleton- Century ...I.I)" ,,,- 20. DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 . ABSTRACT SECURITY CLASSIFICATION C3 UNCLASSIFIED/UNLIMITED 0 SAME AS RPT. - OTIC USERS...50, resistance units - -. ° ! U { {{{{{{ {{{{{{{{{{{{{{{ { {{{{ I {{{ {{{{ { {{{{{{ {{{{{{{ {{{{{ 21 3. Calibration of the Buxco Data Logger Model DL
2014-10-01
14. ABSTRACT This work hypothesizes that chemotherapy can permanently alter the balance between the immune system and chronic herpes virus...infections. We predicted that herpes virus-driven inflammatory cytokines exacerbate cancer treatment related fatigue (CTRF). Here we report the significant...TERMS breast cancer, chemotherapy, immunology, human herpes viruses, survivor fatigue 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT
Iraq Reconstruction: Time for a Plan
2004-05-03
Long Time Coming.” 9 September 2003. Available from <https:// webmail .us.army.mil/frame.html?rtfPossible=true&lang=en>. Internet. Accessed 11 September...22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply...unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT See attached file. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT
Time of Flight Estimation in the Presence of Outliers: A Biosonar-Inspired Machine Learning Approach
2013-08-29
REPORT Time of Flight Estimation in the Presence of Outliers: A biosonar -inspired machine learning approach 14. ABSTRACT 16. SECURITY CLASSIFICATION OF...installations, biosonar , remote sensing, sonar resolution, sonar accuracy, sonar energy consumption Nathan Intrator, Leon N Cooper Brown University...Presence of Outliers: A biosonar -inspired machine learning approach Report Title ABSTRACT When the Signal-to-Noise Ratio (SNR) falls below a certain
Alpena, Michigan. Revised Uniform Summary of Surface Weather Observations. Parts A-F.
1987-10-01
Rpoirt, Nober: USAFETACDS-87/059. 5. *mitorma Organization Report Nuber: USAIETAC/DS-87/059. Ga. Obaf of Performin Oranization: USAFETAC/OL-A Sb. Office...description of contents and Instructions for ue.- 20 DistrIbutieel/vmilability of Abstract: Same as report . 21 Abstract Security Clasalficatiem...large, or by the Defense Technical Information Center (DTIC) to the National Technical Information Service (NTIS). This document has been reviewed and
Design and Analysis of a Hydrogen Compression and Storage Station
2017-12-01
Holmes THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...than fossil fuels [2]. Renewably generated hydrogen gas, such as the hydrogen station demonstrated at NPS, falls into this category of alternative
Phase Zero Contracting for U.S. Arctic National Security
2017-06-01
THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of...CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std...north and west of the boundary formed by the Porcupine, Yukon, and Kuskokwim Rivers; all contiguous seas, including the Arctic Ocean and the
Saving Green: How the DoD Can Better Manage Energy Efficiency Initiatives
2017-12-01
Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...project adoption within the DOD. An abbreviated literature review is nested within the presentation of each hypothesis. These hypotheses form the
Phytoremediation of Atmospheric Methane
2013-04-15
REPORT Phytoremediation of Atmospheric Methane 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: We have transformed a plant, Arabidopsis thaliana, with the...298 (Rev 8/98) Prescribed by ANSI Std. Z39.18 - 31-Mar-2012 Phytoremediation of Atmospheric Methane Report Title ABSTRACT We have transformed a...DD882) Scientific Progress See attachment Technology Transfer 1 Final Report for DARPA project W911NF1010027 Phytoremediation of Atmospheric
Bid Protests on DoD Source Selections
2017-06-13
values, Government Accountability Office 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT OF...Logistics (AT&L) closely monitors the Government Accountability Office (GAO) Bid Protest statistics for trends. These statistics combined with our trend...large protests are removed, there was still a slight trend since FY 2006 but it disappears if measured since 2009. Also, if we remove the 23 large
Mechanism of Cytotoxicity of the AIDS Virus, HTLV-III/LAV
1990-06-25
AIDS) and associated diseases . Studies of related viruses , simian inmunodeficiency virus (SIV) and HIV-1, complement these studies and allow additional...envelope alterations in inmune evasion and tissue tropism. 20 DISTRIBUTIONIAVAILASILITY OF ABSTRACT j21 ABSTRACT SECURITY CLASSIFICATION O- UNCLASSIFMI...the pathogenesis of HIV-1 infections in vivo, and to the development of vaccines for this disease . It is clear that HIV-l’s are a heterogeneous
Blind Ambitions and Political Rhetoric: Why We Need a New Drug Strategy
1992-03-31
Andean countries. Their movement to other areas creates violence as they attempt to traffick in others’ territories. Violence and expansion efforts can...impossible to effectively control any one area . If supply sources are damaged at all, treatment facili- ties have not been expanded to handle the...consumption, violence and the social ills which cause them. 20. DISTRIBUTION/ AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION fl#10
Exfoliation and Reassembly of Cobalt Oxide Nanosheets into a Reversible Lithium-Ion Battery Cathode
2012-01-01
REPORT Exfoliation and Reassembly of Cobalt Oxide Nanosheets into a Reversible Lithium-Ion Battery Cathode 14. ABSTRACT 16. SECURITY CLASSIFICATION OF...battery fabrication, cobalt oxide Owen C. Compton, Ali Abouimrane, Zhi An, Marc J. Palmeri, L. Catherine Brinson, Khalil Amine, SonBinh T. Nguyen...Exfoliation and Reassembly of Cobalt Oxide Nanosheets into a Reversible Lithium-Ion Battery Cathode Report Title ABSTRACT An exfoliation–reassembly
Silicon/Carbon Anodes with One-Dimensional Pore Structure for Lithium-Ion Batteries
2012-02-28
REPORT Silicon/Carbon Anodes with One-Dimensional Pore Structure for Lithium - Ion Batteries 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: A series of...Dimensional Pore Structure for Lithium - Ion Batteries Report Title ABSTRACT A series of composite electrode materials have been synthesized and...1 Silicon/Carbon Anodes with One-Dimensional Pore Structure for Lithium - Ion Batteries Grant # W911NF1110231 Annual Progress report June
Maximizing PTH Anabolic Osteoporosis Therapy
2015-09-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U c...normalization or endogenous controls and calculates fold 263 changes with P values. Gene expression data were normalized to five endogenous controls ( 18S ...adapters were ligated and the sample was size-fractionated (200-300 bp) on an agarose gel. After a final 294 PCR amplification step ( 18 cycles), the
Angiogenic Signaling in Living Breast Tumor Models
2006-06-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U c ...convection versus diffusion in transport out of a tumor vessel during steady state conditions. C . Determine relative contribution of convection...on the results of the diffusion/convection measurements. Consequently, implicit in Tasks 1b and c (the use of MPFRAP in vivo) is the establishment
War Termination: A Theater CINCs Responsibility
1997-01-01
response , including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 13 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...Ternzznatzon of War, (Santa Momca The Rand Corporation , 1976) quoted in Bruce C Bade, War Termznatzon lvhy Don ‘t We Plan For It7 (Wash, DC National
Modeling of Mechanical Properties of Advanced Nanostructured Ceramic Composites
2010-03-15
of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently...nucleation of nanograins near crack tips and its role as a special toughening mechanism in ceramic nanocomposites; (vii) generation of nanoscale tracks at...mechanical properties 16. SECURITY CLASSIFICATION OF : a . REPORT b. ABSTRACT c. THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES
Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.
Improving the Automated Detection and Analysis of Secure Coding Violations
2014-06-01
eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree
Programming Retinal Stem Cells into Cone Photoreceptors
2015-12-01
0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response , including the time for reviewing...development. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT...PERIOD: Nothing to report. This is the final report for this award. However, using funds from philanthropic sources we have recently secured (11/2015
Securing BGP Using External Security Monitors
2006-01-01
forms. In Proc. SOSP, Brighton , UK , Oct. 2005. [19] A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: Software-based Attestation for...Williams, E. G. Sirer, and F. B. Schnei- der. Nexus: A New Operating System for Trustwor- thy Computing (extended abstract). In Proc. SOSP, Brighton , UK ...as a distributed database of untrustworthy hosts or messages. An ESM that detects invalid behavior issues a certifi- cate describing the behavior or
Balancing Social Media with Operations Security (OPSEC) in the 21st Century
2010-05-03
anticipated since the inception of digital media and the World Wide Web. Military personnel are equally influenced by social media and social ...FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Balancing Social Media with Operations Security (OPSEC) in the...necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The use of social media and networking sites like Facebook, MySpace, and
SAFER Under Vehicle Inspection Through Video Mosaic Building
2004-01-01
this work were taken using a Polaris Wp-300c Lipstick video camera mounted on a mobile platform. Infrared video was taken using a Raytheon PalmIR PRO...Tank- Automotive Research, Development and Engineering Center, US Army RDECOM, Warren, Michigan, USA. Keywords Inspection, Road vehicles, State...security, Robotics Abstract The current threats to US security, both military and civilian, have led to an increased interest in the development of
National Security Implications of Transnational Economic Activity
1993-04-01
ABSTRACT SECURITY CLASSIFICATION rUNCLASSIFIED/UNLIMITED El SAME AS RPT. O DTIC USERS Unclassified 22a. NAME OF RESPONSIBLE INDIVIDUAL 22b. TELEPHONE...Activity This paper discusses the impact of regional trading arrangements (RTA’s), multinational corporations (MNC’s), and transnational financial activity...multinational corporation investment and taxation. o The U.S. must strengthen its national economy in order to be a world class player in transnational
CHIPS. Volume 27, Number 2, April-June 2009
2009-07-01
unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Navy Network Enterprise 9 CARS Task Force Shortens Original Timeline – Reducing the number of Navy legacy networks to improve security and save...NETWARCOM and edited from the original article published in the Winter 2008-2009 edition of Info Domain. “A plan of action and milestones (POA&M) for
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stewart, John; Halbgewachs, Ron; Chavez, Adrian
The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relatingmore » to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.« less
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
USDA-ARS?s Scientific Manuscript database
The impetus behind the global food security challenge is direct, with the necessity to feed over 9 billion people by 2050. Developing a food-secure world, where people have access to a safe and sustainable food supply is the principal goal of this challenge. To achieve this end, beef production ent...
Options for Synthetic DNA Order Screening, Revisited.
DiEuliis, Diane; Carter, Sarah R; Gronvall, Gigi Kwik
2017-01-01
Gene synthesis providers affiliated with the International Gene Synthesis Consortium (IGSC) voluntarily screen double-stranded DNA (dsDNA) synthesis orders over 200 bp to check for matches to regulated pathogens and to screen customers. Questions have been raised, however, about the continuing feasibility and effectiveness of screening. There are technical challenges (e.g., oligonucleotides and tracts of DNA less than 200 bp are not screened) and corporate challenges (e.g., the costs of screening are high, but other costs are dropping, so screening is an increasing portion of operating costs). In this article, we describe tangible actions that should be taken to (i) preserve the effectiveness of DNA order screening as a security tool and (ii) develop additional mechanisms to increase the safety and security of DNA synthesis technologies. Screening is not a perfect solution to DNA synthesis security challenges, but we believe it is still a valuable addition to security, and it can remain effective for some time.
Security. Review Software for Advanced CHOICE. CHOICE (Challenging Options in Career Education).
ERIC Educational Resources Information Center
Pitts, Ilse M.; And Others
CHOICE Security is an Apple computer game activity designed to help secondary migrant students memorize their social security numbers and reinforce job and role information presented in "Career Notes, First Applications." The learner may choose from four time options and whether to have the social security number visible on the screen or…
DOT National Transportation Integrated Search
2010-03-17
The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...
The Threat of Security: Hindering Technology Integration in the Classroom
ERIC Educational Resources Information Center
Robinson, LeAnne K.; Brown, Abbie; Green, Tim
2007-01-01
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.
Code of Federal Regulations, 2011 CFR
2011-10-01
... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Interagency Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information...
The African Peace and Security Architecture: Myth or Reality
2013-03-01
resolving the conflicts. Efforts by African leaders to create continental peace and security mechanisms failed miserably . Consequently, Africans depended...Framework Document, October 2001), 14. 6 Andre Le Sage, “Africa’s Irregular Security Threats: Challenges for U.S. Engagement,” (Strategic Forum
Cryptography and the Internet: lessons and challenges
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCurley, K.S.
1996-12-31
The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising newmore » questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.« less
1996-11-01
As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.
Network gateway security method for enterprise Grid: a literature review
NASA Astrophysics Data System (ADS)
Sujarwo, A.; Tan, J.
2017-03-01
The computational Grid has brought big computational resources closer to scientists. It enables people to do a large computational job anytime and anywhere without any physical border anymore. However, the massive and spread of computer participants either as user or computational provider arise problems in security. The challenge is on how the security system, especially the one which filters data in the gateway could works in flexibility depends on the registered Grid participants. This paper surveys what people have done to approach this challenge, in order to find the better and new method for enterprise Grid. The findings of this paper is the dynamically controlled enterprise firewall to secure the Grid resources from unwanted connections with a new firewall controlling method and components.
High Assurance Models for Secure Systems
ERIC Educational Resources Information Center
Almohri, Hussain M. J.
2013-01-01
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Security model for picture archiving and communication systems.
Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K
2000-05-01
The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.
2013-09-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT b. ABSTRACT c . THIS PAGE 19b. TELEPHONE...Report Microelectrode Geochemcial Observatory for In Situ Monitoring of Metals Concentration and Mobility in Contaminated Sediments N62583-11- C -0524...Representative Poor Electrochemical Scans APPENDIX B: Standard Solution Test Data APPENDIX C : Bremerton Porewater Test Data APPENDIX D: Porewater
Molecular Mechanisms of Prostate Cancer Progression
2006-01-01
Weinberg. 1999. Inhibition of telomerase limits the growth of human cancer cells. Nat. Med. 5:1164-1170. 16. Hayflick , L. 1965. The limited in vitro...radicicol 16. SECURITY CLASSIFICATION OF: a. REPORT u b. ABSTRACT u c. THIS PAGE u 17. LIMITATION OF ABSTRACT uu 18. NUMBER OF PAGES 35...P69 nontumorigenic cells and show an increase in p23 without a concomitant increase in telomerase activity, suggesting that p23 is not limiting in
Real-Time Detection of Telomerase in a Microelectromechanical Systems Platform
2005-05-01
contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 147 19a...Telomerase accomplishes this by alleviating the “end-replication problem” (6,10,14,23,33,43). First described by Hayflick in 1965, the end-replication...were produced to determine the minimum detection limit of the ABI Prism 7000 as an optical fluorescent detection device. In addition, I wanted to
Military Tactical Aircraft Engine Noise Matching to Infrared Signatures
2016-12-16
Modulation,” Naval Postgraduate School MS thesis (1990). [8] Sinha, N., Ungewitter, R. J ., Kenzakowski, D. C ., and Seiner, J . M., “Gas Turbine Engine Jet...11] Harley, Jacob L., Rolling, August J ., Wisniewski, Charles F., and Gross, Kevin C ., “Spatially resolved infrared spectra of F109 turbofan exhaust...SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c . THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF
Demonstration and Commercialization of the Sediment Ecosystem Assessment Protocol
2017-01-01
J . Hunt, B. Anderson, S. Tudor, C . Wilson, F. LaCaro, M. Stephensen, M. Puckett, and E. Long. 1996. Chemistry, toxicity and benthic community...201131. Kirtay .V, G. Rosen, M. Colvin, J . Guerrero, C . Katz, B. Chadwick, M. Grover, J . Conder, K. Fetters, V. Magar, J . T. Weidner, in prep...STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c . THIS PAGE 17. LIMITATION OF
An Engineered Resupply System for Humanitarian Assistance and Disaster Relief Operations
2017-09-01
Alejandro S. Hernandez Co-Advisor: Susan M. Sanchez Second Reader: Mary McDonald THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form ...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...time or place. Military doctrine for HADR operations is not yet fully formed ; deliverables of the mission, scope of operations, and coordination
Business Case Analysis Of Small Modular Reactors (SMR) For DOD Assured Power
2017-12-01
Smith Second Reader: Thomas L. Albright THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89...attack (EMP) represents one of the most devastating forms of attack on the power grid. Because the North American grid is made up of three major
The Development of Ada (Trademark) Software for Secure Environments
1986-05-23
Telecommunications environment, This paper discusses software socurity and seeks to demostrate how the Ada programming language can be utilizec as a tool...complexity 4 . We use abstraction in our lives every day to control complexity; the principles of abstraction for software engineering are ro different...systems. These features directly sup,) )-t t.ie m odernp software engineering principles d1 s I , , 1 t, thne previous section. This is not surprising
2017-07-31
Studies on Phase Transformations and Mechanical Properties of Fusion Welds in Advanced Naval Steels Sb. GRANT NUMBER N00014-12-1-0475 Sc. PROGRAM...naval and structural applications. However, prior to this research project, a fundamental understanding of the phase transformation behavior under the...Steel, Phase Transformations 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER a. REPORT b.ABSTRACT c. THIS PAGE ABSTRACT OF PAGES u u
Biological Environmental Arctic Project (BEAP) Preliminary Data (Arctic West Summer 1986 Cruise).
1986-11-01
predictive model of bioluminescence in near-surface arctic waters . Data were collected during Arctic West Summer 1986 from USCG POLAR STAR (WAGB 10). . %. J...2 20ODISTRIBUTION AVAILABILIT "Y OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION C]UNCLASSIFIED UNLIMITED SAME AS RPT C] DTIC USERS UNCLASSIFIED David...correlates for a predictive model of bioluminescence in near-surface arctic waters . - In previous years, these measurements were conducted from the USCG
N-Terminal Tau Fragments as Biomarkers for Alzheimer’s Disease and Neurotrauma
2014-10-01
construed as an official Department of the Army position, policy or decision unless so designated by other documentation. REPORT DOCUMENTATION PAGE Form...SUBJECT TERMS- nothing listed 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a...REPORT U b. ABSTRACT U c. THIS PAGE U UU 19b. TELEPHONE NUMBER (include area code) 45 Table of Contents Page 1. Introduction
A Generalized Orienteering Problem for Optimal Search and Interdiction Planning
2013-09-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA DISSERTATION A GENERALIZED ORIENTEERING PROBLEM FOR OPTIMAL SEARCH AND INTERDICTION PLANNING by Jesse...provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently...16. SECURITY CLASSIFICATION OF: a . REPORT b. ABSTRACT c. THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON 19b
Mouse Model for Aerosol Infection of Influenza (Postprint)
2011-12-01
Min, J.-Y., Lamirande, E.W., Santos, C., Jin, H., Kemble, G. and Subbarao , K . (2011) Comparison of a live attenuated 2009 H1N1 vaccine with...AFRL-RX-TY-TP-2012-0010 MOUSE MODEL FOR AEROSOL INFECTION OF INFLUENZA POSTPRINT Rashelle S. McDonald, Brian K . Heimbuch Applied Research...AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b . ABSTRACT c. THIS PAGE 17
2010-01-01
Bioelectrics, Old Dominion University, Norfolk, VA 8. PERFORMING ORGANIZATION REPORT NUMBER 3 General Dynamics Inf. Tech Brooks City-Base, San... 16 . SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT U b. ABSTRACT...Sta tes of America, 2 Frank Reidy Research Center for Bioelectrics, Old Dominion University, Norfolk, Virginia, United States of America, 3 General
2013-10-01
therapies for prevention or mitigation of HO can be optimally targeted. This study seeks to contribute to advancement in each of these key areas...NOTES 14. ABSTRACT This study will recruit wounded warriors with severe extremity trauma, which places them at high risk for heterotopic... therapies for prevention or mitigation of HO. 15. SUBJECT TERMS Wound healing 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18
Cadmium Coating Alternatives for High- Strength Steel JTP - Phase 2
2009-09-03
Substrate 4130 Washer 17 - 4PH Washer CuBe Washer AlNiBr Washer Salt Spray Cyclic Salt Spray Cyclic Salt Spray Cyclic Salt Spray Cyclic No coating...2009, Westminster, CO. Sponsored by SERDP/ESTCP. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17 . LIMITATION OF ABSTRACT Same...Passed Appearance Testing U.S. AIR FORCE Primary Coating Bend Adhesion Test Results Coating Bend Adhesion Results 4130 steel substrate 17 -4 PH stainless
2005-05-01
AD_ Award Number: DAMD17-03-1-0353 TITLE: Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable Fibers...30 Apr 2005 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable ... biodegradable fiber 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES a. REPORT b. ABSTRACT c
On Specifying the Functional Design for a Protected DMS Tool
1977-03-01
of a secure data management system in terms of abstract entities. In keeping with this, the model identifies a security policy which is sufficient... policy of the model may be expressed, there- fore, as the rules which mediate the access of subjects to objects. The access authorization of the...level of a subject; however, this possibly is not acknowledged in our model. The specification of the DMS tool embodies this protection policy
2015-06-01
words) Attempting different approaches to explore the best practice of optimizing mobile security and productivity is necessary to improve the...INTENTIONALLY LEFT BLANK iv ABSTRACT Attempting different approaches to explore the best practice of optimizing mobile security and productivity is...incredible kindness and unfathomable generosity. I am grateful to have watched Super Bowl XLIX in your living room, washed dirty clothes in your laundry room
Strengthening the Security of ESA Ground Data Systems
NASA Astrophysics Data System (ADS)
Flentge, Felix; Eggleston, James; Garcia Mateos, Marc
2013-08-01
A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.
2011-10-01
said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most
Automated, Certified Program-rewriting for Software Security Enforcement
2012-03-05
VLC ), pages 257-260, Oak Brook, Illinois, Oc- tober 2010. [14] Aditi A. Patwardhan. Security-aware program visualization for analyz- ing in-lined...January 2010. [17] Meera Sridhar and Kevin W. Hamlen. Flexible in-lined reference moni- tor certification: Challenges and future directions. In...pages 55-60, Austin, Texas, January 2011. [18] Bhavani Thuraisingham and Kevin W. Hamlen. Challenges and future directions of software technology
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes; Cleveland, OH; Bay City, MI; Duluth, MN; Green Bay, WI; Sturgeon Bay...; Cleveland, OH; Bay City, MI; Duluth, MN; Green Bay, WI; Sturgeon Bay, WI; Chicago, IL; Erie, PA. (a...
Information Leakage Analysis by Abstract Interpretation
NASA Astrophysics Data System (ADS)
Zanioli, Matteo; Cortesi, Agostino
Protecting the confidentiality of information stored in a computer system or transmitted over a public network is a relevant problem in computer security. The approach of information flow analysis involves performing a static analysis of the program with the aim of proving that there will not be leaks of sensitive information. In this paper we propose a new domain that combines variable dependency analysis, based on propositional formulas, and variables' value analysis, based on polyhedra. The resulting analysis is strictly more accurate than the state of the art abstract interpretation based analyses for information leakage detection. Its modular construction allows to deal with the tradeoff between efficiency and accuracy by tuning the granularity of the abstraction and the complexity of the abstract operators.
The cyber threat, trophy information and the fortress mentality.
Scully, Tim
2011-10-01
'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.
32 CFR 1907.14 - Transmission.
Code of Federal Regulations, 2014 CFR
2014-07-01
... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...
32 CFR 1907.14 - Transmission.
Code of Federal Regulations, 2013 CFR
2013-07-01
... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...
32 CFR 1907.14 - Transmission.
Code of Federal Regulations, 2012 CFR
2012-07-01
... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...
32 CFR 1907.14 - Transmission.
Code of Federal Regulations, 2011 CFR
2011-07-01
... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...
32 CFR 1907.14 - Transmission.
Code of Federal Regulations, 2010 CFR
2010-07-01
... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...
HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs
2001-11-07
air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts
Education, Underdevelopment, Unnecessary War and Human Security in Kosovo/Kosova
ERIC Educational Resources Information Center
Nelles, W.
2005-01-01
This paper examines educational linkages to persistent conflicts and contemporary security challenges in Kosovo. It reviews some historic foundations, debates and socioeconomic contexts concerning education as a security issue. It argues that poverty and underdevelopment coupled with failed diplomacy (particularly surrounding a 1996 ''Education…
The Graduate MIS Security Course: Objectives and Challenges
ERIC Educational Resources Information Center
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew
2009-01-01
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Network Security Is Manageable
ERIC Educational Resources Information Center
Roberts, Gary
2006-01-01
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
ERIC Educational Resources Information Center
Saeeaw, Supachai; Tangkiengsirisin, Supong
2014-01-01
Abstract is of a pivotal genre in scientific communication, assisting not only highly selective readers with judgment of the pertinent articles but also researchers in disseminating new knowledge and intellectual discoveries. Difficult yet challenging, however, is the task of writing effective abstracts particularly among non-English speaking…
DOT National Transportation Integrated Search
2003-04-01
This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...
Realizing Scientific Methods for Cyber Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.
There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber securitymore » science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.« less
Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C
2014-01-01
Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.
Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel
2016-08-01
Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research collaboration among aid organizations, researchers and multilateral organizations, such as the WHO, is needed to address these challenges. Copyright © 2016 Elsevier Ltd. All rights reserved.
Strategic Challenges during Changing Times: A Prioritized Research Program, 1994
1994-04-01
and planning. 14, SUBJECT T[RMS 15 NUMBER OF PAGES strategic assessments; domestic and global issues and 5 trends; peace operations; political...1994 or which, for a variety of reasons, will riot be published. 3 SECTION I TRANSREGIONAL SECURITY CONCERNS Regional Challenges, Global Issues . When...but global issues . Global security issues derive from three forms of connectivity. The first is economic. Today, there is truly a world economy. Markets
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-02-26
climate change ; ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen
Soliton Dynamics of an Atomic Spinor Condensate on a Ring Lattice
2013-02-22
REPORT Soliton dynamics of an atomic spinor condensate on a Ring Lattice 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: We study the dynamics of...8/98) Prescribed by ANSI Std. Z39.18 - Soliton dynamics of an atomic spinor condensate on a Ring Lattice Report Title ABSTRACT We study the dynamics...Report Number Soliton dynamics of an atomic spinor condensat Block 13: Supplementary Note © 2013 . Published in Physical Review A (accepted), Vol. Ed
1988-07-01
DISTRIBUTION, AVAILABILITY OF REPORTAD-A209 747 JoUL01 UNCLASSIFIED/ UNLIMITED S ..- ,,*,* crui NUMBER 5. MONITORING ORGANIZATION REPORT NUMBER( S ) S ...OCCUPANCY OF THE NEW MADIGAN ARMY MEDICAL CENTER AT FORT LEWIS, WASHINGTON 12. PERSONAL AUTHOR( S ) Peterson, John Phillip 13a. TYPE OF REPORT 113b. TIME...transition areas N requiring extensive development.-.(continuep) \\ 20, DISTRIBUTION/AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION S
2017-06-01
Sherif Michael Second Reader: James Calusdian THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...States Military utilizes an extensive variety of UAVs, whether electric or fossil fuel propulsion. In this section, we review the distinctive sorts of
Analysis of Key Factors Driving Japan’s Military Normalization
2017-09-01
Clay Moltz THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2...agenda. Most people pointed to the rise of China, the end of wars in the Middle East, and regional shifts in reliance on fossil fuels, among other issues
Weight Measurements and Standards for Soldiers, Phase 2
2016-10-01
SUPPLEMENTARY NOTES 14. ABSTRACT The specific aims of the study are to: 1) examine body weight and fat changes associated with participation in a...maintenance of changes in body weight, body fat , and fitness after discontinuation of the promotion associated with the H.E.A.L.T.H. program. The study is a...physical fitness, health, weight, body fat 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 26 19a. NAME OF
Feasibility of Rectangular Concrete Pressure Vessels for Human Occupancy
1990-07-01
incorporated: into the s 1.71 ! -1 rule-. 20 DISTRIBUTION/ AVAILABILIT ’- ,"r ABSTRACT 2’ ABSTRACT SECURITY CLASSIFICATION 7 JUNCLASSIFIED/UNLIMITED 0 SAME AS RPT...carried the end loads. Gas cooled reactors were never very popular in the US. Domestic utilities preferred boiling water reactors that operated at...Point Tower); 1975 - 9,000 psi in Chicago ( Water Tower Place); 1984 - 10,000 psi in Seattle (Century Square Bldg.); 1987 - 10,000 psi in Toronto
A Lean Six Sigma Analysis of Student In-Processing
2012-12-01
SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298 (Rev. 2–89...suppliers as they were able to provide produce products that met all their standards –whether it be application or cosmetic. This was, of course, quite...expensive, but after many attempts the customers were unable to find a cheaper foreign source for this product that met all their quality standards
2008-01-17
15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18 . NUMBER OF PAGES 261 19a. NAME OF RESPONSIBLE PERSON a...REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 This material...Sciences Meeting and Exhibit. Several DSMC [13, 58] and CFD [ 18 , 28, 43] solutions were submitted. Later, others compared CFD and DSMC solutions to these
The NATO-Russia Partnership: A Marriage of Convenience or a Troubled Relationship?
2006-11-01
distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 ...Rev. 8-98) Prescribed by ANSI Std Z39- 18 ii ***** The views expressed in this report are those of the author and do not necessarily reflect the...has raised it again more recently, though it is difficult to see what Russia gains from withdrawal from that treaty. 18 Withdrawal from the treaty
Heat Tolerance and the Peripheral Effects of Anticholinergics
1988-01-30
0c. GENDER: Responses of 27 males and 12 females showed that both SR and AGD increased as a function of log MCh dose. SR was affected by gender only...at the 2 highest doses ( male SR slightly greater). At all but the lowest dose AGD was significantly greater for females. ACCLIMATION: Responses of 6... males to MCh were measured before and after 20. DISTRIBUTION /AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION 0 UNCLASSIFIED/UNLIMITED 0
Effect of Diet on Gulf War Illness: A Pilot Study
2017-10-01
illness while on the study. We screened our first participant in September 2016. Overall we have screened 18 and enrolled 14 Gulf War Veterans so...16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18 . 19a. NAME OF RESPONSIBLE PERSON U OF ABSTRACT NUMBER USAMRMC OF PAGES a. REPORT b. ABSTRACT c...healthy. Body: During the last on year the following goals were accomplished: We have screened 18 Gulf War Veterans and have enrolled 14
1993-04-01
CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURIlY CLASSIFICATION 20. UMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT UNCLASSIFIED UNCLASSIFIED...with the silicon underneath, growing a thin nitride layer. This layer of Si 3 N 4 , if not completely removed, will retard oxidation in the area...C. Shatas, K. C. Saraswat and J. D. Meindl, "Interfacial and Breakdown Characteristics of MOS Devices with Rapidly Grown Ultrathin SiO Gate
Feasibility of Nuclear Power on U.S. Military Installations. 2nd Revision
2011-03-01
Small Modular Reactor , Military Installation Energy, Energy Assurance 16. SECURITY CLASSIFICATION OF: a. REPORT I b. ABSTRACT U c. THIS PAGE i; 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 98 19a. NAME OF RESPONSIBLE PERSON Knowledge Center/Rhea Stone 19b. TELEPHONE NUMBER (Include area code) 703-824-2110 Standard Form 298 (Rev. 8/98) Prescribed bv ANSI Sid 239.18 Contents Preliminary note: Development and commercial deployment of small modular reactors
Use of Information Technology for Management of U.S. Postal Service Facilities.
1996-05-01
change closeout status, request for proposal log) Projected income and expenses of a U.S. Postal Service facility Direct capitalization model Tax...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 15. NUMBER OF PAGES 107 16. PRICE CODE 20. LIMITATION OF ABSTRACT UL NSN 7540-01...time and at the right price is a huge and complex job. In any one year, the USPS Facilities organization may acquire more than 100 sites, plan
Naval Response to a Changed Security Environment: Maritime Security in the Mediterranean
2007-01-01
other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a...PAGES 28 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8...elements. The first was to use inflatable Zodiac -type speedboats to attack ships. The second was to blow up medium-sized vessels near other ships
2010-09-01
13. ABSTRACT (maximum 200 words ) The food and agriculture sector in the United States is vulnerable to attack. One solution is to ensure that...Bureau of Investigation FEMA Federal Emergency Management Agency FMD Foot and Mouth Disease GAO General Accounting Office (changed name to...will need to respond to an FMD [foot and mouth disease] outbreak” (GAO, 2002b, p. 5). In many cases, veterinarians serve as 9 first-line
The Rise of China: Redefining War in the 21st Century
2012-03-22
Hegemony, Africa, Cold War, Cyber Attack, Deficit 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...FORMAT: Strategy Research Project DATE: 22 March 2012 WORD COUNT: 5,825 PAGES: 30 KEY TERMS: Debt, Security, Hegemony, Africa, Cold War, Cyber ...significantly increasing economic aid. But it’s hard to buy affection; such ‘ friendship ’ does not stand the test of difficult times.”42 The United
Flow Instability Tests for a Particle Bed Reactor Nuclear Thermal Rocket Fuel Element
1993-05-01
2.0 with GWBASIC or higher (DOS 5.0 was installed on the machine). Since the source code was written in BASIC, it was easy to make modifications...8217 AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for Public Release IAW 190-1 Distribution Unlimited MICHAEL M. BRICKER, SMSgt, USAF Chief...Administration 13. ABSTRACT (Maximum 200 words) i.14. SUBJECT TERMS 15. NUMBER OF PAGES 339 16. PRICE CODE . SECURITY CLASSIFICATION 18. SECURITY
2012-09-01
analysis SECURITY CLASSIFICATION OF 19. LIMITATION OF ABSTRACT Unlimited 20. NUMBER OF PAGES 110 21. RESPONSIBLE PERSON Dorothy...Recognition, Altruism/Benevolence, Skill Development, and Job Security . The coefficient alphas for these scales ranged from .70 to .90. 3...BOLC B 158 3 1.9% Summary Variables Graduated from IOT 1,233 44 3.6% Recycled at Least Once During IOTa 1,171 66 5.6% Note. N
Developing a Regional Recovery Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.
2011-09-01
Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other criticalmore » infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-27
...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0033, abstracted below that we will submit to OMB for renewal in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. This collection of information allows TSA to conduct security threat assessments on individuals on board aircraft operating in restricted airspace pursuant to an airspace waiver. This collection will enhance aviation security and protect assets on the ground that are within the restricted airspace.
Struggling with one’s own parenting after an upbringing with substance abusing parents
Tedgård, Eva; Råstam, Maria; Wirtberg, Ingegerd
2018-01-01
ABSTRACT Aim: To add to our knowledge concerning the key elements involved in the individual’s experience of growing up with substance abusing parents and the resulting challenges this involved for their own parenthood. Methods: In-depth interviews were conducted with 19 parents who had participated in a mental health intervention programme. All had experienced substance abusing parents in their family of origin. Qualitative content analysis was used to analyse the data. They also completed a self-report questionnaire assessing their attachment style. Result: Participants reported a high incidence of emotional abuse and neglect coupled with inadequate support from the community. Their own parental role was influenced by high parental stress and a majority had an insecure attachment style. Conclusions: All participants had experienced a very difficult childhood which was reinforced by the fact that they received little support from society. Their childhood experience and the resulting challenges that this created in their own parenting role could negatively influence their own children’s ability to form a secure psychosocial development. It is therefore important to develop instruments that can help to identify children who were raised in misuse families in order to accommodate the transgenerational effects of growing up with substance abusing parents. PMID:29482480
NASA Astrophysics Data System (ADS)
Shuja Syed, Ahmed
2013-12-01
The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want to thank the Organizing Committee, the Institutions and Sponsors supporting the Conference, especially 'Centre for Emerging Sciences, Engineering & Technology (CESET), Islamabad', the IOP Publishers and everyone who contributed to the organization of this meeting, for their invaluable efforts to make this event a great success. Professor Dr Ahmed Shuja Syed Chief Editor The PDF also contains lists of the boards, committees and sponsors.
Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven
2013-08-01
Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that addresses multiple objectives is required now more than ever. © 2013 John Wiley & Sons Ltd.
Security surveillance challenges and proven thermal imaging capabilities in real-world applications
NASA Astrophysics Data System (ADS)
Francisco, Glen L.; Roberts, Sharon
2004-09-01
Uncooled thermal imaging was first introduced to the public in early 1980's by Raytheon (legacy Texas Instruments Defense Segment Electronics Group) as a solution for military applications. Since the introduction of this technology, Raytheon has remained the leader in this market as well as introduced commercial versions of thermal imaging products specifically designed for security, law enforcement, fire fighting, automotive and industrial uses. Today, low cost thermal imaging for commercial use in security applications is a reality. Organizations of all types have begun to understand the advantages of using thermal imaging as a means to solve common surveillance problems where other popular technologies fall short. Thermal imaging has proven to be a successful solution for common security needs such as: ¸ vision at night where lighting is undesired and 24x7 surveillance is needed ¸ surveillance over waterways, lakes and ports where water and lighting options are impractical ¸ surveillance through challenging weather conditions where other technologies will be challenged by atmospheric particulates ¸ low maintenance requirements due to remote or difficult locations ¸ low cost over life of product Thermal imaging is now a common addition to the integrated security package. Companies are relying on thermal imaging for specific applications where no other technology can perform.
Visualizing Dynamic Bitcoin Transaction Patterns
McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J.
2016-01-01
Abstract This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network. PMID:27441715
Burke, Jeffrey M; Smela, Elisabeth
2012-03-01
A new method of surface modification is described for enabling the in situ formation of homogenous porous polymer monoliths (PPMs) within poly(dimethylsiloxane) (PDMS) microfluidic channels that uses 365 nm UV illumination for polymerization. Porous polymer monolith formation in PDMS can be challenging because PDMS readily absorbs the monomers and solvents, changing the final monolith morphology, and because PDMS absorbs oxygen, which inhibits free-radical polymerization. The new approach is based on sequentially absorbing a non-hydrogen-abstracting photoinitiator and the monomers methyl methacrylate and ethylene diacrylate within the walls of the microchannel, and then polymerizing the surface treatment polymer within the PDMS, entangled with it but not covalently bound. Four different monolith compositions were tested, all of which yielded monoliths that were securely anchored and could withstand pressures exceeding the bonding strength of PDMS (40 psi) without dislodging. One was a recipe that was optimized to give a larger average pore size, required for low back pressure. This monolith was used to concentrate and subsequently mechanical lyse B lymphocytes.
Human Purposive Movement Theory
2012-03-01
theory and provides examples of developmental and operational technologies that could use this theory in common settings. 15. SUBJECT TERMS human ... activity , prediction of behavior, human algorithms purposive movement theory 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18
Network Visualization Project (NVP)
2016-07-01
network visualization, network traffic analysis, network forensics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF...shell, is a command-line framework used for network forensic analysis. Dshell processes existing pcap files and filters output information based on
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-04
...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on November 16, 2009, 74 FR 58969. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-24
...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0053, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF); (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs; (3) acceptance of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; and (5) recordkeeping requirements for CCSFs. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below, to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of this collection of information on October 14, 2010, 75 FR 63192. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: Security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.
6 CFR 7.30 - Classification challenges.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...
6 CFR 7.30 - Classification challenges.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...
6 CFR 7.30 - Classification challenges.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...
6 CFR 7.30 - Classification challenges.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...
6 CFR 7.30 - Classification challenges.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...
Secure Skyline Queries on Cloud Platform.
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-04-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
A Framework for the Governance of Information Security
ERIC Educational Resources Information Center
Edwards, Charles K.
2013-01-01
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Federated Security: The Shibboleth Approach
ERIC Educational Resources Information Center
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken
2004-01-01
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
The Battle to Secure Our Public Access Computers
ERIC Educational Resources Information Center
Sendze, Monique
2006-01-01
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Research on information security in big data era
NASA Astrophysics Data System (ADS)
Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin
2018-05-01
Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.
2010-06-01
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century, 947. 11 Marco A. Ferroni and Ashoka Mody, International Public...Security and Defence Policy, 67–70; Howorth, Security and Defence Policy in the European Union, 152–154. 47 Hubert Zimmermann, “Security Exporters...consilium.europa.eu/showPage.aspx?id=1519&lang=en (accessed 12 March 2010). Ferroni, Marco A. and Ashoka Mody. International Public Goods: Incentives
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
Reviews on Security Issues and Challenges in Cloud Computing
NASA Astrophysics Data System (ADS)
An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.
2016-11-01
Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-24
...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0040, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. This ICR involves five broad categories of affected populations: airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. The collections of information that make up this ICR are security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), Air Cargo Data Management System (ACDMS), Cargo Reporting Tool for cargo screening reporting, and evidence of compliance recordkeeping. TSA seeks continued OMB approval in order to secure passenger aircraft carrying cargo as authorized in the Aviation and Transportation Security Act.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-09-01
These conference proceedings have been prepared in support of the US Nuclear Regulatory Commission's Security Training Symposium on Meeting the Challenge -- Firearms and Explosives Recognition and Detection,'' November 28 through 30, 1989, in Bethesda, Maryland. This document contains the edited transcripts of the guest speakers. It also contains some of the speakers' formal papers that were distributed and some of the slides that were shown at the symposium (Appendix A).
A Social Infrastructure for Hometown Security. Evolving the Homeland Security Paradigm
2009-01-23
information, including suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations and Reports, 1215...national call to service . This call offers an opportunity to invest in a social infrastructure for homeland security that will bring the American people... service , we were asked to go shopping.”12 By most accounts, the likely security challenges in the next few years will demand much greater involvement
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
Hazard-Specific Vulnerability Mapping for Water Security in a Shale Gas Context
NASA Astrophysics Data System (ADS)
Allen, D. M.; Holding, S.; McKoen, Z.
2015-12-01
Northeast British Columbia (NEBC) is estimated to hold large reserves of unconventional natural gas and has experienced rapid growth in shale gas development activities over recent decades. Shale gas development has the potential to impact the quality and quantity of surface and ground water. Robust policies and sound water management are required to protect water security in relation to the water-energy nexus surrounding shale gas development. In this study, hazard-specific vulnerability mapping was conducted across NEBC to identify areas most vulnerable to water quality and quantity deterioration due to shale gas development. Vulnerability represents the combination of a specific hazard threat and the susceptibility of the water system to that threat. Hazard threats (i.e. potential contamination sources and water abstraction) were mapped spatially across the region. The shallow aquifer susceptibility to contamination was characterised using the DRASTIC aquifer vulnerability approach, while the aquifer susceptibility to abstraction was mapped according to aquifer productivity. Surface water susceptibility to contamination was characterised on a watershed basis to describe the propensity for overland flow (i.e. contaminant transport), while watershed discharge estimates were used to assess surface water susceptibility to water abstractions. The spatial distribution of hazard threats and susceptibility were combined to form hazard-specific vulnerability maps for groundwater quality, groundwater quantity, surface water quality and surface water quantity. The vulnerability maps identify priority areas for further research, monitoring and policy development. Priority areas regarding water quality occur where hazard threat (contamination potential) coincide with high aquifer susceptibility or high overland flow potential. Priority areas regarding water quantity occur where demand is estimated to represent a significant proportion of estimated supply. The identification of priority areas allows for characterization of the vulnerability of water security in the region. This vulnerability mapping approach, using the hazard threat and susceptibility indicators, can be applied to other shale gas areas to assess vulnerability to shale gas activities and support water security.
Strategies for online test security.
Hart, Leigh; Morgan, Lesley
2009-01-01
As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.
Magnuson, J A; Klockner, Rocke; Ladd-Wilson, Stephen; Zechnich, Andrew; Bangs, Christopher; Kohn, Melvin A
2004-01-01
Electronic emergency department reporting provides the potential for enhancing local and state surveillance capabilities for a wide variety of syndromes and reportable conditions. The task of protecting data confidentiality and integrity while developing electronic data interchange between a hospital emergency department and a state public health department proved more complex than expected. This case study reports on the significant challenges that had to be resolved to accomplish this goal; these included application restrictions and incompatibilities, technical malfunctions, changing standards, and insufficient dedicated resources. One of the key administrative challenges was that of coordinating project security with enterprise security. The original project has evolved into an ongoing pilot, with the health department currently receiving secure data from the emergency department at four-hour intervals. Currently, planning is underway to add more emergency departments to the project.
Technology Empowerment: Security Challenges.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Warren, Drake Edward; Backus, George A.; Jones, Wendell
“Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less
HIV/AIDS Securitization: Outcomes and Current Challenges.
Shadyab, Aladdin H; Hale, Braden R; Shaffer, Richard A
2017-01-01
The securitization (i.e., framing of a health issue as a security threat) of HIV/AIDS by the United Nations Security Council in 2000 changed the belief that HIV/AIDS is only a health issue. Although now accepted that HIV/AIDS represents a security threat, the consequences of securitization are still not widely established. The purpose of this paper was to present an evidence-based review of the outcomes and current challenges associated with HIV/AIDS securitization in the context of national security. We provided an overview of HIV/AIDS securitization, followed by a discussion of the impact of securitization on peacekeeping personnel and uniformed services. We also reviewed the United States Government's response to securitization and potential risks and benefits of securitization. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
Diagnosing water security in the rural North with an environmental security framework.
Penn, Henry J F; Loring, Philip A; Schnabel, William E
2017-09-01
This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.
Solidago Vigaurea for Prostate Cancer Therapy
2011-04-01
Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 ...tumorigenesis using a xenograft model. Human prostate cancer cell line PC3mm which was “labeled” with the luciferase gene was injected into the dorsal flank...with treatment (A) (B) 0 5 10 15 20 25 16 17 18 19 20 21 22 23 24 Control Cacalol Days B od y w ei gh t ( g) Hepatic injury maker Control
2009-02-28
algorithm 16. SECURITY CLASSIFICATION OF: a. REPORT C b. ABSTRACT (’ c . THIS PAGE C 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 16...further improved by in- cluding Fi^Fs ... obtained by very fast predictor - corrector scheme along / direction. 2 n/(El) 4 Fig. 1: Preliminary...by solving eq.l 1 with Euler predictor - corrector method. As a result, Uj can be evaluated from the expansion eq.9. • Step 2:- The normal
A Comparison of Manual Scaled and Predicted foE and foF1 Critical Frequencies
1990-07-01
Statistics for the lonograms Studied 17 xi 1.0 INTRODUCTION The ARTIST autoscaling routines use a predicted foE to determine a range to search for the...recommendations are made to help improve autoscaling . 20. DISTRIBUTIONIAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UUNCLASSIFIEDUNLIMITED 0...to estimate foE. In the ARTIST , the predicted foE is the CCIR model described in the CCIR Supplement Report 252-2.1 We have also tested a foE
A Socio-Technical Analysis of Computer Application within the Fourth Marine Aircraft Wing.
1987-03-01
IDENTIFICATION NUMBER ORGANIZATION j I applicable) SC ADDRE SS (City, State, and ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM IPROjECT ITASK WORK .jNIr... currently being- used is not sufficient to meet all the needs of 14tii MAW , Z0 11YR’UTiON /AVAILABILITY Of ABSTRACT 21 ABSTRACT SECURITY...implementation process currently being used is not sufficient to meet all the needs of 4th MAW units. This study identifies alternatives necessary to
2017-06-01
Porter Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704...THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev...infrastructure in today’s society. Due to the projected depletion of fossil fuel sources in the 21st century, nuclear power is a potential source of
2017-06-01
Naazneen Barma Second Reader: Emily Meierding THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...to military force.”7 Hufbauer, Schott, and Elliott emphasize that it is important not to “conflate” economic sanctions with other forms of economic
2017-06-01
in the form of fossil fuels for ships, tanks, and aircraft; however, there was still a significant consumption of fossil fuel by means of electrical...Thesis Advisor: Anthony J. Gannon Co-Advisor: Andrea Holmes THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2
1986-08-01
aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 168 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...States, nor the Maritime Administration, nor any person acting on behalf of the Maritime Administration (A) makes any warranty or representation, expressed
Improving the Distortional Deformation Capabilities of Aerospace Composite Networks
2011-02-28
Standard Form 298 (Rev. 8/98) REPORT DOCUMENTATION PAGE Prescribed by ANSI Std. Z39.18 Form Approved OMB No. 0704-0188 The public reporting...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c. THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...secondary motions. 165 170 175 180 185 190 195 200 205 210 215 220 225 230 235 40 45 50 55 60 65 70 75 Zero entropy line Chain isomerization in linear
1984-06-20
AD-A162 ±88 FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL 1/1 SYSTEM IN THE DEFENS (U) DEFENSE COMMUNICATIONS AGENCY WASHINGTON DC TECHNICAL...NATIONAL BUREAU OF STANDARDS- 1963-A 0FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL SYSTEM IN THE DEFENSE COMMUNICATIONS 0AGENCY TECHNICAL AND...ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED/UNLIMITED R1 SAME AS RPT. 0 DTIC USERS 0 UNCLASSIFIED 22&. NAME OF RESPONSIBLE INDIVIDUAL 22b
Methods for Effective Virtual Screening and Scaffold-Hopping in Chemical Compounds
2007-04-04
contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 12 19a...Opterons with 4 GB of memory . We used the descriptor- spaces GF, ECZ3, and ErG (described in Section 4) for the evaluating the methods introduced in...screening: Use of data fusion and machine learning to enchance the effectiveness of sim- ilarity searching. J. Chem. Info. Model., (46):462–470, 2006. [18] J
An Experimental Investigation Into The Effect Of Plasma On The Flow Features Of An Axisymmetric Jet
2007-10-01
document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18 . NUMBER OF PAGES 386...Prescribed by ANSI Std Z39- 18 AN EXPERIMENTAL INVESTIGATION INTO THE EFFECT OF PLASMA ON THE FLOW FEATURES OF AN AXISYMMETRIC JET BY RICHARD E. HUFFMAN...A. 18 Comparison of Plasma Effects on Skewness and Kurtosis: Case 611LINE3051 . . . . . . . . . 223 A.19 Comparison of Plasma Effects on Mean Velocity
2011-01-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18 . NUMBER OF PAGES 9 19a. NAME OF RESPONSIBLE PERSON a. REPORT...unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 sampling is based on...atom distance-scaled ideal-gas reference state (DFIRE-AA) statistical potential func- tion.[ 18 ] The third approach is the Rosetta all-atom energy func
Radiation Database for Earth and Mars Entry
2008-11-17
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18 . NUMBER OF PAGES 40 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 wall, and zero otherwise. The radiative...coupling scheme, we have the additional selection rules for the electric dipolar transition ∆S = 0, (16) ∆L = 0,±1, (17) L = 0 6↔ L = 0 ( 18 ) where we have
2016-10-01
Release; Distribution Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Study approved by Mayo IRB on April 18 , 2016, and by USAMRMC/ORP/HRPO on May 6...MV-NIS, Oncolytic Virus, Measles Virus 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PPAGES 19a. NAME OF...1. Received Mayo IRB approval on 04/ 18 /2016 2. The US Army Medical Research and Materiel Command (USAMRMC), Office of Research Protections (ORP
Antifungal Resistance Patterns in Molds Isolated from Wounds of Combat Related Trauma Patients
2017-10-05
mucormycetes (MM). Results: Included are 18 patients with 28 initial mold isolates with 72% oflFI diagnosed via histopathology. All patients were male with...and co 1S. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b.ABSTRACT c. THIS PAGE ABSTRACT uu 18 . NUMBER OF PAGES...MM). .... tt.: Included are 18 patients with 21 lnltlal mold Isolate with 71% of IFI dll1nosed vii hlstopatholotY. All patients wrre male with a
Prevalence of Hepatitis B and C in US Air Force Basic Military Trainees
2017-08-29
REPORT TYPE 08/29/2017 Journal -4. TITLE AND SUBTITLE Prevalence ofliepatitis B and C in US Air Force Basic Military Trainees 6. AUTHOR(S) Capt...unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER a. REPORT b.ABSTRACT c ...Prescnbed by ANSI Sld, Z3B.16 Adobe Prnfeodohal 7.0 Prevalence of Hepatitis Band C in US Air Force Basic Military Trainees from Blood Donations 2 3
Zarei, Javad; Sadoughi, Farahnaz
2016-01-01
In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.
European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives
2010-01-01
SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE 13 . ABSTRACT After ten years the ESDP has reached an important...premier_ministre/2008/11- novembre /16 juncker/index.html - accessed 14 September 2009. 2 Javier Solana, “Preface,” in: What Ambitions for European Defense in...security of the Union, including the eventual framing of a common defense policy ….” 13 First and foremost the Treaty required member nations to build
Protecting Commercial Space Systems: A Critical National Security Issue
1999-04-01
The Influence of Sea Power on World History: 1660-1783” (excerpt). Air Command and Staff College War Theory Coursebook (Academic Year 1999), 87- 88. 6...Publications. State of the Space Industry, 1998, 42, 49; and (2) US Census Bureau, Statistical Abstract of the United States: 1998, 1 Oct 1998, 578...College War Theory Coursebook (Academic Year 1999), 109. 2 Stubbs, Captain Bruce B., “The Coast Guard’s National Security Role in the 21st Century.” Air
The North African Franchise: AQIM’s Threat to U.S. Security. Strategic Insights, Volume 8, Issue 5
2009-12-01
The North African Franchise : AQIM’s Threat to U.S. Security Strategic Insights, Volume VIII, Issue 5 (December 2009) By Captain Russell J. Isaacs...the U.S. Government. Abstract Al Qaeda of the Islamic Maghreb (AQIM) is a growing and evolving North African franchise of Al Qaeda. While the group...in towns east of Algiers. Although this attack officially marked the emergence of Al Qaeda of the Islamic Maghreb (AQIM), a North African franchise
Physical Cryptography: A New Approach to Key Generation and Direct Encryption
2009-11-18
has been further studied theoretically and P a g e | 4 experimentally to only a limited extent. The second is quantum cryptography [3] based on...Std Z39-18 P a g e | 2 Abstract: The security of key generation and direct encryption in quantum and physical cryptography have been...investigated. It is found that similar to the situation of conventional mathematics based cryptography , fundamental and meaningful security levels for either
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-25
...: 2900-0688. Type of Review: Extension of a currently approved collection. Abstract: Data collected under... continue contract performance if payments are reduced or suspended upon a finding of fraud. VA will use the...
78 FR 41995 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
... of United States Savings Bonds/Notes Involved in a Chain Letter Scheme. Form: PD F 2966. Abstract... purchased in a chain letter scheme and used to identify the securities involved and to issue a refund of the...
The High Angular Resolution Multiplicity of Massive Stars
2009-02-01
binaries: visual – stars: early-type – stars: individual ( iota Ori, delta Ori, delta Sco) – techniques: interferometric Online-only material...STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY
Using software security analysis to verify the secure socket layer (SSL) protocol
NASA Technical Reports Server (NTRS)
Powell, John D.
2004-01-01
nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.
A European Perspective on Security Research
NASA Astrophysics Data System (ADS)
Liem, Khoen; Hiller, Daniel; Castex, Christoph
Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
Security Games Applied to Real-World: Research Contributions and Challenges
2012-01-01
Marecki, J.: GUARDS and PROTECT: Next Generation Applications of Security Games . SIGECOM 10 (March 2011) 31–34 4. Shieh, E ., An, B., Yang, R., Tambe...Steigerwald, E .: GUARDS - Game Theoretic Security Allocation on a National Scale. In: Proc. of The 10th International Conference on Autonomous Agents...Shieh, E ., Kiekintveld, C.: Refinement of Strong Stackelberg Equilibria in Security Games . In: Proc. of the 25th Conference on Artificial Intelligence
PKI security in large-scale healthcare networks.
Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos
2012-06-01
During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.
A scoping review of traditional food security in Alaska
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-01-01
ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675
IT-security challenges in IoT environments and autonomous systems
NASA Astrophysics Data System (ADS)
Heun, Ulrich
2017-05-01
Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.
DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections
ERIC Educational Resources Information Center
Data Quality Campaign, 2010
2010-01-01
The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…
Securing electronic health records with novel mobile encryption schemes.
Weerasinghe, Dasun; Elmufti, Kalid; Rajarajan, Muttukrishnan; Rakocevic, Veselin
2007-01-01
Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.
Big data, little security: Addressing security issues in your platform
NASA Astrophysics Data System (ADS)
Macklin, Thomas; Mathews, Joseph
2017-05-01
This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697
CyFall: A Cyber-Network Game Scenario
2014-08-01
results. This report examines the development of a conceptual game ( gamification ) that would aid nonexperts in identifying with their role and the...user study, gamification 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 36 19a
A governor's guide to emergency management. Volume two : homeland security
DOT National Transportation Integrated Search
2002-09-19
Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...
A DHS Skunkworks Project: Defining and Addressing Homeland Security Grand Challenges
2016-12-01
Peter Diamandis, Ansari XPRIZE, market failure, technology, stealth technologies, Pasteur’s quadrant, Heilmeier Catechism, Homeland Security Advanced...Judging and Scoring ....................................................................27 D. OPTIMIZING FOR AN EMERGING MARKET ...37 Figure 3. Market /Technology Chart
NASA Astrophysics Data System (ADS)
Trebino, Rick
2010-03-01
I spent 12 years working at a top-secret nuclear-weapons lab that had its own dedicated force of heavily armed security guards. Of course, security-related incidents were rare, so the guards' main challenge was simply staying awake.
Privacy and Security in Mobile Health: A Research Agenda
Kotz, David; Gunter, Carl A.; Kumar, Santosh; Weiner, Jonathan P.
2017-01-01
Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges. PMID:28344359
NREL Workshop Convenes Industry Experts on Cybersecurity and an Evolving
silos in a field that demands greater collaboration, and the benefits of systemic security architecture groups to identify possible solutions to the challenges in securing DERs-from a technology, business, and
Plant security during decommissioning; challenges and lessons learned from German phase out decision
DOE Office of Scientific and Technical Information (OSTI.GOV)
Renner, Andrea; Esch, Markus
2013-07-01
Purpose of this paper is to point out the security challenges that may occur during the decommissioning, based on the issues and lessons learned from the German phase out decision. Though national regulations may be different in other countries the basic problems and issues will be the same. Therefore presented solutions will be applicable in other countries as well. The radioactive material remaining at the NPP during decommissioning has the most influence on how the security measures have to be designed. The radioactive material defines the risk potential of the plant and this determines the needed security level. The followingmore » aspects have been challenging in Germany: - Scenarios varying from those, used for plants in operation, due to changed operating conditions - Spent fuel will stay in the spent fuel pool for a quite long period before it can be removed from the plant. Risk potential of the plant stays high and requires a high level of security measures - Security measures according to the existing operating license have to stay in place as they are, unless the first license for decommissioning is given respective the spent fuel is removed from the plant site. This even led to the question if improvements of security measures, planned and announced with focus on a plant remaining in operation for another couple of years, need to be done although they will not be required after removing the spent fuel from the plant. A further important aspect for the security design is the fact that a plant under decommissioning has completely different and strongly varying operating procedures, compared to the stable ones of an operating plant. This leads to different needs concerning workspace, infrastructure on plant site, access to buildings etc. An optimized and highly flexible security concept is needed to ensure an adequate level of security as well as an efficient decommissioning. A deep analysis of the vital plant functions, depending on the different decommissioning stages, is required to determine the vital equipment, its location and its need for protection. (authors)« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre
Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less
Let's talk conflict: using mediation in healthcare security disputes.
Armstrong, Brad
2013-01-01
Healthcare security administrators face weekly, if not daily challenges and conflict. This article considers that security leaders must anticipate disputes in highly complex healthcare systems. When disputes cannot be resolved by organizational efforts, security administrators may be in a position to recommend or participate in mediation. Here the concept of mediation is introduced to healthcare security leaders as a viable means to resolve disputes with patients, visitors, and the community. This includes a description of the facilitative versus evaluative mediation processes, as well as pragmatic guidance when preparing for mediation.
Conducted electrical weapons within healthcare: a comprehensive use of force model.
Ho, Jeffrey D; Williams, Martin F; Coplen, Michael J
2014-01-01
Healthcare settings are experiencing increased amounts of violent activity that are challenging to the health care security profession. There is difficulty in addressing this issue completely. Some of this difficulty is because of factors that include inexperienced and untrained clinicians and administrators that are often the decision-makers in the health care setting. As part of an effective solution, we propose that a security plan, including a comprehensive use of force program incorporating conducted electrical weapons, is a necessary and best-practice goal. This paper outlines the background of the problem and discusses the challenges we encountered in reaching this goal as well as the benefits we have discovered along the way. This paper will be beneficial to any healthcare security professional that is interested in enhancing or improving their current health care security use of force model to further counter the increasing violent activity in their respective healthcare setting.
Old age security in rural China: there is a long way to go.
Dai, Bao-Zhen; Zhou, Lu-Lin; Mei, Y John
2013-11-01
We aimed to examine the current developments and challenges confronted by old age security in rural China. This study is based on the data from PubMed, Elsevier, Wiley, EBSCO, EMBASE, SCI Expanded, ProQuest, Google, and CNKI which is the most informative database in Chinese. Articles were selected with the search terms "rural", "China", "old", "older", or "elder", "elderly", or "aged", "aging", "security", "culture", "value", "medical insurance" or "community based medical insurance" or "cooperative medical scheme". Related websites and yearbooks were searched as well. The socio-economic development has made the burden of traditional care for the rural elderly heavier than ever, and new challenges are emerging in rural communities, such as poor economic, deteriorating natural environment and health crisis. The governments should improve the scale and caliber of rural old age security and strengthen regulations with great efforts in developing the rural economy and protecting the natural environment of rural communities.
Human Reliability Program Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, John; Rogers, Erin; Gerke, Gretchen
A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less
Social Security and Disability Due to Mental Impairment in Adults.
Goldman, Howard H; Frey, William D; Riley, Jarnee K
2018-05-07
The Social Security Administration (SSA) oversees two disability programs, Social Security Disability Insurance (SSDI) and Supplemental Security Income (SSI). Adults with mental impairments represent a very large component of the programs. Policy makers and SSA are concerned about the accuracy of disability determination and also about low levels of labor force participation among individuals with disabilities. Adults with mental impairments are challenging to assess for work-related functional limitations. They are also a challenge to return to labor force participation. SSA has sponsored several demonstration research programs focusing on improving the accuracy of disability determination and on interventions in supported employment to return individuals with mental impairments to competitive employment. This article reviews the demonstration research focused on both entry into the disability system (at the "front door") and potential exit from it (through the "back door"). All of the research holds promise to "right-size" the SSA disability program.
Editors' Introduction: Abstract Concepts: Structure, Processing, and Modeling.
Bolognesi, Marianna; Steen, Gerard
2018-06-22
Our ability to deal with abstract concepts is one of the most intriguing faculties of human cognition. Still, we know little about how such concepts are formed, processed, and represented in mind. For example, because abstract concepts do not designate referents that can be experienced through our body, the role of perceptual experiences in shaping their content remains controversial. Current theories suggest a variety of alternative explanations to the question of "how abstract concepts are represented in the human mind." These views pinpoint specific streams of semantic information that would play a prominent role in shaping the content of abstract concepts, such as situation-based information (e.g., Barsalou & Wiemer-Hastings, ), affective information (Kousta, Vigliocco, Vinson, Andrews, & Del Campo, ), and linguistic information (Louwerse, ). Rarely, these theoretical views are directly compared. In this special issue, current views are presented in their most recent and advanced form, and directly compared and discussed in a debate, which is reported at the end of each article. As a result, new exciting questions and challenges arise. These questions and challenges, reported in this introductory article, can arguably pave the way to new empirical studies and theoretical developments on the nature of abstract concepts. © 2018 Cognitive Science Society, Inc.
Secure Skyline Queries on Cloud Platform
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-01-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710
Case study: adapting the IAHSS curriculum in Thailand.
Goss, Richard J
2009-01-01
In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.
2012-11-01
Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments
Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011
2011-01-01
the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less