Sample records for security challenges abstract

  1. Department of the Navy Transformation Plan FY 2014-2016

    DTIC Science & Technology

    2014-01-01

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...with the competing realities of shrinking defense budgets and rising maritime security challenges. Throughout our history, the Navy and Marine...DON continues to support alternative energy efforts, realizing that energy independence is vital to our national security and the safety of our

  2. A Perspective on Research Challenges in Information Security

    DTIC Science & Technology

    2011-11-01

    UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp

  3. Secure Infrastructure-Less Network (SINET)

    DTIC Science & Technology

    2017-06-01

    Protocol CNSA Commercial National Security Algorithm COMSEC Communications Security COTS Commercial off the Shelf CSfC Commercial Solutions for...ABSTRACT (maximum 200 words) Military leaders and first responders desire the familiarity of commercial -off-the-shelf lightweight mobile devices while...since they lack reliable or secure communication infrastructure. Routine and simple mobile information-sharing tasks become a challenge over the

  4. Addressing the Challenges of Collective Security in West Africa: In View of Recent Conflicts

    DTIC Science & Technology

    2017-06-09

    Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Understanding that achieving peace and security is a primary condition for an economic ...condition for an economic integration, ECOWAS has developped various approachs in resolving crises and overcoming threats within West Africa. Using...System CS Collective Security CSO Civil Society Organizations CSS Center for Security Studies EAC East Africa Community ECCAS Economic Community of

  5. Challenge and Response: Anticipating US Military Security Concerns

    DTIC Science & Technology

    1994-08-01

    in the U.S. And the Russian Orthodox Church may emerge as another such political force as was evidenced by its mediative role in the turbulent days...objectives (ends) and public opinion. Recall the turmoil in the United States during the Vietnam War and how 471 internal politics affected the...ABSTRACT 15. SUBJECT TERMS Military planning - United States; National Security - United States; World politics - 1989 - 16. SECURITY CLASSIFICATION OF

  6. Biobehavioral Correlates of Depression in Reaction to Mental and Physical Challenge

    DTIC Science & Technology

    2007-03-07

    positive effects on quality of life for individuals with depression. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...reactivity to challenge with potential positive effects on quality of life for individuals with depression. v Biobehavioral Correlates of...Responsiveness.............................................. 22 IV. Immune System Parameters in Depression............................................ 24

  7. Software Assurance Curriculum Project Volume 2: Undergraduate Course Outlines

    DTIC Science & Technology

    2010-08-01

    Contents Acknowledgments iii Abstract v 1 An Undergraduate Curriculum Focus on Software Assurance 1 2 Computer Science I 7 3 Computer Science II...confidence that can be integrated into traditional software development and acquisition process models . Thus, in addition to a technology focus...testing throughout the software development life cycle ( SDLC ) AP Security and complexity—system development challenges: security failures

  8. Innovative Acoustic Sensor Technologies for Leak Detection in Challenging Pipe Types

    DTIC Science & Technology

    2016-12-30

    correlation features to detect and pinpoint leaks in challenging pipe types, as well as metallic pipes. 15. SUBJECT TERMS Leak detection; acoustic... correlation ; water distribution systems 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18.NUMBER OF PAGES 109 19a. NAME OF...6 1.3.2 State Regulations and Voluntary Water Industry Standards .......................... 7 2.0 TECHNOLOGY DESCRIPTION

  9. RF-Trapped Chip Scale Helium Ion Pump (RFT-CHIP)

    DTIC Science & Technology

    2016-04-06

    14. ABSTRACT A miniaturized (~1 cc) magnet -less RF electron trap for a helium ion pump is studied, addressing challenges associated with active...pump, ion pump, electron trap, magnet -less, MEMS, radiofrequency 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...scale ion pumps. The Penning cell structure consists of three electrodes (an anode and two cathodes) and a magnet . Planar titanium cathodes are

  10. Realization of Configurable One-Dimensional Reflectarray

    DTIC Science & Technology

    2017-08-31

    Maximum 200 words) A fundamental challenge remains in dynamically controlling the steering of long wavelength radiation (λ > 8 μm) using metal... dynamic , nanoribbons 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER OF PAGES 20 19a. NAME OF RESPONSIBLE PERSON...challenge remains in dynamically controlling the steering of long wavelength radiation (λ > 8 μm) using metal nanostructures or metamaterials (with critical

  11. Climate Change: Challenges and Opportunities for United States Pacific Command

    DTIC Science & Technology

    2012-03-22

    NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT UNCLASSIFED b. ABSTRACT UNCLASSIFED c . THIS PAGE UNCLASSIFED UNLIMITED 36...result in a price paid in military terms and human lives in the future.9 Climate Change as a Threat to National Security Joshua Busby , a professor at...willingness to fight those who threaten our expanding notion of national security. Busby includes climate change in this expanded definition of national

  12. An Agile Enterprise Regulation Architecture for Health Information Security Management

    PubMed Central

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

  13. Irregular Warfare: The Maoist Challenge to India’s Internal Security

    DTIC Science & Technology

    2012-12-01

    ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 116 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b . ABSTRACT unclassified c. THIS PAGE...and its approach to the various problems. These were, briefly, as follows: 8 JSOU Report 12-9 a. India is a semi-colonial and semi-feudal country. b ...leaders like Bhaskar Rao, Subbarao Panigrahi, and Nirmala Krishnamurti were killed. These losses greatly upset the Central Committee of the CPI (ML

  14. Threats and Challenges in Reconfigurable Hardware Security

    DTIC Science & Technology

    2008-07-01

    Same as Report (SAR) 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b . ABSTRACT unclassified c. THIS PAGE...g e F P G A MemoryMemory Codec A/DD/A F P G A B o a rd System Developers Avnet, Digilent, NuHorizons Application Development Stage Deployment...Rohatgi, and B . Sunar. Trojan detection using IC fingerprinting. In Proceedings of IEEE Symposium on Security and Privacy, 2007. [3] K. Austin. Data

  15. Analyzing Future Complex National Security Challenges within the Joint, Interagency, Intergovernmental, and Multinational Environment. Proteus Futures Academic Workshop Held in Carlisle Barracks, Pennsylvania on 22-24 August 2006

    DTIC Science & Technology

    2006-08-01

    AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY...threats, or financial insecurities. Yankee Going Home: The world of 2020 looks like a confused mess! Little is clear except that the world has... statements from Proteus: Insights from 2020 are highly releant when thinking about the current strategic picture in the context of Power: “When Power

  16. 2002 Industry Studies: Education

    DTIC Science & Technology

    2002-01-01

    1 EDUCATION ABSTRACT United States schools are better than ever, but they are not assuring competitive advantage . Unequal access to quality...competitive advantage , and promote national security. • Demand for education continues to grow as the US transitions from an industrial to a knowledge... international assessments, pose challenges. With human capital constituting our most critical national resource, a world-class education system is vital to

  17. Challenges for Deploying Man-Portable Robots into Hostile Environments

    DTIC Science & Technology

    2000-11-01

    video, JAUGS , MDARS 1. BACKGROUND In modern-day warfare the most likely battlefield is an urban environment, which poses many threats to today’s...teleoperation, reconnaissance, surveillance, digital video, JAUGS , MDARS 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...Architecture (MRHA) and the Joint Architecture for Unmanned Ground Systems ( JAUGS ). The hybrid architecture is termed SMART for Small Robotic Technology. It

  18. Status, Vision, and Challenges of an Intelligent Distributed Engine Control Architecture (Postprint)

    DTIC Science & Technology

    2007-09-18

    TERMS turbine engine control, engine health management, FADEC , Universal FADEC , Distributed Controls, UF, UF Platform, common FADEC , Generic FADEC ...Modular FADEC , Adaptive Control 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON (Monitor) a. REPORT Unclassified b. ABSTRACT...Eventually the Full Authority Digital Electronic Control ( FADEC ) became the norm. Presently, this control system architecture accounts for 15 to 20% of

  19. Counter-Terrorism and the Use of Force in International Law

    DTIC Science & Technology

    2002-11-01

    authority of the Council to establish such tribunals was unsuccessfully challenged in an interlocutory appeal before the Appeals Chamber of the...see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 107 19a. NAME OF RESPONSIBLE PERSON...State may resort to force as an instrument of national policy. Although States have conducted military counter-terrorist operations in the past, the

  20. Case Series: Chikungunya and Dengue at a Forward Operating Location

    DTIC Science & Technology

    2015-05-01

    Journal Article 3. DATES COVERED (From – To) November 2014 – January 2015 4. TITLE AND SUBTITLE Case Series: Chikungunya and Dengue at a Forward...series and discusses the significance of this disease in the Americas and diagnostic challenges when other arboviruses such as dengue are present. 15...SUBJECT TERMS Chikungunya, dengue , mosquitoes 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 3

  1. Duke of Wellington’s Command of the Spanish Army in the Peninsular War

    DTIC Science & Technology

    2017-06-09

    SUBJECT TERMS Peninsular War, Spanish Army, Command Structure , International Friction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...Horse Guards and the Secretary for War and the Colonies, poorly trained and equipped partner armies, the difficulty in creating a unity of command...armies of three nations in the Peninsula. Wellington accepted the daunting challenge of unifying disparate command structures of Spain and Britain

  2. An analysis of factors contributing to household water security problems and threats in different settlement categories of Ngamiland, Botswana

    NASA Astrophysics Data System (ADS)

    Kujinga, Krasposy; Vanderpost, Cornelis; Mmopelwa, Gagoitseope; Wolski, Piotr

    Globally, water security is negatively affected by factors that include climatic and hydrological conditions, population growth, rural-urban migration, increased per-capita water use, pollution and over-abstraction of groundwater. While Botswana has made strides in providing safe and clean water to its population since independence in 1966, over the years, a combination of factors have contributed to water security problems in different settlement categories of the country (i.e., primary, secondary, tertiary and ungazetted settlements) in general and in the district of Ngamiland in particular. To study water security problems differentiated by settlement category, this study employed quantitative data collection methods (i.e. household structured questionnaires) and qualitative data collection methods (i.e. key informant interviews, observation, focus group discussions and informal interviews), complemented by a review of relevant literature. Water security in all settlements is affected by status of the settlement, i.e. gazetted or ungazetted, climatic and hydrological factors and water governance challenges. In large villages such as Maun, factors threatening water security include population growth, urbanization, management challenges, old water supply and distribution infrastructure, increased demand for individual connections and changing lifestyles. Small gazetted and ungazetted settlements encounter problems related to limited sources of water supply as well as salinity of groundwater resources. In order to enhance water security in different settlement categories, Botswana has to develop a comprehensive water resources management strategy underpinned by integrated water resources management principles aimed at addressing factors contributing to water security problems. The strategy has to be settlement category specific. Large villages have to address factors related to demographic changes, urbanization, management challenges, water supply infrastructure and the introducing of water demand management activities. Households in small villages need provision of water from more sustainable sources while ungazetted settlements need better access to clean water.

  3. Developing a Viable Approach for Effective Tiered Systems

    DTIC Science & Technology

    2007-01-17

    TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT 19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (include area code ) b. ABSTRACT c. THIS PAGE 18...is changing the world. Now deal with it” (New Scientist 2006). If true, this significant message is one that would extend well beyond the realm of...system-of-systems poses formidable challenges for the acquisitions bureaucracy and the defense industries” (Dombrowski et al. 2002). “TRLs

  4. Mexico’s National Command and Control Center Challenges and Successes

    DTIC Science & Technology

    2011-06-01

    Perales Pimentel Ing. Francisco Niembro Maribel Cervates Guerrero Genaro Garcia Luna Secretaría de Seguridad Pública Mexico , D.F. Point of...9841 Irvine Ctr Dr., Ste 200 Irvine, CA 92618 Alex Bonino and Fred Schellenberg Narcotics Affairs Section, US Embassy Mexico , D.F. Andres...Federal Rights License. 14. ABSTRACT Secretar?de Seguridad P?blica (The Secretariat of Public Security or SSP) has a work force of nearly 30,800 police

  5. Study of Software Tools to Support Systems Engineering Management

    DTIC Science & Technology

    2015-06-01

    Management 15. NUMBER OF PAGES 137 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS...AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) According to a...PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298

  6. Research Support for the Laboratory for Lightwave Technology

    DTIC Science & Technology

    1992-12-31

    34 .. . ."/ 12a. DISTRIBUTION AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE UNLIMITED 13. ABSTRACT (Mawimum 200words) 4 SEE ATTACHED ABSTRACT DT I 14. SUBJECT...8217TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT...temperature ceramic nano- phase single crystal oxides that may be produced at a high rate . The synthesis of both glasses and ceramics using novel techniques

  7. Effects of climate change on water abstraction restrictions for irrigation during droughts - The UK case

    NASA Astrophysics Data System (ADS)

    Rey Vicario, D.; Holman, I.

    2016-12-01

    The use of water for irrigation and on-farm reservoir filling is globally important for agricultural production. In humid climates, like the UK, supplemental irrigation can be critical to buffer the effects of rainfall variability and to achieve high quality crops. Given regulatory efforts to secure sufficient environmental river flows and meet rising water demands due to population growth and climate change, increasing water scarcity is likely to compound the drought challenges faced by irrigated agriculture in this region. Currently, water abstraction from surface waters for agricultural irrigation can be restricted by the Environment Agency during droughts under Section 57 of the Water Resources Act (1991), based on abnormally low river flow levels and rainfall forecast, causing significant economic impacts on irrigated agricultural production. The aim of this study is to assess the impact that climate change may have on agricultural abstraction in the UK within the context of the abstraction restriction triggers currently in place. These triggers have been applied to the `Future Flows hydrology' database to assess the likelihood of increasing restrictions on agricultural abstraction in the future by comparing the probability of voluntary and compulsory restrictions in the baseline (1961-1990) and future period (2071-2098) for 282 catchments throughout the whole of the UK. The results of this study show a general increase in the probability of future agricultural irrigation abstraction restrictions in the UK in the summer, particularly in the South West, although there is significant variability between the 11 ensemble members. The results also indicate that UK winters are likely to become wetter in the future, although in some catchments the probability of abstraction restriction in the reservoir refilling winter months (November-February) could increase slightly. An increasing frequency of drought events due to climate change is therefore likely to lead to more water abstraction restrictions, increasing the need for irrigators to adapt their businesses to increase drought resilience and hence food security.

  8. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    PubMed Central

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-01-01

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093

  9. Glossary: Defense Acquisition Acronyms and Terms. Revision 2

    DTIC Science & Technology

    1987-07-01

    Approved REPORT DOCUMENTATION PAGE OMBNo. 070-O 18 la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS % unclassified 2a. SECURITY CLASSIFICATION ...WORK UNIT Fort Belvoir, VA 22060-5426 ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification ) Glossary Defense Acquisition...DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION [RUNCLASSIFIED/UNLIMITED 0 SAME AS RPT 0 DTIC USERS unclassified 22a. NAME OF

  10. Author-Editor Guide to Technical Publications Preparation. Revision

    DTIC Science & Technology

    1990-01-01

    meteorology, climatology, military technical publications. ( ") <- 15: Number of Pages: 68 17. Security Classification of Report: Unclassified 1... Security Classification of this Page: Unclassified 19. Security Classification of Abstract: Unclassified 20. Limitation of Abstract: UL Standard Form 298...34 There are, however, February 1983. numerous exceptions. Although some technical material may not be classified in accordance with security AFR 83-2, Air

  11. Exploring stories of occupational engagement in a regional secure unit

    PubMed Central

    Morris, Karen; Cox, Diane L.; Ward, Kath

    2016-01-01

    Abstract This paper focuses on the occupational experiences of five men living within a forensic mental health unit over a year. This study used a descriptive qualitative case study methodology to explore the meaning and value placed on daily life (activities, occupations and routines), and how this changed over time. The men’s stories showed a complex picture of their experiences of daily life. This study demonstrated the impact of the environment on the men and the ongoing challenge of the need to balance treatment/therapy with security demands and opportunities. Three interrelated themes were identified: (1) Power and Occupation; (2) Therapy or Punishment; (3) Occupational Opportunities within Restrictions. These findings serve as a reminder to clinical teams to reassess the value of occupations attributed by their patients and the impact of the secure environment, whilst also acknowledging the potential for occupations to have a negative impact on well-being. PMID:27695388

  12. In Vivo Testing of Chemopreventive Agents Using the Dog Model of Spontaneous Prostate Carcinogenesis

    DTIC Science & Technology

    2001-03-01

    SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT...retarded tate Cancer Research Program (PC-970492, awarded to population. J Gerontol 1969;24:395-411. 19. Hayflick LH. How and why we age. Exp Gerontol

  13. 2011 Nanoelectronic Devices for Defense & Security (NANO-DDS) Conference Held in Brooklyn, New York on August 29-September 1, 2011. Technical Program and Abstract Digest

    DTIC Science & Technology

    2011-08-01

    challenges in new design methodologies . Particular examples involve an in-circuit functional timing testing of systems with millions of cores. I...TECHNIQUES Chair: Dwight Woolard, U.S. Army Research Office (ARO) 8:40-9:05 EXPERIMENTAL DESIGN OF SINGLE-CRYSTAL DNA FOR THZ SPECTROSCOPY...Detection Based Techniques EXPERIMENTAL DESIGN OF SINGLE-CRYSTAL DNA FOR THZ SPECTROSCOPY E. R. Brown, M.L. Norton, M. Rahman, W. Zhang Wright

  14. Fixed-point Design of the Lattice-reduction-aided Iterative Detection and Decoding Receiver for Coded MIMO Systems

    DTIC Science & Technology

    2011-01-01

    reliability, e.g., Turbo Codes [2] and Low Density Parity Check ( LDPC ) codes [3]. The challenge to apply both MIMO and ECC into wireless systems is on...REPORT Fixed-point Design of theLattice-reduction-aided Iterative Detection andDecoding Receiver for Coded MIMO Systems 14. ABSTRACT 16. SECURITY...illustrates the performance of coded LR aided detectors. 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES The views, opinions

  15. Keeping the Routine, Routine: The Operational Risks of Challenging Chinese Excessive Maritime Claims

    DTIC Science & Technology

    2004-02-09

    China Turned Away U.S. Research Ship in International Waters" Stars and Stripes, 20 May 2001, <http:// ww2 .pstripes.osd.mil/01/may01/ed052001d.html...and are not necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The United States asserts that China claims rights, territory...of the Law of the Sea, but is fundamentally about national security and national policy. 15. SUBJECT TERMS UNCLOS, Excessive Maritime Claims, China

  16. Vitamin D3 Analogues with Low Vitamin D Receptor Binding Affinity Regulate Chondrocyte Proliferation, Proteoglycan Synthesis, and Protein Kinase C Activity

    DTIC Science & Technology

    1997-07-11

    REPORT DOCUMENTATION PAGE Form ApprovedOMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour...DISTRIBUTION CODE 13. ABSTRACT (Maximum 200 words) 14. SUBJECT TERMS 15. NUMBER OF PAGES 50 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY...CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT Standard Form 298(Rev. 2-89) (EG) Prescribed byANSI

  17. Assessing the Effectiveness of Post-9/11 Intelligence Information Sharing

    DTIC Science & Technology

    2010-03-01

    distribution unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT see attached 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...March 2010 WORD COUNT: 5,677 PAGES: 30 KEY TERMS: Intelligence Reform, Intelligence Sharing, 9/11 Commission, Homeland Security , National Security ...such as the creation of the Department of Homeland Security (DHS). In fact, both the 2007 National Strategy for Information Sharing and the IC’s

  18. Enhanced Patient Expectation and Antiemetic Drug Efficacy

    DTIC Science & Technology

    1999-07-01

    NUMBER OF PAGES 15 Breast Cancer Expectancy Antiemetic Nausea and Vomiting Patient Information Side Effect 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... SECURITY CLASSIFICATION OF THIS 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT PAGE OF ABSTRACT Unclassified Unclassified...by the introduction of the 5-HT 3 receptor antagonist class of antiemetics (ondansetron, granisetron , tropisitron) have greatly reduced chemotherapy

  19. Intelligent Interoperable Agent Toolkit (I2AT)

    DTIC Science & Technology

    2005-02-01

    Agents, Agent Infrastructure, Intelligent Agents 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01...those that occur while the submarine is submerged. Using CoABS Grid/Jini service discovery events backed up with a small amount of internal bookkeeping

  20. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  1. Making the National Security Council Better In the Bahamas to Resolve Illegal Migration

    DTIC Science & Technology

    2015-12-01

    ABSTRACT (maximum 200 words) The Bahamas’ economy depends primarily on tourism . Unchecked crime and cross-border threats jeopardize the country’s economic... tourism , opportunistic maritime criminality, national security strategy, national insecurity, U.S.-Bahamian relations, Haitian migration, transnational...of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The Bahamas’ economy depends primarily on tourism . Unchecked

  2. Impacts of climate change on abstraction reliability for irrigation during droughts - Policy implications for England

    NASA Astrophysics Data System (ADS)

    Rey, Dolores; Holman, Ian; Rio, Marlene; Prudhomme, Christel

    2017-04-01

    In humid climates around the world, supplemental irrigation is critical to buffer the effects of rainfall variability and to assure crop yield and quality. In England, abstraction for irrigation is limited by: i) a maximum volumetric limit specified in the abstraction licence and ii) restrictions on abstraction imposed by the water regulator during droughts. Given regulatory efforts to secure sufficient environmental river flows and meet rising water demands due to population growth and climate change, increasing water scarcity is likely to compound the drought challenges faced by irrigated agriculture in this region. The aim of this study is to assess the impact that climate change may have on agricultural abstraction reliability in England within the context of the abstraction and drought management regimes currently in place, and how the water abstraction reform being developed by the Government could reduce the pressure on more and more limited water resources. Firstly, explanatory relationships were derived between an annual agroclimatic aridity index and actual irrigation abstraction. Secondly, the probability of annual abstraction being close to the maximum limit was calculated for each licence for the baseline (1961-90) and future (2071-2098) period. Finally, the current water resource availability triggers for mandatory abstractions restrictions on spray irrigation licences were used to assess the probability of being under restrictions during drought in each period. The results indicate a significant increase in the proportion of the licence being used in all catchments, representing the greatest risk for abstractors in the future, mainly in the most productive agricultural areas located in eastern and southern regions. In contrast, the likelihood of mandatory drought restrictions increases significantly in central and western England due to the lower buffering capacity of groundwater. Based on our findings, this paper discusses how the reform of the water abstraction licensing system being currently designed could help farmers to reduce their water availability risks. For instance, our analysis shows that a huge percentage of licenses in the country are hardly ever used, and hence the potential for reallocation (through water trading or other mechanisms) is worth exploring. Our results highlight the increasing water availability risks for irrigators in this country, and the need of the farming community and the regulator to adapt and collaborate to reduce the impacts and to increase drought resilience and hence food security.

  3. Building Combat Strength through Logistics: Translating the New Air Force Logistics Concept of Operations into Action

    DTIC Science & Technology

    1988-03-31

    MARCI 1988 iAm U m WI 4EUnclT CLSIIAION OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2.. SECUR ...logistics system of the future more capable of supporting the full spectrumn of war 20 OISTRIaSUTION.’AVAILAeILiTY 0" ABSTRACT 21 ABSTRACT SECURITY ... SECURITY CLASSIFICATION OT: THIS PAGF Unclas ’SCUFUTY Cý= I!FICATION OF THIS PAGE 1,Qwcont.) scenarios. Today’s logistics processes assume wartime

  4. Empowering patients through social media: the benefits and challenges.

    PubMed

    Househ, Mowafa; Borycki, Elizabeth; Kushniruk, Andre

    2014-03-01

    This article explores the range of social media platforms used by patients and examines the benefits and challenges of using these tools from a patient perspective. A literature review was performed to investigate the use of social media technology by patients. The MEDLINE database was searched using the terms "social media" and "patient." The search was conducted in September 2012 and yielded 765 abstracts. Initially, 63 abstracts were selected. All articles dating from 2004 through 2012 were included. Only 12 articles were found to be relevant for the purposes of the review. The results of this research found that there appears to be an increase in the use of social media by patients across the healthcare spectrum. The research indicates a promising future for the use of social media by patients; however, evidence related to the efficacy and effectiveness of social media is currently limited. Various challenges have also been identified relating to privacy and security concerns, usability, the manipulation of identity, and misinformation. The use of social media technology is an emerging trend for patients who are seeking health information. Conclusions are that such technology holds promise for improving patient engagement and empowerment and community building. Social media has a future in healthcare, especially with regard to patient engagement and empowerment; however, there are several challenges to overcome before the technology can achieve its potential.

  5. Use of computational modeling combined with advanced visualization to develop strategies for the design of crop ideotypes to address food security

    PubMed Central

    Christensen, A J; Srinivasan, Venkatraman; Hart, John C; Marshall-Colon, Amy

    2018-01-01

    Abstract Sustainable crop production is a contributing factor to current and future food security. Innovative technologies are needed to design strategies that will achieve higher crop yields on less land and with fewer resources. Computational modeling coupled with advanced scientific visualization enables researchers to explore and interact with complex agriculture, nutrition, and climate data to predict how crops will respond to untested environments. These virtual observations and predictions can direct the development of crop ideotypes designed to meet future yield and nutritional demands. This review surveys modeling strategies for the development of crop ideotypes and scientific visualization technologies that have led to discoveries in “big data” analysis. Combined modeling and visualization approaches have been used to realistically simulate crops and to guide selection that immediately enhances crop quantity and quality under challenging environmental conditions. This survey of current and developing technologies indicates that integrative modeling and advanced scientific visualization may help overcome challenges in agriculture and nutrition data as large-scale and multidimensional data become available in these fields. PMID:29562368

  6. Awareness-Enabled Coordination

    DTIC Science & Technology

    2006-04-01

    contextualization, policy, team coordination. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF ABSTRACT UNCLASSIFIED UNCLASSIFIED UL NSN 7540-01-280... netowrk . Federal Austin FBI DHS CBP BobMary Carol John Alice 1 5 Texas NJ 3 4 1 2 3 4 Xavier Yanni 5 6 2 1 2 4 3 Policy & resource flow n Policies

  7. Advanced Fuel Properties; A Computer Program for Estimating Property Values

    DTIC Science & Technology

    1993-05-01

    security considerations, contractual obligations, or notice on a specific document. REPORT DOCUMENTATION PAGE Fogu Approwd I OMB No. 0704-01=5 Ps NP...found in fuels. 14. SUBJECT TERMS 15. NUMBEROF PAGES 175 Fuel properties, Physical Propertie, Thermodynamnics, Predictions 16. PRICE CODE 17. SECURITY ...CLASSIFICATION is. SECURrrY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITFATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT Unclassified

  8. Building Community Resilience to Disasters

    PubMed Central

    Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S.

    2011-01-01

    Abstract Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation. PMID:28083162

  9. Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges

    NASA Astrophysics Data System (ADS)

    Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor

    Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.

  10. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    DTIC Science & Technology

    2012-12-01

    Carolyn Halladay THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this...LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT...Trinkunas Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The Department of Homeland Security

  11. Change Detection Algorithms for Information Assurance of Computer Networks

    DTIC Science & Technology

    2002-01-01

    original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the

  12. Renditions: Constraints Imposed by Laws on Torture

    DTIC Science & Technology

    2007-10-12

    14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 30 19a...limit or bar U.S. participation in renditions, including S. 1876, the National Security with Justice Act of 2007, and H.R. 1352, the Torture...civil case on a number of grounds, including that certain claims raised against U.S. officials implicated national security and foreign policy

  13. Beyond Fossil Fuels: Options and Challenges

    NASA Astrophysics Data System (ADS)

    Thompson, Levi T.

    2007-05-01

    Securing our nation’s energy supply is arguably the most important challenge we face. The source and amount of energy that is available impacts nearly every aspect of our lives including our mobility, health and welfare. Presently, the U.S. depends heavily on foreign energy resources. For example, in 2006, nearly 60 percent of the crude oil consumed in the U.S. was imported; approximately one-quarter of this oil comes from the Persian Gulf. With growing demands from emerging economies, declining environmental quality and potential for global conflict, there is a pressing need to develop a more sustainable energy strategy. This presentation will review options for a sustainable energy economy including the use of hydrogen and fuel cells, and describe some of the key challenges To cite this abstract, use the following reference: http://meetings.aps.org/link/BAPS.2007.OSS07.A1.2

  14. Assessment of the Activation State of RAS and Map Kinase in Human Breast Cancer Specimens (96Breast)

    DTIC Science & Technology

    1999-09-01

    Cancer 16. PRICE CODE 17. SECURITY CLASSIFICATION 18 . SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...THIS PAGE OF ABSTRACT Unclassified Unclassified Unclassified Unlimited NSN 7640-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 ...transformation and regulate cell morphology, adhesion and motility through cytoskeletal dynamics and play an important role in carcinogenesis ( 18 ). Rho

  15. Functional Interactions Between c-Src and HER1 Potentiate Neoplastic Transformation: Implications for the Etiology of Human Breast Cancer

    DTIC Science & Technology

    2000-07-01

    receptor 120 16. PRICE CODE 17. SECURITY CLASSIFICATION 18 . SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...THIS PAGE OF ABSTRACT Unclassified Unclassified Unclassified Unlimited NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 ... 18 -26 Appended Manuscripts 3 INTRODUCTION Recent work in our laboratory has established the importance of a

  16. State-to-State Thermal/Hyperthermal Collision Dynamics of Atmospheric Species

    DTIC Science & Technology

    2012-02-28

    kinetics 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT 18 . SECURITY CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION...OF ABSTRACT 20. LIMITATION OF ABSTRACT NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 298-102 AFRL...populations, though colder, are also highly excited in a non-Boltzmann distribution, [ Erot  =1.0(1) kcal/mol], which indicates that a substantial fraction

  17. Armed Services Pricing Manual (ASPM)

    DTIC Science & Technology

    1986-01-01

    NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 361...f. National security . g. Public interest. Two kinds of solicitations are equally acceptable: invitations for bids Fl3s), for sealed bidding, and...2.12 2-14 2-14 2-15 2-15 The objective of procurement is to secure needed supplies and services fr( nsi b I e at fair and reasonable prices calculated

  18. Role of Epidermal Growth Factor Receptors and Their Ligands in Normal Mammary Epithelial and Breast Cancer Cells

    DTIC Science & Technology

    1996-07-01

    UNCLASSIFIED AD NUMBER ADB216343 NEW LIMITATION CHANGE TO Approved for public release, distribution unlimited FROM Distribution authorized to U.S...PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF...ABSTRACT ,Unclassified Unclassified Unclassified Limited NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-1 8 DISCLAIMER

  19. HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

    DTIC Science & Technology

    2003-01-01

    securing the routing protocols of mobile ad hoc wireless net- works has been done in prevention. Intrusion detection systems play a complimentary...TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified...hops of A would be unable to communicate with B and vice versa [1]. 1.2 The role of intrusion detection in security In order to provide reliable

  20. Formal Verification of Large Software Systems

    NASA Technical Reports Server (NTRS)

    Yin, Xiang; Knight, John

    2010-01-01

    We introduce a scalable proof structure to facilitate formal verification of large software systems. In our approach, we mechanically synthesize an abstract specification from the software implementation, match its static operational structure to that of the original specification, and organize the proof as the conjunction of a series of lemmas about the specification structure. By setting up a different lemma for each distinct element and proving each lemma independently, we obtain the important benefit that the proof scales easily for large systems. We present details of the approach and an illustration of its application on a challenge problem from the security domain

  1. Scalable and Precise Abstraction of Programs for Trustworthy Software

    DTIC Science & Technology

    2017-01-01

    calculus for core Java. • 14 months: A systematic abstraction of core Java. • 18 months: A security auditor for core Java. • 24 months: A contract... auditor for full Java. • 42 months: A web-deployed service for security auditing. Approved for Public Release; Distribution Unlimited 4 4.0 RESULTS

  2. Printer Multiplexing Among Multiple Z-100 Microcomputers.

    DTIC Science & Technology

    1985-12-01

    allows the printer to be used by any one of multiple Z-l00’s at a time. The SPOOL process sends the data thru the CONTROL process to the printer or saves...the data on the (Continue) 20 OISTRIBUTION/AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION K)UNCLASSIFIEDIUNLIMITED 0 SAME AS RPT 0 DTIC...CLASSFICATION Of THIS PAG9 (l#1011 DMIat 19. ABSTRACT (Continued) disk file. - ,:1J. 4, .-.-. _ SECURITY CLASSIF9CATION OP THIS PA8EWY~en Data Enteed

  3. Center for Seismic Studies Final Technical Report, October 1992 through October 1993

    DTIC Science & Technology

    1994-02-07

    SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT...Upper limit of depth error as a function of mb for estimates based on P and S waves for three netowrks : GSETr-2, ALPHA, and ALPHA + a 50 station...U 4A 4 U 4S as 1 I I I Figure 42: Upper limit of depth error as a function of mb for estimatesbased on P and S waves for three netowrk : GSETT-2o ALPHA

  4. Service-oriented Software Defined Optical Networks for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Ji, Yuefeng

    2017-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.g., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). This paper proposes a new service-oriented software defined optical network architecture, including a resource layer, a service abstract layer, a control layer and an application layer. We then dwell on the corresponding service providing method. Different service ID is used to identify the service a device can offer. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit different services based on the service ID in the service-oriented software defined optical network.

  5. Chinese and Russian Policies on Climate Change: Implications for U.S. National Security Policy

    DTIC Science & Technology

    2016-06-01

    Second Reader: Naazneen Barma THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form ...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2...Effects in Russia These same imbalances in rainfall and other weather phenomena are being experienced throughout Russia in the form of floods, droughts

  6. The Latent Structure of Secure Base Script Knowledge

    ERIC Educational Resources Information Center

    Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.

    2015-01-01

    There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…

  7. Afghanistan: Key Oversight Issues

    DTIC Science & Technology

    2013-02-01

    2012. Afghan Security : Renewed Sharing of Biometric Data Could Strengthen U.S. Efforts to Protect U.S. Personnel from Afghan Security Force Attacks...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 59 19a. NAME OF RESPONSIBLE PERSON...Afghanistan’s Security Environment 17 Enclosure II Transition of Lead Security to Afghan Security Forces 19 Enclosure III Future Cost and

  8. Integrating security in a group oriented distributed system

    NASA Technical Reports Server (NTRS)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  9. Implications of the Budgeting Process on State-of-the-Art (SOA) Extensions.

    DTIC Science & Technology

    1987-12-01

    CLASSIFICATION AUTHORITY 3 DISTRIBUTION /AVAILABILITY OF REPORT Approved for public release; Zb DECLASSiFICATION1DOWNGRADING SCHEDULE Distribution is...PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO NO ACCESSION NO 11. TITLE (Include Security Classification ) IMPLICATIONS OF THE BUDGETING PROCESS ON STATE...20 DISTRIBUTIONAVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION 0 UNCLASSIFIED,UNLIMI"ED 0 SAME AS RPT QJ DTIC USERS UNCLASSIFIED 22a

  10. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    PubMed

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  11. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    DTIC Science & Technology

    2012-12-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure

  12. (YIP) Detecting, Analyzing, Modeling Adversarial Propaganda in Social Media

    DTIC Science & Technology

    2015-10-26

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c . THIS PAGE 17. LIMITATION OF...numbers as they appear in the report, e.g. F33315-86- C -5169. 5b. GRANT NUMBER. Enter all grant numbers as they appear in the report. e.g. AFOSR...classification in accordance with security classification regulations, e.g. U, C , S, etc. If this form contains classified information, stamp classification

  13. UG311, An Oncofetal Marker Lost with Prostate Cancer Progression

    DTIC Science & Technology

    2001-04-01

    CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT Unclassified Unclassified...that the IGF2R facilitates the degradation of IGF-2 by transporting IGF-2 to lysozomes, thereby limiting the signal potentiated by the growth factor...integrin mediated migration. IGF-1 had no effect on this activity. IGFBP-1 is expressed in the placenta [105] where it may limit trophoblast invasion

  14. Lone-Wolf Terrorist Radicalization and the Prisoner’s Dilemma: Ensuring Mutual Cooperation Between at-Risk Muslim Americans and Local Communities

    DTIC Science & Technology

    2015-09-01

    for public release; distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT While scholars study the radicalization process that...the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2015...Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT While scholars study the radicalization process that produces lone-wolf terrorists

  15. 76 FR 77052 - Proposed Collection; Comment Request for Form 8931

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-09

    ... 8931, Agricultural Chemicals Security Credit. DATES: Written comments should be received on or before... . SUPPLEMENTARY INFORMATION: Title: Agricultural Chemicals Security Credit. OMB Number: 1545-2122. Form Number: 8931. Abstract: Use Form 8931 to claim the tax credit for qualified agricultural chemicals security...

  16. Homeland Security. Management Challenges Facing Federal Leadership

    DTIC Science & Technology

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  17. Computer Security Models

    DTIC Science & Technology

    1984-09-01

    Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development

  18. Acute Radiation Sickness Amelioration Analysis

    DTIC Science & Technology

    1994-05-01

    Emetic Drugs 16. PRICE CODE Antagonists 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19, SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF...102 UNCLASSIFIED mcuIw IA IIIcaIIin or Isis PAW CLASSFIED BY: N/A since Unclassified. DECLASSIFY ON: N/A since Unclassified. SECURITY CLASSIFICATION OF...Approximately 2000 documents relevant to the development of the candidate anti-emetic drugs ondansetron (Zofran, Glaxo Pharmaceuticals) and granisetron

  19. 78 FR 50436 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-19

    ... Justification Template. Abstract: The TSGP is an important component of the Department of Homeland Security's... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0022... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency...

  20. A Framework for Architecture-Based Planning and Assessment to Support Modeling and Simulation of Network-Centric Command and Control

    DTIC Science & Technology

    2006-02-17

    included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME

  1. Development of a Lithospheric Model and Geophysical Data Base for North Africa.

    DTIC Science & Technology

    1996-07-19

    Department of Energy Office of Non-Proliferation and National Security MONITORED BY Phillips Laboratory CONTRACT No. F 19628-C-0104 The views and...Worldwide Standardized Seismograph Netowrk stations locatdd:.&t regional distances from magnitude greater than 5.•0 earthquakes occurring within N6rth... SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACTOF REPORT OF THIS PAGE OF ABSTRACT

  2. Focusing America’s National Powers

    DTIC Science & Technology

    2006-04-14

    governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own

  3. 5 CFR 1312.11 - Challenges to classifications.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...

  4. 5 CFR 1312.11 - Challenges to classifications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...

  5. Enhanced Patient Expectant and Antiemetic Drug Efficacy

    DTIC Science & Technology

    1999-07-01

    Breast Cancer Nausea and Vomiting Expectancy Patient Information Antiemetic Side Effect 15. NUMBER OF PAGES 15 16. PRICE CODE 17. SECURITY ...CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT...5-HT3 receptor antagonist class of antiemetics (ondansetron, granisetron , tropisitron) have greatly reduced chemotherapy-related vomiting, this has

  6. TENOR Follow-on

    DTIC Science & Technology

    2002-04-01

    Training environments; Distance learning; Information sharing; System architecture; 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public... security , and the team members generally originate from different geographical locations and different units with varied operational mission and...Use of a server provides security and flexibility in the development and updating of training material. The lessons are created in HTML, a widely

  7. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  8. Automated Library System Specifications.

    DTIC Science & Technology

    1986-06-01

    University), LIS (Georqetown Universitv Medical Center) 20 DiSTRI3UT!ON.. AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION :UNCLASSIFIED...Interface) acquisitions, patron access catalo. (Boolean search), authority Afiles, zana ~ezient reports. Serials control expected in 1985. INDIVIDUALIZATIOI

  9. Achieving the four dimensions of food security for resettled refugees in Australia: A systematic review.

    PubMed

    Lawlis, Tanya; Islam, Wasima; Upton, Penney

    2018-04-01

    Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.

  10. Privacy, security and access with sensitive health information.

    PubMed

    Croll, Peter

    2010-01-01

    This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.

  11. Next-Generation Botnet Detection and Response

    DTIC Science & Technology

    2008-06-24

    REPORT Final Report of "Next-Generation Botnet Detection and Response" 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In this project, we developed...and Wenke Lee. ?In Proceedings of The 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, February 2006. 2...In Proceedings of The 16th USENIX Security Symposium ( Security 󈧋), Boston, MA, August 2007. 3. A Taxonomy of Botnet Structures. ?David Dagon, Guofei

  12. XUV Frequency Comb Development for Precision Spectroscopy and Ultrafast Science

    DTIC Science & Technology

    2015-07-28

    first time and provide insight to the underlying 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...TERMS. Key words or phrases identifying major concepts in the report. 16. SECURITY CLASSIFICATION. Enter security classification in accordance with... security classification regulations, e.g. U, C, S, etc. If this form contains classified information, stamp classification level on the top and bottom

  13. Moving Forward with Enhancements for Our Customers

    DTIC Science & Technology

    2008-11-18

    The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18...Materials and Testing Alion Science & Technology CBRNIAC Chemical, Biological Radiological, Nuclear Battelle Memorial CPIAC Chemical Propulsion Johns

  14. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009-2014.

    PubMed

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G

    2016-05-01

    The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.

  15. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009–2014

    PubMed Central

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.

    2016-01-01

    Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842

  16. Enzymatic Decontamination of Environmental Organophosphorus Compounds

    DTIC Science & Technology

    2006-12-04

    ABSTRACT (Maximum 200 words) The abstract is below since many authors do not follow the 200 word limit 14. SUBJECT TERMS organophosphorus compounds ...5404 Enzymatic decontamination of environmental organophosphorus compounds REPORT DOCUMENTATION PAGE 18. SECURITY CLASSIFICATION ON THIS PAGE...239-18 298-102 15. NUMBER OF PAGES 20. LIMITATION OF ABSTRACT UL - 4-Dec-2006 Enzymatic decontamination of environmental organophosphorus compounds

  17. Renditions: Constraints Imposed by Laws on Torture

    DTIC Science & Technology

    2009-01-22

    AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY ...suspended after the Italian government said testimony could reveal state secrets threatening Italy’s national security . “CIA-Linked Kidnapping Trial...raised against U.S. officials implicated national security and foreign policy considerations, and assessing the propriety of those considerations was

  18. Preparing Information Systems (IS) Graduates to Meet the Challenges of Global IT Security: Some Suggestions

    ERIC Educational Resources Information Center

    Sauls, Jeff; Gudigantala, Naveen

    2013-01-01

    Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…

  19. 75 FR 43486 - Proposed Information Collection; Comment Request; Special Comprehensive License

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Special Comprehensive License AGENCY: Bureau of Industry and Security, Commerce ACTION: Notice....gov . SUPPLEMENTARY INFORMATION: I. Abstract The Special Comprehensive License (SCL) procedure...

  20. Modelling Medications for Public Health Research

    PubMed Central

    van Gaans, D.; Ahmed, S.; D’Onise, K.; Moyon, J.; Caughey, G.; McDermott, R.

    2016-01-01

    Most patients with chronic disease are prescribed multiple medications, which are recorded in their personal health records. This is rich information for clinical public health researchers but also a challenge to analyse. This paper describes the method that was undertaken within the Public Health Research Data Management System (PHReDMS) to map medication data retrieved from individual patient health records for population health researcher’s use. The PHReDMS manages clinical, health service, community and survey research data within a secure web environment that allows for data sharing amongst researchers. The PHReDMS is currently used by researchers to answer a broad range of questions, including monitoring of prescription patterns in different population groups and geographic areas with high incidence/prevalence of chronic renal, cardiovascular, metabolic and mental health issues. In this paper, we present the general notion of abstraction network, a higher level network that sits above a terminology and offers compact and more easily understandable view of its content. We demonstrate the utilisation of abstraction network methodology to examine medication data from electronic medical records to allow a compact and more easily understandable view of its content. PMID:28149446

  1. Compatibility of Army Systems with Anthropometric Characteristics of Female Soldiers

    DTIC Science & Technology

    1997-09-01

    M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For Unclassified/ Limited ...of female soldiers. Participation was limited to female soldiers whose height did not exceed 5’ 5", the 5th percentile value of male soldiers’ height...CLASSIFICATION tffcMSSIFIED 18. SECURITY CLASSIFICATION uffdLÄS^FIED 19. SECURITY CLASSIFICATION ST*—FIED 20. LIMITATION OF ABSTRACT SAR

  2. Microcomputer Polling Improvements for AFSATCOM.

    DTIC Science & Technology

    1981-06-01

    AGENCY NAME A AODRESS(il differ~,.ru C~ntrolling Office) IS. SECURITY CLASS. (of this report) 2/’ .iUNCLASSI FIED 1/ 5a. DECLASSIFICATION DOWNGRADING...enhance (over) DD I1JAN 73 1473, UNCLASSIFIED - ~~~ SECURITY CLASSIFICATION OF THIS PAGE (When Dots Enterd’I.. SECURITY CLASSIaICATION OF THIS PAGE(ahnm...Data Entered) 20. ABSTRACT (Continued) /7 hetting capabilities for the satellite-user community /V 4. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE

  3. Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation

    DTIC Science & Technology

    2016-07-14

    of the important properties of secure computation . In particular, it is known that full fairness cannot be achieved in the case of two-party com...Jakobsen, J. Nielsen, and C. Orlandi. A framework for outsourcing of secure computation . In ACM Workshop on Cloud Computing Security (CCSW), pages...Function Evaluation with Applications to Genomic Computation Abstract: Computation based on genomic data is becoming increasingly popular today, be it

  4. The Enterprise 2.0 Concept: Challenges on Data and Information Security

    NASA Astrophysics Data System (ADS)

    Silva, Ana; Moreira, Fernando; Varajão, João

    The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.

  5. A forensic identification case and DPid - can it be a useful tool?

    PubMed Central

    de QUEIROZ, Cristhiane Leão; BOSTOCK, Ellen Marie; SANTOS, Carlos Ferreira; GUIMARÃES, Marco Aurélio; da SILVA, Ricardo Henrique Alves

    2017-01-01

    Abstract Objective The aim of this study was to show DPid as an important tool of potential application to solve cases with dental prosthesis, such as the forensic case reported, in which a skull, denture and dental records were received for analysis. Material and Methods Human identification is still challenging in various circumstances and Dental Prosthetics Identification (DPid) stores the patient’s name and prosthesis information and provides access through an embedded code in dental prosthesis or an identification card. All of this information is digitally stored on servers accessible only by dentists, laboratory technicians and patients with their own level of secure access. DPid provides a complete single-source list of all dental prosthesis features (materials and components) under complete and secure documentation used for clinical follow-up and for human identification. Results and Conclusion If DPid tool was present in this forensic case, it could have been solved without requirement of DNA exam, which confirmed the dental comparison of antemortem and postmortem records, and concluded the case as a positive identification. PMID:28678955

  6. 76 FR 23645 - Proposed Collection; Comment Request for Form 8937

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ... 8937, Report of Organizational Actions Affecting Basis of Securities. DATES: Written comments should [email protected] . SUPPLEMENTARY INFORMATION: Title: Report of Organizational Actions Affecting Basis of Securities. OMB Number: 1545-XXXX. Form Number: 8937. Abstract: Organizational actions that...

  7. 78 FR 41032 - Proposed Information Collection; Comment Request; Special Comprehensive License

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-09

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Special Comprehensive License AGENCY: Bureau of Industry and Security. ACTION: Notice. [email protected] . SUPPLEMENTARY INFORMATION: I. Abstract The Special Comprehensive License (SCL) procedure...

  8. SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE

    DTIC Science & Technology

    2017-04-06

    the organizational built up of the German Cyber Command. iii Abstract When former National Security Agency contractor Edward Snowden...Introduction In June 2013, former National Security Agency (NSA) contractor Edward Snowden revealed that the United States was spying on 122

  9. In House HSV PCR, Process Improvement and Cost Effectiveness Analysis

    DTIC Science & Technology

    2017-09-15

    TYPE 09/15/2017 Poster 4. TITLE AND SUBTITLE Cost-Analysis: In-hous(l HSV P(’R capabilities 6. AUTHOR(S) Ma.i Nich() las R CaJT 7. PERFORMING...ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMIT A TIC ".’ OF 18. NUMBER a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT OF PAGES 3

  10. The new risk paradigm for chemical process security and safety.

    PubMed

    Moore, David A

    2004-11-11

    The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.

  11. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    DTIC Science & Technology

    2014-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited SPORTS VENUE...Thesis 4. TITLE AND SUBTITLE SPORTS VENUE SECURITY: PUBLIC POLICY OPTIONS FOR SEAR 4–5 EVENTS 5. FUNDING NUMBERS 6. AUTHOR(S) James M. Gehring...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Although the United States made considerable advances in improving sport venue security

  12. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  13. Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges

    DTIC Science & Technology

    2010-07-01

    the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity

  14. EU Failing FAO Challenge to Improve Global Food Security.

    PubMed

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Military Cooperation Frameworks: Effective Models to Address Transnational Security Challenges of the Asia-Pacific Region

    DTIC Science & Technology

    2011-05-04

    evolving security challenges. Issues such as terrorism, proliferation of weapons of mass destruction, impacts of climate change , and the ever...impacts of climate change , and the ever-growing competition for valuable natural resources are a few of the these challenges. As an integral part...destruction, impacts of climate change , and the ever-growing competition for valuable natural resources have resulted in a new set of security

  16. Security of Quantum Repeater Network Operation

    DTIC Science & Technology

    2016-10-03

    AFRL-AFOSR-JP-TR-2016-0079 Security of Quantum Repeater Network Operation Rodney Van Meter KEIO UNIVERSITY Final Report 10/03/2016 DISTRIBUTION A...To)  29 May 2014 to 28 May 2016 4. TITLE AND SUBTITLE Security of Quantum Repeater Network Operation 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA2386...ABSTRACT Much of the work on quantum networks , both entangled and unentangled, has been about the uses of quantum networks to enhance end- host security

  17. Database Design Methodology and Database Management System for Computer-Aided Structural Design Optimization.

    DTIC Science & Technology

    1984-12-01

    52242 Prepared for the AIR FORCE OFFICE OF SCIENTIFIC RESEARCH Under Grant No. AFOSR 82-0322 December 1984 ~ " ’w Unclassified SECURITY CLASSIFICATION4...OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS Unclassified None 20 SECURITY CLASSIFICATION...designer .and computer- are 20 DIiRIBUTION/AVAILABI LIT Y 0P ABSTR4ACT 21 ABSTRACT SECURITY CLASSIFICA1ONr UNCLASSIFIED/UNLIMITED SAME AS APT OTIC USERS

  18. A Formal Specification and Verification Method for the Prevention of Denial of Service in Ada Services

    DTIC Science & Technology

    1988-03-01

    Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy

  19. 78 FR 18619 - Extension of Agency Information Collection Activity Under OMB Review: National Explosives...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: National Explosives Detection Canine Team Program (NEDCTP... Explosives Detection Canine Team Program (NEDCTP) canine handlers. Abstract: The FAMS/CTES Explosives...

  20. 7 Key Challenges for Visualization in Cyber Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  1. Food systems transition and disruptive low carbon innovation: implications for a food security research agenda.

    PubMed

    Tyfield, David

    2011-07-01

    There is a growing consensus that we are facing epochal challenges in global food security. Moreover, these challenges are multiple and complex. Meeting these challenges will involve nothing less than a wholesale socio-technical transition of the agri-food system. Optimizing the efficacy of the contribution of research to such a food security agenda will probably also need new institutional mechanisms and career structures to facilitate new kinds of collaborations and ongoing, longer-term projects. In short, the multiple challenges of food security demand a different political economy of research for effective intervention by science. In making this argument, the paper summarizes the major findings of a recent report regarding the potential impact of so-called 'disruptive' low-carbon innovations in China.

  2. Interactive Synthesis of Code Level Security Rules

    DTIC Science & Technology

    2017-04-01

    Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University

  3. To Legalize or not to Legalize? That is the Question

    DTIC Science & Technology

    2009-04-01

    and international community to improve security and promote development in Afghanistan. The negative effect on the nations overall security, the...the problem/solution methodology. The research explores the current illicit opium cultivation in Afghanistan and its effect on the current...negative effect on the current development efforts. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF

  4. Maintaining the Status Quo in the Taiwan Strait

    DTIC Science & Technology

    2013-03-01

    of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) U.S. Army...Count: 5,308 14. ABSTRACT In order to ensure vital U.S. interests concerning security and economic freedom in the region, the status quo in the...international/regional support of Taiwan, Taiwanese military deterrence backed by strategically ambiguous U.S. assurances of security , intertwined

  5. Water Quality Conditions at Tributary Projects in the Omaha District: 2008 Report

    DTIC Science & Technology

    2009-01-01

    SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public release... distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as... Plankton

  6. A System Architecture to Support a Verifiably Secure Multilevel Security System.

    DTIC Science & Technology

    1980-06-01

    4] Newmann, P.G., R. Fabry, K. Levitt, L. Robin - provide a tradeoff between cost and system secur- son, J. Wensley , "On the Design of a Provably ity...ICS-80/05 NL 112. 11W1 --1.25 1111 6 Mli,’O~ll Rl OIIION W AII .q3 0 School of Information and Computer Science S =GEORGIA INSTITUTE OF TECHNOLOGY 808...Multilevel Security Systemt (Extended Abstract) George I. Davida Department of Electical Engineering and Computer Science University of Wisconsin

  7. Technologies for an aging society: a systematic review of "smart home" applications.

    PubMed

    Demiris, G; Hensel, B K

    2008-01-01

    A "smart home" is a residence wired with technology features that monitor the well-being and activities of their residents to improve overall quality of life, increase independence and prevent emergencies. This type of informatics applications targeting older adults, people with disabilities or the general population is increasingly becoming the focus of research worldwide. The aim of this study was to provide a comprehensive review of health related smart home projects and discuss human factors and other challenges. To cover not only the medical but also the social sciences and electronics literature, we conducted extensive searches across disciplines (e.g., Medline, Embase, CINAHL, PsycINFO, Electronics and Communications Abstracts, Web of Science etc.). In order to be inclusive of all new initiatives and efforts in this area given the innovativeness of the concept, we manually searched for relevant references in the retrieved articles as well as published books on smart homes and gerontechnology. A total of 114 publications (including papers, abstracts and web pages) were identified and reviewed to identify the overarching projects. Twenty one smart home projects were identified (71% of the projects include technologies for functional monitoring, 67% for safety monitoring, 47% for physiological monitoring, 43% for cognitive support or sensory aids, 19% for monitoring security and 19% to increase social interaction). Evidence for their impact on clinical outcomes is lacking. The field of smart homes is a growing informatics domain. Several challenges including not only technical but also ethical ones need to be addressed.

  8. 78 FR 34161 - Proposed Collection: Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-06

    ... Time Deposits. PD F 4144-1--Account Information for U.S. Treasury Securities State and Local Government.... Abstract: The information is requested to establish and maintain accounts for the owners of securities of... agencies to take this opportunity to comment on proposed and/or continuing information collections, as...

  9. 77 FR 37475 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-21

    ... 8931, Agricultural Chemicals Security Credit. Form: 8931. Abstract: Form 8931 is used to claim the tax credit for qualified agricultural chemicals security costs paid or incurred by eligible agricultural businesses. All the costs must be paid or incurred to protect specified agricultural chemicals at a facility...

  10. The Challenges of Balancing Safety and Security in Implantable Medical Devices.

    PubMed

    Katzis, Konstantinos; Jones, Richard W; Despotou, George

    2016-01-01

    Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.

  11. Analysis for Non-Traditional Security Challenges: Methods and Tools

    DTIC Science & Technology

    2006-11-20

    PMESII Modeling Challenges modeling or where data is not available to support the model, would aid decision Domain is large, nebulous, complex, and...traditional challenges . This includes enlisting the aid of the inter-agency and alliance/coalition communities. Second, we need to realize this...20 November 2006 MILITARY OPERATIONS RESEARCH SOCIETY MIFh MORS Workshop Analysis for Non-Traditional Security Challenges : Methods and Tools 21-23

  12. Conflict vs Co-evolution: The Future of Sino-American Relations

    DTIC Science & Technology

    2013-04-18

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Marine Corps University...was the largest foreign holder of U.S. treasury securities , at $1.16 trillion. This is only slightly greater than Japan at $1.13 trillion, but much...territory, geostrategy, and energy security , impacting China’s relations with its neighbors.”10 In reality, the emotional influences of national

  13. USSOF OPERATIONS IN AFRICA: PROSPECTS FOR FUTURE ENGAGEMENTS IN THE SAHEL

    DTIC Science & Technology

    2017-04-03

    Mechanical Engineering. He also obtained a Master of Arts degree in Terrorism , Organized Crime and Global Security from the Coventry University, United...was a staff officer in the Headquarters Nigerian Air Force, Abuja. iv Abstract As part of the Global War on Terror , AFRICOM was established...to secure the US security interests in Africa. AFRICOM, through the Trans-Saharan Counter Terrorism Partnership uses USSOF to engage Sahelian

  14. Conflict Containment in the Balkans: Testing Extended Deterrence.

    DTIC Science & Technology

    1995-03-01

    STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited. 13. ABSTRACT This thesis critically analyzes a prominent theoretical...Containment 15. NUMBER OF in the Balkans; Deterrence; Coercive Diplomacy; Balance of Forces. PAGES: 161 16. PRICE CODE 17. SECURITY CLASSIFI- 18. SECURITY...Department of National Security Affai sAccesion For NTIS CRA&I DTtC TAB Unannounced Justifca ........... By- Distribution Availability Codes Avail and/or Dist

  15. Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service

    DTIC Science & Technology

    2007-12-07

    MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a...such as the TACLANE, have developed unique discovery methods to establish Plain Text Domain (PTD) Security Associations (SA). All of these techniques...can include network and host Internet Protocol (IP) addresses, Information System Security Office (ISSO) point of contact information and PTD status

  16. Geostationary Orbital Crowding: An Analysis of Problems and Solutions

    DTIC Science & Technology

    1990-05-16

    PAGES 237 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...later chapters. Those with technical backgrounds may still wish to skim this chapter as kind of a refresher of rarely used information. The purpose of...increased, by economic reason, so must supply. Basically, when prices are high the market will drive the availability of new resources 5 through

  17. Translations on Eastern Europe, Scientific Affairs, Number 537

    DTIC Science & Technology

    1977-03-07

    Security Class (This Report) UNCLASSIFIED 20. Security Class (This Page UNCLASSIFIED 21. No. of Pages 22. Price KORM N riS-:i5 1R17.V...the new five-year plan too, the rapid.and secure development of industry is tied directly to the expansion of the mineral extracting and processing... cybernetic aspects supplied those foundations for generalizations and possibilities of abstraction, which the individual sciences needed. Not until

  18. Foundational Security Principles for Medical Application Platforms* (Extended Abstract)

    PubMed Central

    Vasserman, Eugene Y.; Hatcliff, John

    2014-01-01

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

  19. A security architecture for health information networks.

    PubMed

    Kailar, Rajashekar; Muralidhar, Vinod

    2007-10-11

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.

  20. A Security Architecture for Health Information Networks

    PubMed Central

    Kailar, Rajashekar

    2007-01-01

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862

  1. Water Quality Conditions at Tributary Projects in the Omaha District: 2006 Annual Report

    DTIC Science & Technology

    2007-12-01

    ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...14 2.3.3 Plankton

  2. A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks

    DTIC Science & Technology

    2001-01-01

    00-00-2001 to 00-00-2001 4. TITLE AND SUBTITLE A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Netowrks 5a. CONTRACT NUMBER...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE

  3. Modelling a Network of Decision Makers

    DTIC Science & Technology

    2004-06-01

    DATES COVERED 00-00-2004 to 00-00-2004 4. TITLE AND SUBTITLE Modelling a Netowrk of Decision Makers (Briefing Charts) 5a. CONTRACT NUMBER 5b...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 31 19a

  4. Stability, Security, Transition and Reconstruction Operations: Turning Policy and Strategic Initiatives Into Operational Level Action

    DTIC Science & Technology

    2006-05-16

    LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Chairman, JMO Dept a. REPORT UNCLASSIFIED b . ABSTRACT UNCLASSIFIED...Mann, Sloan., Bajraktari , Yiber., Karam, Patricia. Donor Activities and Civil Society Potential in Iraq. Special Report 124, United States

  5. 75 FR 75453 - Proposed Information Collection; Comment Request; Technical Data Letter of Explanation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Request; Technical Data Letter of Explanation AGENCY: Bureau of Industry and Security. ACTION: Notice....gov . SUPPLEMENTARY INFORMATION: I. Abstract These technical data letters of explanation will assure the Bureau of Industry and Security that U.S.-origin technical data will be exported only for...

  6. 78 FR 69099 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0033... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency... 089-17, RCPT Membership List. Abstract: The RCPGP is an important tool among a comprehensive set of...

  7. Challenges on the epidemiological and economic burden of diabetes and hypertension in Mexico

    PubMed Central

    Arredondo, Armando; Orozco, Emanuel; Alcalde-Rabanal, Jaqueline; Navarro, Juan; Azar, Alejandra

    2018-01-01

    ABSTRACT OBJECTIVE To analyze the epidemiological and economic burden of the health services demand due to diabetes and hypertension in Mexico. METHODS Evaluation study based on a time series study that had as a universe of study the assured and uninsured population that demands health services from the three main institutions of the Health System in Mexico: The Health Department, the Mexican Institute of Social Security, and Institute of Services and Social Security for State Workers. The financing method was based on instrumentation and consensus techniques for medium case management. In order to estimate the epidemiological changes and financial requirements, a time series of observed cases for diabetes and hypertension 1994–2013 was integrated. Probabilistic models were developed based on the Box-Jenkins technique for the period of 2013–2018 with 95% confidence intervals and p < 0.05. RESULTS Comparing results from 2013 versus 2018, in the five regions, different incremental trends of 14%–17% in epidemiological changes and 58%-66% in the economic burden for both diseases were observed. CONCLUSIONS If the risk factors and the different models of care remained as they currently are in the three institutions analyzed, the financial consequences would be of greater impact for the Mexican Institute of Social Security, following in order of importance the Institute of Services and Social Security for State Workers and lastly the Health Department. The financial needs for both diseases will represent approximately 13%–15% of the total budget allocated to the uninsured population and 15%–17% for the population insured depending on the region. PMID:29489993

  8. Romania and the New Cold War Security Challenges

    DTIC Science & Technology

    2017-06-09

    social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic , political...and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The

  9. 78 FR 31989 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing of Proposed Rule Change and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... course of the two challenge months, satisfy the requirements described above for receiving assignment of... Qualified Security, the assignment of Qualified Securities to a Group will be based on factors that include... become the LMM for such Qualified Security, it may initiate a challenge by notifying the Exchange of its...

  10. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  11. Non-Cr Paint Systems on Commercial Aircraft - Current Status and Future Direction

    DTIC Science & Technology

    2014-11-01

    have been used on all metal parts, including aluminum, titanium, and stainless steel alloys. Over 75% of the plane is coated with chromated...Sustainable Surface Engineering for Aerospace and Defense, 18-20 Nov 2014, Fort Myer, VA. 14. ABSTRACT 15 . SUBJECT TERMS 16. SECURITY CLASSIFICATION...OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT

  12. Context Aware Middleware Architectures: Survey and Challenges

    PubMed Central

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988

  13. Web Services Security - Implementation and Evaluation Issues

    NASA Astrophysics Data System (ADS)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  14. Examining Long Term Climate Related Security Risks through the Use of Gaming and Scenario Planning

    DTIC Science & Technology

    2016-10-24

    114 Examining Long-Term Climate-Related Security Risks through the Use of Gaming and Scenario Planning Catherine M. Schkoda, Shawna G. Cuan, and...E. D. McGrady Abstract: This paper examines four possible climate change-related security risks that emerged from an international game and scenario...potential for an emerging disparity between regions over the consensus and control of climate change-related technologies. Keywords: gaming , scenario

  15. The Regulation of International Coercion: Legal Authorities and Political Constraints

    DTIC Science & Technology

    2005-10-01

    16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 158 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...humanitarian crises that may come before the UN, if unanimity among the five permanent members of the Security Council continues to be a requirement. Only the...United Kingdom, Belgium, and Germany, among the NATO participants, have directly addressed the matter and found that the authorization of the Security

  16. Homeland Security: A Selected Bibliography

    DTIC Science & Technology

    2011-04-01

    ProQuest Witzleb, Robert W., and Scott C . Truver. "Not Just a Bad Hair Day." [underwater mines] Proceedings: U.S. Naval Institute 134, no. 10...SAR) 18. NUMBER OF PAGES 35 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified...IP_15_09_MigrationAndBorderSecurity.pdf Haddal, Chad C . Border Security: Key Agencies and Their Missions. Washington, DC: Library of Congress, Congressional Research Service

  17. The Dynamic Community of Interest and Its Realization in ZODIAC

    DTIC Science & Technology

    2009-10-01

    the ZODIAC project. ZODIAC is a network architecture that puts security first and foremost, with security broken down into confidentiality, integrity...hosts, a unified solution for MANETs will work for hosts or routers as well. DYNAMIC COMMUNITIES OF INTEREST The basis of the ZODIAC design is a new dis...narrow scope of each DCoI limits attack propagation, and supports confidentiality ABSTRACT The ZODIAC project has been exploring a security first

  18. Economy Over Security: Why Crises Fail to Impact Economic Behavior in East Asia

    DTIC Science & Technology

    2017-12-01

    SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST ASIA by Aaron R. Sipos December 2017 Thesis Advisor: Michael Glosny Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ECONOMY OVER SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST...release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) This study examines changes in economic behavior in

  19. Isolation of Signaling Molecules Involved in Angiogenic Pathways Mediated Alpha v Integrins

    DTIC Science & Technology

    2004-05-01

    67 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMITATION OF ABSTRACT OF REPORT OF THIS PAGE... comparison to the controls (Figure 7C). Penetratin or the VVISYSMPD peptide alone were used as negative controls and had no effect under identical...A., O’Connor, W., King , K., Overholser, J., Hooper, A., Pytowski, B., Witte, L. et al., 1999. Antivascular endothelial growth factor receptor (fetal

  20. Army Communicator. Volume 28, Number 1, Spring 2003

    DTIC Science & Technology

    2003-01-01

    SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 72 19a. NAME OF RESPONSIBLE PERSON ...does business to meet these requirements and the growing expectations from the president and his staff for instantaneous, global, secure , reliable and...by COL Tim Gibson Do you have access to a secure Internet-protocol router network terminal on a regular basis? If you answered yes, you’re wrong

  1. Evaluation of the Efficiency of Liquid Cooling Garments using a Thermal Manikin

    DTIC Science & Technology

    2005-05-01

    temperatures. The software also calculates thermal resistances and evaporative resistances. TM tests were run dry (i.e. no sweating ) and wet (i.e...REPORT DOCUMENTATION PAGE Form ApprovedOMB No . 0704-0188 SECURITY CLASSIFICATION OF REPORT SECURITY CLASSIFICATION OF THIS PAGE SECURITY CLASSIFICATION...OF ABSTRACT 8. M05-17 1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE EVALUATION OF THE EFFICIENCY OF LIQUID COOLING GARMENTS USING A THERMAL

  2. Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists

    PubMed Central

    Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin

    2017-01-01

    Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774

  3. Dynamic Red Queen Explains Patterns in Fatal Insurgent Attacks

    DTIC Science & Technology

    2011-03-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 25 19a. NAME OF RESPONSIBLE PERSON a. REPORT...2010) 3. R.D. Sagarin, Natural Security : A Darwinian Approach to a Dangerous World, Eds. R. Sagarin and T. Taylor, (Univ. California Press, 2009), p...American Security , Washington, 2010) 17. A. Cho, Science, 325, 406 (2009) 18. A. Guttfraind, Studies in Conflict and Terrorism, 32, 45 (2009) 19

  4. Strategic Paralysis: An Airpower Theory for the Present

    DTIC Science & Technology

    1992-05-01

    Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Control as: �The role that encompasses all actions taken to secure and control the aerospace environment and to deny the use of that environment to the...destruction is to damage one�s own future prosperity, and, by sowing the seeds of revenge, to jeopardize one�s future security .�48 This is a hauntingly

  5. Resource Allocation: The Department of Defense’s Achielle’s Heel

    DTIC Science & Technology

    2003-05-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 68 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...reorganization was The National Security Act of 1947 (NSA), the first major reorganization following WWII. The NSA was the result of compromise between...1935.4 Though amended several times, the Isolationist view of the war ended in 1941 at Pearl Harbor. The National Security Act Of 1947

  6. Practical challenges in quantum key distribution

    DOE PAGES

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...

    2016-11-08

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  7. Practical challenges in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  8. MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned

    NASA Technical Reports Server (NTRS)

    Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran

    2014-01-01

    As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.

  9. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  10. 32 CFR 2700.14 - Challenges to classification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.14 Challenges to classification. If holders of classified information believe the information is improperly or unnecessarily... the OMSN Information Security Oversight Committee, established pursuant to § 2700.51. Action on such...

  11. Identification of Tumor Suppressor Genes by Genetic and Epigenetic Genome-Scanning

    DTIC Science & Technology

    2008-04-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U...oncogene-related sequences in human neuroblastomas. Cell 35: 359-67; 1983. 3. Capon, D. J.; Seeburg, P. H.; McGrath, J. P.; Hayflick , J. S.; Edman

  12. The Effects of Combat Exposure on Reenlistment and Attrition

    DTIC Science & Technology

    2011-03-01

    confounded with the job assignment, but the amount of bias should be minimal given that most people would stay within their trained specialty. C...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed...CONCLUSIONS ............................................................................................87 B. STUDY LIMITATIONS

  13. 76 FR 51472 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-18

    ... CUBES. Form: PD F 1832 E. Abstract: Used to certify assignments of U.S. registered definitive securities. Affected Public: Individuals or Households. Estimated Total Burden Hours: 1,250. OMB Number: 1535-0113... Consent with Respect to United States Savings Bond/Notes. Form: PD F 1849 E. Abstract: Used to obtain a...

  14. 78 FR 60998 - Proposed Collection: Information Collection Surrounding the Sale and Issue of Marketable Book...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-02

    ... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...

  15. Unlocking the Power of Big Data at the National Institutes of Health

    PubMed Central

    Coakley, Meghan F.; Leerkes, Maarten R.; Barnett, Jason; Gabrielian, Andrei E.; Noble, Karlynn; Weber, M. Nick

    2013-01-01

    Abstract The era of “big data” presents immense opportunities for scientific discovery and technological progress, with the potential to have enormous impact on research and development in the public sector. In order to capitalize on these benefits, there are significant challenges to overcome in data analytics. The National Institute of Allergy and Infectious Diseases held a symposium entitled “Data Science: Unlocking the Power of Big Data” to create a forum for big data experts to present and share some of the creative and innovative methods to gleaning valuable knowledge from an overwhelming flood of biological data. A significant investment in infrastructure and tool development, along with more and better-trained data scientists, may facilitate methods for assimilation of data and machine learning, to overcome obstacles such as data security, data cleaning, and data integration. PMID:27442200

  16. Security Challenges in the Gulf of Guinea Sub-Region: Strategy for Nigeria

    DTIC Science & Technology

    2008-06-01

    Gas Fisheries Defense of Shipping Data Sea Power Functioning Ecosystem Nation-States Pollution & Misuse Criminal Activities Poaching ...region, these increased activities have created challenging security issues including increased piracy, poaching , terrorism, militant youth activities... impact its economic, social and political development. Also, the GoG’s vast sea area presents great challenges to the Nigerian nation and the

  17. A Review of Equation of State Models, Chemical Equilibrium Calculations and CERV Code Requirements for SHS Detonation Modelling

    DTIC Science & Technology

    2009-10-01

    parameters for a large number of species. These authors provide many sample calculations with the JCZS database incorporated in CHEETAH 2.0, including...FORM (highest classification of Title, Abstract, Keywords) DOCUMENT CONTROL DATA (Security classification of title, body of abstract and...CLASSIFICATION OF FORM 13. ABSTRACT (a brief and factual summary of the document. It may also appear elsewhere in the body of the document itself

  18. Boundary‐spanning actors in complex adaptive governance systems: The case of multisectoral nutrition

    PubMed Central

    Gervais, Suzanne; Hafeez‐ur‐Rehman, Hajra; Sanou, Dia; Tumwine, Jackson

    2017-01-01

    Abstract A growing literature highlights complexity of policy implementation and governance in global health and argues that the processes and outcomes of policies could be improved by explicitly taking this complexity into account. Yet there is a paucity of studies exploring how this can be achieved in everyday practice. This study documents the strategies, tactics, and challenges of boundary‐spanning actors working in 4 Sub‐Saharan Africa countries who supported the implementation of multisectoral nutrition as part of the African Nutrition Security Partnership in Burkina Faso, Mali, Ethiopia, and Uganda. Three action researchers were posted to these countries during the final 2 years of the project to help the government and its partners implement multisectoral nutrition and document the lessons. Prospective data were collected through participant observation, end‐line semistructured interviews, and document analysis. All 4 countries made significant progress despite a wide range of challenges at the individual, organizational, and system levels. The boundary‐spanning actors and their collaborators deployed a wide range of strategies but faced significant challenges in playing these unconventional roles. The study concludes that, under the right conditions, intentional boundary spanning can be a feasible and acceptable practice within a multisectoral, complex adaptive system in low‐ and middle‐income countries. PMID:29024002

  19. Commercial Training Device Requirement (CTDR) for Initial Entry Rotary Wing (IERW) Aviation Training Helicopter

    DTIC Science & Technology

    1989-12-24

    training; 16 . PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...to be leased is 205. One hundred aircraft will be VFR aircraft only. One hundred and five aircraft will be instrument flight rules ( IFR ) certified, 55...of which will be IFR equipped. The other IFR -certified aircraft will be visual flight rules equipped. c. The total lease cost is based on an assumed

  20. The Molecular Epidemiology of Breast Cancer: Risk from Environmental Exposures and Genetic Susceptibility.

    DTIC Science & Technology

    1996-10-01

    Diet 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE...approach, Frank et al. (1993) compared DDE and PCB residues in the general diet with blood levels of Ontario residents. Blood samples were obtained from...sources of PCBs and HCB in this geographical region. In a similar study, Kashyap et al. (1994) monitored DDT levels in duplicate diet samples and

  1. All the World’s a Stage

    DTIC Science & Technology

    1994-01-01

    Wodf , 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS...then there was a knock on the rickety aluminum door of the trailer. She got up and put on the faded rose-colored terry cloth robe and slippers she had...Summer 1990, p. 2. 20. Dennis M. Drew, "How Television Shapes Foreign Policy ," AirFore.. Mime, November 29, 1993, p. 39. 21. Peter Brock, "Dateline

  2. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    DTIC Science & Technology

    2017-02-12

    group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research

  3. The Effects of Evaluation and Production Blocking on the Performance of Brainstorming Groups

    DTIC Science & Technology

    1992-08-01

    NUMBER OF PAGES 701 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LMIITATION OF ABSTRACT OF...special interest group. Once again, the people in the above examples share many things in common such as a sense of civil duty, an employer, a love for a...people respond differently in the presence of others, a phenomenon Zajonc refers to as compresence . In group settings, social facilitation can be

  4. Managing business compliance using model-driven security management

    NASA Astrophysics Data System (ADS)

    Lang, Ulrich; Schreiner, Rudolf

    Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.

  5. Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

    ERIC Educational Resources Information Center

    Reddy, Dinesh Sampangirama

    2017-01-01

    Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…

  6. Methodological challenges in qualitative content analysis: A discussion paper.

    PubMed

    Graneheim, Ulla H; Lindgren, Britt-Marie; Lundman, Berit

    2017-09-01

    This discussion paper is aimed to map content analysis in the qualitative paradigm and explore common methodological challenges. We discuss phenomenological descriptions of manifest content and hermeneutical interpretations of latent content. We demonstrate inductive, deductive, and abductive approaches to qualitative content analysis, and elaborate on the level of abstraction and degree of interpretation used in constructing categories, descriptive themes, and themes of meaning. With increased abstraction and interpretation comes an increased challenge to demonstrate the credibility and authenticity of the analysis. A key issue is to show the logic in how categories and themes are abstracted, interpreted, and connected to the aim and to each other. Qualitative content analysis is an autonomous method and can be used at varying levels of abstraction and interpretation. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Guidelines for Network Security in the Learning Environment.

    ERIC Educational Resources Information Center

    Littman, Marlyn Kemper

    1996-01-01

    Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)

  8. Proof Compression and the Mobius PCC Architecture for Embedded Devices

    NASA Technical Reports Server (NTRS)

    Jensen, Thomas

    2009-01-01

    The EU Mobius project has been concerned with the security of Java applications, and of mobile devices such as smart phones that execute such applications. In this talk, I'll give a brief overview of the results obtained on on-device checking of various security-related program properties. I'll then describe in more detail how the concept of certified abstract interpretation and abstraction-carrying code can be applied to polyhedral-based analysis of Java byte code in order to verify properties pertaining to the usage of resources of a down-loaded application. Particular emphasis has been on finding ways of reducing the size of the certificates that accompany a piece of code.

  9. Cyber security challenges in Smart Cities: Safety, security and privacy

    PubMed Central

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  10. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  11. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    PubMed

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  12. Security Planning and Policies to Meet the Challenges of Climate Change

    DTIC Science & Technology

    2010-07-01

    Security Climate change poses challenges to societies and governments that go far beyond the alteration of our environment. The physical impacts of...capacity of governments to respond. In this sense, the growing likelihood of events such as mass migrations, crop failures, economic shocks, public...riots and violence, floods and other natural disasters, widespread epidemics, and competition for resources pose serious challenges for governments and

  13. Systematic Characterization of the Molecular Mechanisms That Regulate and Mediate Alternative Lengthening of Telomeres in Breast Carcinoma

    DTIC Science & Technology

    2015-06-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U c... 18 Other achievements...nuclear expression at the protein level. A similar correlation between ATRX and ALT activity was also found in pediatric glioblastomas (10

  14. Behavioral Analysis of Physical Security Job Analyses. Volume 1.

    DTIC Science & Technology

    1980-10-01

    Job Analyses Personnel Reliability Program Junior Officers Physical Security Morale Motivation 20. ABSTRACT (Continue an reverese ode It neceearly and...internal motivation factors. Assignment of some auxiliary duties to enlisted personnel is possibly conducive to lowered efficiency in physical...subordinates; scheduling pressures; operational alerts and emergencies; relative lack of extrinsic rewards; constant necessity to prove credibility and

  15. DARKDROID: Exposing the Dark Side of Android Marketplaces

    DTIC Science & Technology

    2016-06-01

    Moreover, our approaches can detect apps containing both intentional and unintentional vulnerabilities, such as unsafe code loading mechanisms and...Security, Static Analysis, Dynamic Analysis, Malware Detection , Vulnerability Scanning 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...applications in a DoD context. ................... 1 1.2.2 Develop sophisticated whole-system static analyses to detect malicious Android applications

  16. Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection

    NASA Astrophysics Data System (ADS)

    Wu, Raymond; Seki, Keisuke; Sakamoto, Ryusuke; Hisada, Masayuki

    Web security became an alert in internet computing. To cope with ever-rising security complexity, semantic analysis is proposed to fill-in the gap that the current approaches fail to commit. Conventional methods limit their focus to the physical source codes instead of the abstraction of semantics. It bypasses new types of vulnerability and causes tremendous business loss.

  17. Hardware Based Function Level Mandatory Access Control for Memory Structures

    DTIC Science & Technology

    2008-04-01

    tagging 16. SECURITY CLASSIFICATION OF: 19a. NAME OF RESPONSIBLE PERSON Lok Kwong Yan a. REPORT U b . ABSTRACT U c. THIS PAGE U 17. LIMITATION...www.phrack.org/issues.html?issue=58&id=4#article [13] Suh, G. E., Lee, J. W., Zhang, D., and Devadas , S. “Secure program execution via dynamic information

  18. System and Network Security Acronyms and Abbreviations

    DTIC Science & Technology

    2009-09-01

    hazards of electromagnetic radiation to fuel HERO hazards of electromagnetic radiation to ordnance HERP hazards of electromagnetic ...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 System and Network Security Acronyms...authentication and key management ALG application layer gateway ANSI American National Standards Institute AP access point API application

  19. Overcoming the Challenges of Unstructured Data in Multisite, Electronic Medical Record-based Abstraction.

    PubMed

    Polnaszek, Brock; Gilmore-Bykovskyi, Andrea; Hovanes, Melissa; Roiland, Rachel; Ferguson, Patrick; Brown, Roger; Kind, Amy J H

    2016-10-01

    Unstructured data encountered during retrospective electronic medical record (EMR) abstraction has routinely been identified as challenging to reliably abstract, as these data are often recorded as free text, without limitations to format or structure. There is increased interest in reliably abstracting this type of data given its prominent role in care coordination and communication, yet limited methodological guidance exists. As standard abstraction approaches resulted in substandard data reliability for unstructured data elements collected as part of a multisite, retrospective EMR study of hospital discharge communication quality, our goal was to develop, apply and examine the utility of a phase-based approach to reliably abstract unstructured data. This approach is examined using the specific example of discharge communication for warfarin management. We adopted a "fit-for-use" framework to guide the development and evaluation of abstraction methods using a 4-step, phase-based approach including (1) team building; (2) identification of challenges; (3) adaptation of abstraction methods; and (4) systematic data quality monitoring. Unstructured data elements were the focus of this study, including elements communicating steps in warfarin management (eg, warfarin initiation) and medical follow-up (eg, timeframe for follow-up). After implementation of the phase-based approach, interrater reliability for all unstructured data elements demonstrated κ's of ≥0.89-an average increase of +0.25 for each unstructured data element. As compared with standard abstraction methodologies, this phase-based approach was more time intensive, but did markedly increase abstraction reliability for unstructured data elements within multisite EMR documentation.

  20. Challenges and Security in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Chang, Hyokyung; Choi, Euiin

    People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.

  1. Application Security Automation

    ERIC Educational Resources Information Center

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  2. Finalizing the Dtag: implementation and testing of design improvements for reliability and availability

    DTIC Science & Technology

    2016-10-14

    ABSTRACT DTAGs have proven to be a valuable tool for the study of marine mammal acoustics and fine scale motion. The success of the DTAG has resulted in...Underwater Acoustics , Digital Communications 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT u u u...continuously monitor and improve the tag design.\\ OBJECTIVES Dtags have proven to be a valuable tool for the study of marine mammal acoustics and fine

  3. The FBI is Leading the Way by Making the Private Sector an Integral Part of the Counterterrorism Homeland Security Enterprise

    DTIC Science & Technology

    2012-09-01

    Pentagon, U.S. National Parks and Monuments and Reagan National Airport. Amidst the PCC sits Pentagon City Mall, home to more than 170 stores, a movie...integrated into the homeland security apparatus. As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the...Advisor Dan Moran, PhD Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This thesis

  4. Ideas, Concepts, Doctrine: Basic Thinking in the United States Air Force, 1907-1960. Volume 1

    DTIC Science & Technology

    1989-12-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 684 19a. NAME OF RESPONSIBLE PERSON a. REPORT...reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and...lecture have been cleared with the lecturer, even though they may have been unclassified as to military security . To a man these lecturers have been

  5. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  6. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  7. Insider Threat Security Reference Architecture

    DTIC Science & Technology

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  8. Security Certification Challenges in a Cloud Computing Delivery Model

    DTIC Science & Technology

    2010-04-27

    Relevant Security Standards, Certifications, and Guidance  NIST SP 800 series  ISO /IEC 27001 framework  Cloud Security Alliance  Statement of...CSA Domains / Cloud Features ISO 27001 Cloud Service Provider Responsibility Government Agency Responsibility Analyze Security gaps Compensating

  9. AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges

    DTIC Science & Technology

    2002-07-25

    circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify

  10. Threats to US energy security: the challenge of Arab oil

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.

    1979-08-13

    Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.

  11. Aviation Security: Efforts to Measure Effectiveness and Address Challenges

    DTIC Science & Technology

    2003-11-05

    AND SUBTITLE AVIATION SECURITY Efforts to Meassure Effectiveness and Address Challenges 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...screeners in becoming more adept at detecting hard -to-spot threat objects. However, TIP was shut down immediately following the September 11

  12. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    PubMed

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  13. Transnational Security Challenges in Southeast Aisa: The Need for Multinational Military Cooperation and Coordination in ASEAN

    DTIC Science & Technology

    2014-12-12

    and military doctrines , all contribute to slowing down the process of military integration in Southeast Asia. This thesis will argue for the...prevented Cambodia from playing a more constructive part in the ASEAN security stage. Indonesia, an archipelagic state with a thousand islands, is the...second largest archipelagic state in Southeast Asia, faces many security challenges. As a “typhoon-torn” country, it will benefit from a stronger

  14. 46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information Security...

  15. Climate challenges, vulnerabilities, and food security

    PubMed Central

    Nelson, Margaret C.; Ingram, Scott E.; Dugmore, Andrew J.; Streeter, Richard; Peeples, Matthew A.; McGovern, Thomas H.; Hegmon, Michelle; Arneborg, Jette; Brewington, Seth; Spielmann, Katherine A.; Simpson, Ian A.; Strawhacker, Colleen; Comeau, Laura E. L.; Torvinen, Andrea; Madsen, Christian K.; Hambrecht, George; Smiarowski, Konrad

    2016-01-01

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017

  16. Climate challenges, vulnerabilities, and food security.

    PubMed

    Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad

    2016-01-12

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.

  17. Toward Assessing Attachment on an Emotional Security Continuum: Comment on Fraley and Spieker (2003).

    ERIC Educational Resources Information Center

    Cummings, E. Mark

    2003-01-01

    Advocates renewed efforts toward assessing attachment on a single continuum of emotional security. Contends that theory is essential to guide attachment assessment and that the constructs of secure base and emotional security provide the needed conceptual foundation. Addresses challenges to the scoring of attachment on a security continuum.…

  18. Security Metrics: A Solution in Search of a Problem

    ERIC Educational Resources Information Center

    Rosenblatt, Joel

    2008-01-01

    Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…

  19. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.

    PubMed

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-09-28

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.

  20. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model

    PubMed Central

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-01-01

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042

  1. Adaptive Instructional Systems

    DTIC Science & Technology

    2005-09-01

    Research Institute for the Behavior and Social Sciences 20050928 000 Approved for public release; distribution is unlimited. REPORT DOCUMENTATION PAGE...ADDRESS(ES) 10. MONITOR ACRONYM U. S. Army Research Institute for the Behavioral & Social ARI Sciences ATTN Rotary Wing Aviation Research Unit 11...Training Technology SECURITY CLASSIFICATION OF 19. LIMITATION OF 20. NUMBER 21. RESPONSIBLE PERSON ABSTRACT OF PAGES 16. REPORT 17. ABSTRACT 18. THIS

  2. Former Spencer Artillery Range, Tennessee Classification Demonstration Open Field and Dynamic Areas

    DTIC Science & Technology

    2016-01-01

    DEMONSTRATION REPORT Former Spencer Artillery Range, Tennessee Classification Demonstration Open Field and Dynamic Areas ESTCP...AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c. THIS PAGE 17...2016 Technical Report N/A Former Spencer Artillery Range, Tennessee Classification Demonstration Open Field and Dynamic Areas Richard MacNeil, USA

  3. The Future of Phosphorus for Food Security: Making Media to Recover the Nutrient from Water (abstract)

    EPA Science Inventory

    The abstract is only allowed to be 500 words maximum and is supposed to represent the theme of the conference so I am focusing my information more on the background of why phosphorus is important to recovery then giving a little less detail on the material I've made for this purp...

  4. Downstream on the Mekong: Contrasting Cambodian and Vietnamese Responses to Chinese Water Control

    DTIC Science & Technology

    2017-06-01

    Barma Co-Advisor: Michael Malley THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev... form balancing coalitions against their stronger competitors.37 34 Alexander L. Vuving, “Vietnam in

  5. Cooperative Autonomous Robots for Reconnaissance

    DTIC Science & Technology

    2009-03-06

    REPORT Cooperative Autonomous Robots for Reconnaissance 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Collaborating mobile robots equipped with WiFi ...Cooperative Autonomous Robots for Reconnaissance Report Title ABSTRACT Collaborating mobile robots equipped with WiFi transceivers are configured as a mobile...equipped with WiFi transceivers are configured as a mobile ad-hoc network. Algorithms are developed to take advantage of the distributed processing

  6. New Therapies for Fibrofatty Infiltration

    DTIC Science & Technology

    2017-08-01

    14. ABSTRACT The goal of this project is to test three classes of compounds in animal models of muscular dystrophy, and evaluate their therapeutic...inhibitor compound to be tested in animal models of disease, as a more efficacious drug was identified with similar substrate specificity. 15...SUBJECT TERMS Fibrofatty infiltration, drug testing , muscular dystrophy, fibrosis. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER

  7. Educating Normal Breast Mucosa to Prevent Breast Cancer

    DTIC Science & Technology

    2013-05-01

    REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average...cells 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U...b. ABSTRACT U c. THIS PAGE U UU 19b. TELEPHONE NUMBER (include area code) Table of Contents Page

  8. Polymerization of a Quinone-Crosslinked Marine Bioadhesive

    DTIC Science & Technology

    1989-10-01

    with type II collagen, essentially shielding the latter from digestion by clostridial collagenase. No such shielding was conferred by the Fasciola ...been characterized from Fasciola hepatica. 20. DISTRIBUTION /iAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSiFICATION 0UNCLASSIFIED/UNLIMITED 0...collagen. Moreover, the digestion of collagen by collagenase is undeterred by vitelline protein B, a DOPA-containing protein from Fasciola hepatica (Waite

  9. Explorations on Just War: Has It Ever Existed?

    DTIC Science & Technology

    2006-06-01

    II . C. WORLD WAR II Pope Pius XII, in an address to the United Nations in 1952, said “The enormous violence of modern warfare means that...to the global community, Pope John Paul II cited “conscience of humanity and international humanity law” and claimed that nations and the...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UL ii

  10. Using Artificial Physics to Control Agents

    DTIC Science & Technology

    1999-11-01

    unlimited 13. SUPPLEMENTARY NOTES IEEE International Conference on Information, Intelligence, and Systems, Oct 31 -Nov 3,1999. Bethesda, MD 14. ABSTRACT...distributed control can also perform distributed computation. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...1995. [9] H. Pattee. Artificial life needs a real epistemology. In Moran, Moreno, Merelo, and Chacon , editors, Advances in Artificial Life, pages

  11. Combatting Inherent Vulnerabilities of CFAR Algorithms and a New Robust CFAR Design

    DTIC Science & Technology

    1993-09-01

    elements of any automatic radar system. Unfortunately, CFAR systems are inherently vulnerable to degradation caused by large clutter edges, multiple ...edges, multiple targets, and electronic countermeasures (ECM) environments. 20 Distribution, Availability of Abstract 21 Abstract Security...inherently vulnerable to degradation caused by large clutter edges, multiple targets and jamming environments. This thesis presents eight popular and studied

  12. SURVIVABILITY THROUGH OPTIMIZING RESILIENT MECHANISMS (STORM)

    DTIC Science & Technology

    2017-04-01

    STATEMENT Approved for Public Release; Distribution Unlimited. PA# 88ABW-2017-0894 Date Cleared: 07 Mar 2017 13. SUPPLEMENTARY NOTES 14. ABSTRACT Game ...quantitatively about cyber-attacks. Game theory is the branch of applied mathematics that formalizes strategic interaction among intelligent rational agents...mechanism based on game theory. This work has applied game theory to numerous cyber security problems: cloud security, cyber threat information sharing

  13. Radiological Dispersal Devices: Select Issues in Consequence Management

    DTIC Science & Technology

    2004-12-07

    STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Surveying the Security Risks, Center for Nonproliferation Studies, Monterey Institute of International Studies, January 2003; Anthony H. Cordesman...the radiation-exposure-related damage itself. For example, the DOD uses granisetron , an anti-vomiting drug, to allow soldiers to complete mission

  14. Evaluating the Generality and Limits of Blind Return-Oriented Programming Attacks

    DTIC Science & Technology

    2015-12-01

    consider a recently proposed information disclosure vulnerability called blind return-oriented programming (BROP). Under certain conditions, this...implementation disclosure attacks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF...Science iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT We consider a recently proposed information disclosure vulnerability called blind return

  15. Ultra-Dense Quantum Communication Using Integrated Photonic Architecture: First Annual Report

    DTIC Science & Technology

    2011-08-24

    REPORT Ultra-Dense Quantum Communication Using Integrated Photonic Architecture: First Annual Report 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: The...goal of this program is to establish a fundamental information-theoretic understand of quantum secure communication and to devise a practical...scalable implementation of quantum key distribution protocols in an integrated photonic architecture. We report our progress on experimental and

  16. Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security

    DTIC Science & Technology

    2011-01-01

    OS level, Flume [22] has even been shown to be information flow secure through abstractions such as processes, pipes, file systems etc, while seL4 ...Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4 : formal verification of an

  17. Simultaneous Inversion of UXO Parameters and Background Response

    DTIC Science & Technology

    2012-03-01

    11. SUPPLEMENTARY NO TES 12a. DISTRIBUTION/AVAILABILITY STATEMENT Unclassified/Unlimited 12b. DISTRIBUTIO N CODE 13. ABSTRACT (Maximum 200...demonstrated an ability to accurate recover dipole parameters using the simultaneous inversion method. Numerical modeling code for solving Maxwell’s...magnetics 15. NUMBER O F PAGES 160 16. PRICE CODE 17. SECURITY CLASSIFICATIO N OF REPORT Unclassified 18. SECURITY

  18. Making Technology Work for Campus Security

    ERIC Educational Resources Information Center

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  19. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    DOT National Transportation Integrated Search

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  20. Overcoming the Challenges of Unstructured Data in Multi-site, Electronic Medical Record-based Abstraction

    PubMed Central

    Polnaszek, Brock; Gilmore-Bykovskyi, Andrea; Hovanes, Melissa; Roiland, Rachel; Ferguson, Patrick; Brown, Roger; Kind, Amy JH

    2014-01-01

    Background Unstructured data encountered during retrospective electronic medical record (EMR) abstraction has routinely been identified as challenging to reliably abstract, as this data is often recorded as free text, without limitations to format or structure. There is increased interest in reliably abstracting this type of data given its prominent role in care coordination and communication, yet limited methodological guidance exists. Objective As standard abstraction approaches resulted in sub-standard data reliability for unstructured data elements collected as part of a multi-site, retrospective EMR study of hospital discharge communication quality, our goal was to develop, apply and examine the utility of a phase-based approach to reliably abstract unstructured data. This approach is examined using the specific example of discharge communication for warfarin management. Research Design We adopted a “fit-for-use” framework to guide the development and evaluation of abstraction methods using a four step, phase-based approach including (1) team building, (2) identification of challenges, (3) adaptation of abstraction methods, and (4) systematic data quality monitoring. Measures Unstructured data elements were the focus of this study, including elements communicating steps in warfarin management (e.g., warfarin initiation) and medical follow-up (e.g., timeframe for follow-up). Results After implementation of the phase-based approach, inter-rater reliability for all unstructured data elements demonstrated kappas of ≥ 0.89 -- an average increase of + 0.25 for each unstructured data element. Conclusions As compared to standard abstraction methodologies, this phase-based approach was more time intensive, but did markedly increase abstraction reliability for unstructured data elements within multi-site EMR documentation. PMID:27624585

  1. The human qualities needed to complete the global eradication of polio

    PubMed Central

    2013-01-01

    Abstract Although the 99% decrease seen in global polio incidence between 1988 and 2000 represented remarkable progress towards polio eradication, tackling the last 1% of polio has proved tantalizingly difficult. Pockets of endemic transmission currently persist both on the border between Afghanistan and Pakistan and in northern Nigeria. These pockets have permitted the reinfection of countries that were previously polio-free. Global strategic plans for polio eradication set out the activities, resources and financing needed to overcome the managerial, technical and security challenges faced by those tasked with the interruption of poliovirus transmission. However, polio eradication also depends on the less tangible but equally important human qualities of energy, realism, articulacy, determination, imagination, collaboration, adaptability, tactical awareness, innovation, openness and nimbleness (the initial letters of which give the acronym “ERADICATION”). By paying attention to these human qualities, the stakeholders involved may be more likely to achieve global polio eradication. PMID:23599552

  2. Efficient Authorization of Rich Presence Using Secure and Composed Web Services

    NASA Astrophysics Data System (ADS)

    Li, Li; Chou, Wu

    This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.

  3. Formal Abstraction in Engineering Education--Challenges and Technology Support

    ERIC Educational Resources Information Center

    Neuper, Walther A.

    2017-01-01

    This is a position paper in the field of Engineering Education, which is at the very beginning in Europe. It relates challenges in the new field to the emerging technology of (Computer) Theorem Proving (TP). Experience shows, that "teaching" abstract models, for instance the wave equation in mechanical engineering and in electrical…

  4. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    PubMed

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  5. Risks and responses to universal drinking water security.

    PubMed

    Hope, Robert; Rouse, Michael

    2013-11-13

    Risks to universal drinking water security are accelerating due to rapid demographic, climate and economic change. Policy responses are slow, uneven and largely inadequate to address the nature and scale of the global challenges. The challenges relate both to maintaining water security in increasingly fragile supply systems and to accelerating reliable access to the hundreds of millions who remain water-insecure. A conceptual framework illustrates the relationship between institutional, operational and financial risks and drinking water security outcomes. We apply the framework to nine case studies from rural and urban contexts in South Asia and sub-Saharan Africa. Case studies are purposively selected based on established and emerging examples of political, technological or institutional reforms that address water security risks. We find broad evidence that improved information flows reduce institutional costs and promote stronger and more transparent operational performance to increase financial sustainability. However, political barriers need to be overcome in all cases through internal or external interventions that require often decadal time frames and catalytic investments. No single model exists, though there is sufficient evidence to demonstrate that risks to drinking water security can be reduced even in the most difficult and challenging contexts.

  6. Information Technology Challenges Facing the Strategic Leaders of Homeland Security in the 21st Century

    DTIC Science & Technology

    2004-05-03

    A special thanks to all of these folks (Glenn Starnes, Lee Gutierrez, Bill Rapp, Joel Hillison, Carlos Gomez, Steve Fraunfelter, Janie Hopkins, Dave ...DiClemente, Joe Nunez, John Bonin , and Steve Nerheim). viii INFORMATION TECHNOLOGY CHALLENGES FACING THE STRATEGIC LEADERS OF HOMELAND SECURITY IN THE 21ST

  7. Abstraction networks for terminologies: Supporting management of "big knowledge".

    PubMed

    Halper, Michael; Gu, Huanying; Perl, Yehoshua; Ochs, Christopher

    2015-05-01

    Terminologies and terminological systems have assumed important roles in many medical information processing environments, giving rise to the "big knowledge" challenge when terminological content comprises tens of thousands to millions of concepts arranged in a tangled web of relationships. Use and maintenance of knowledge structures on that scale can be daunting. The notion of abstraction network is presented as a means of facilitating the usability, comprehensibility, visualization, and quality assurance of terminologies. An abstraction network overlays a terminology's underlying network structure at a higher level of abstraction. In particular, it provides a more compact view of the terminology's content, avoiding the display of minutiae. General abstraction network characteristics are discussed. Moreover, the notion of meta-abstraction network, existing at an even higher level of abstraction than a typical abstraction network, is described for cases where even the abstraction network itself represents a case of "big knowledge." Various features in the design of abstraction networks are demonstrated in a methodological survey of some existing abstraction networks previously developed and deployed for a variety of terminologies. The applicability of the general abstraction-network framework is shown through use-cases of various terminologies, including the Systematized Nomenclature of Medicine - Clinical Terms (SNOMED CT), the Medical Entities Dictionary (MED), and the Unified Medical Language System (UMLS). Important characteristics of the surveyed abstraction networks are provided, e.g., the magnitude of the respective size reduction referred to as the abstraction ratio. Specific benefits of these alternative terminology-network views, particularly their use in terminology quality assurance, are discussed. Examples of meta-abstraction networks are presented. The "big knowledge" challenge constitutes the use and maintenance of terminological structures that comprise tens of thousands to millions of concepts and their attendant complexity. The notion of abstraction network has been introduced as a tool in helping to overcome this challenge, thus enhancing the usefulness of terminologies. Abstraction networks have been shown to be applicable to a variety of existing biomedical terminologies, and these alternative structural views hold promise for future expanded use with additional terminologies. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  9. Ethical challenges in cluster randomized controlled trials: experiences from public health interventions in Africa and Asia

    PubMed Central

    Azad, Kishwar; Fernandez, Armida; Manandhar, Dharma S; Mwansambo, Charles W; Tripathy, Prasanta; Costello, Anthony M

    2009-01-01

    Abstract Public health interventions usually operate at the level of groups rather than individuals, and cluster randomized controlled trials (RCTs) are one means of evaluating their effectiveness. Using examples from six such trials in Bangladesh, India, Malawi and Nepal, we discuss our experience of the ethical issues that arise in their conduct. We set cluster RCTs in the broader context of public health research, highlighting debates about the need to reconcile individual autonomy with the common good and about the ethics of public health research in low-income settings in general. After a brief introduction to cluster RCTs, we discuss particular challenges we have faced. These include the nature of – and responsibility for – group consent, and the need for consent by individuals within groups to intervention and data collection. We discuss the timing of consent in relation to the implementation of public health strategies, and the problem of securing ethical review and approval in a complex domain. Finally, we consider the debate about benefits to control groups and the standard of care that they should receive, and the issue of post-trial adoption of the intervention under test. PMID:19876544

  10. The Terry-Wiseman Security Policy Model and Examples of Its Use

    DTIC Science & Technology

    1990-03-01

    Wiseman Security Policy Model and Examples of Its Use Author: C L Harrold Date: March 1990 Abstract This paper presents a model of security for computer ...Evolution of the Model 7. Summary and References Annex: An Overviev , of the Z N-,,tion Ace5sston For N?.1S (tRA&1DTIC TM-, [ U mr, ),inced El ,v l I...a computer . The files, objects or register locations in which the information may be stored are modelled by the black boxes. The robots model the

  11. 76 FR 49503 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Airport Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0002, abstracted below that we will submit to OMB for renewal in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. These programs require airport operators to maintain and update records to ensure compliance with security provisions outlined in 49 CFR part 1542.

  12. FINLIE: A FORTRAN Program for Fitting Ordinary Differential Equations with Nonlinear Parameters to Data

    DTIC Science & Technology

    1981-02-01

    8217 manwfacoturer. ’Pim in thl rv.-.opt deea it -wnetitid. indordeme’t of any coowacioL prodwt. _UNjr L S.A~qT F FnD SECURITY CLASSIFICATION OF THIS PAGE tjPY...SIFICATION OF THIS PIGE (Uh1¶ Dat. Ent.,ed) [INNCLARSsIFTTD SECURITY CLASSIFICATION OF THIS PAOE(Iha, Datea Diersd 20. ABSTRACT (Continued): one experiment...value of any parameter or initial condition can be held fixed or adjusted by FINLIE. UNCLASSIFIED SECURITY CLASSIFICATION OF’ THIS PAGE(W7h.n Data

  13. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  14. Microstructural Evolution in Friction Stir Welding of Ti-5111

    DTIC Science & Technology

    2010-08-01

    titanium and titanium aluminide alloys—an overview.” Materials Science and Engineering A243 (1998) 1-24 [Semiatin 1999] S.L. Semiatin, V...ABSTRACT Titanium and titanium alloys have shown excellent mechanical, physical, and corrosion properties. To address the needs of future naval...Texture; Phase Transformation Ti-5111 Titanium 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 174 19a

  15. Rapid Equipping Force (REF) Analytical Support

    DTIC Science & Technology

    2007-06-01

    document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 44...interface and performs actions via Excel formulae, ActiveX controls, and VBA code. – Plan to provide both simple and complex weighting and scoring methods...Requirements Quad Chart. –Solution Set Information Worksheet: A spreadsheet containing detailed information concerning every potential solution considered

  16. Legacy System Engineering, VPERC Consortium

    DTIC Science & Technology

    2009-09-01

    REPORT Legacy System Engineering, VPERC Consortium, Final Report, University of Utah for Work Ending Joly 15, 2009. 14. ABSTRACT 16. SECURITY...Engineering, VPERC Consortium, Final Report, University of Utah for Work Ending Joly 15, 2009. Report Title ABSTRACT This paper is one of three...Sons, 1995. [3] Turner MJ, Clough RW, Martin HC, Topp LJ. “Stiffness and deflection analysis of complex structures.” Journal of the Aeronautical

  17. Computer Modeling and Optimization of OBOGS with Contaminants

    DTIC Science & Technology

    1988-02-15

    respect to system parameters such as cycle time and bed and valve dimensions. _-- 20. DISTRIBUTION /AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY...schematic (Solenoid valves are numbered 1 to 4 from the top) ..................................................... 46 Figure 12: Dual bed apparatus...most basic continuous PSA system is shown in Figure 1. Here a switching valve imposes supply pressure on Bed #1 and exhaust pressure on Bed #2. As the

  18. Radiation Induced Vaccination to Breast Cancer

    DTIC Science & Technology

    2016-12-01

    in supporting a memory CD8 T cell response and decreased MDSCs but in reality the small patient numbers and the relatively short survival times...ABSTRACT Inhibiting TGFβ in the context of focal irradiation seems to create a favorable systemic immune landscape that drives T cell memory ...differentiation while limiting myeloid suppression. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES

  19. The Servicemembers Civil Relief Act (P.L. 108-189)

    DTIC Science & Technology

    2004-04-20

    Remedies 22 Inappropriate use of the Act 22 Certification 22 Interlocutory orders 22 VII Further Relief 22 Anticipatory relief 22 Extension of power of...distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER...that has been subject to differing interpretations by courts and modifies or expands certain benefits The SCRA provides protections for

  20. Design Methodology for Automated Construction Machines

    DTIC Science & Technology

    1987-12-11

    along with the design of a pair of machines which automate framework installation.-,, 20. DISTRIBUTION IAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY... Development Assistant Professor of Civil Engineering and Laura A . Demsetz, David H. Levy, Bruce Schena Graduate Research Assistants December 11, 1987 U.S...are discussed along with the design of a pair of machines which automate framework installation. Preliminary analysis and testing indicate that these

  1. Cloning Components of Human Telomerase.

    DTIC Science & Technology

    1998-07-01

    absent, and the cells are unable to double further. Somatic cells have a limited replicative capacity ( Hayflick 1961), and the lack of telomerase... Hayflick limit (Bodnar et al. 1998). Immortal cells must have a method of maintaining telomeres, and indeed it has been found that immortalized cell lines...THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 15. NUMBER OF PAGES 12 16. PRICE CODE 20. LIMITATION OF ABSTRACT

  2. Optimized Granularity Analysis of Maximum Power Point Trackers in Low Power Applications

    DTIC Science & Technology

    2017-06-01

    Second Reader: Robert Ashton THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...5  Figure 2.  Germanium Atoms Sharing Outermost Shell Electrons That Form Covalent Bonds. Source: [6

  3. The Uzbekistan Kyrgyzstan Border: Institutional Legitimacy and Regional Stability

    DTIC Science & Technology

    2017-06-01

    Advisor: David Yost THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...this thesis analyzes the subjective forms of border legitimacy and obedience in relation to local perceptions and social behavior. While scholarly

  4. Passive Sensor Materials Based on Liquid Crystals

    DTIC Science & Technology

    2011-03-12

    REPORT Passive Sensor Materials based on Liquid Crystals 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Research supported by this grant entitled “Passive...Sensor Materials Based on Liquid Crystals” revolved around an investigation of liquid crystalline materials for use in passive sensors for chemical... based on Liquid Crystals Report Title ABSTRACT Research supported by this grant entitled “Passive Sensor Materials Based on Liquid Crystals” revolved

  5. Navigating between Scylla and Charybdis: The Odyssean Leader in a Complex Environment

    DTIC Science & Technology

    2008-10-21

    of action capable of being shared across the organization). See also David A. Kolb , Experiential Learning : Experience as the Source of Learning ...Army GHQ Maneuvers of 1941. Washington D.C.: United States Army Center of Military History, 1991. Kolb , David A. Experiential Learning : Experience...ABSTRACT See Abstract 15. SUBJECT TERMS Leadership, organizational design, complexity, organizational theory , learning organization 16. SECURITY

  6. Sharpening Our Plowshares: Applying the Lessons of Counterinsurgency to Development and Humanitarian Aid

    DTIC Science & Technology

    2013-01-01

    ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...the US Agency for International Development [USAID] or the military) have distributed the aid, the results have been disappointing.10 Individual

  7. Educating Normal Breast Mucosa to Prevent Breast Cancer

    DTIC Science & Technology

    2014-05-01

    REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to...immunization, T cells 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a...REPORT U b. ABSTRACT U c. THIS PAGE U UU 23 19b. TELEPHONE NUMBER (include area code) Table of Contents

  8. Mechanical Properties of Polymers Used for Anatomical Components in the Warrior Injury Assessment Manikin (WIAMan) Technology Demonstrator

    DTIC Science & Technology

    2016-07-01

    14. ABSTRACT The Warrior Injury Assessment Manikin was developed to provide an instrumented anthropomorphic test device (ATD) specifically...underbody blasts . To achieve that goal, the ATD used numerous polymeric materials for component parts that simulate human tissue and enable compliance in...strain rate, underbody blast , mechanical testing, tension, compression 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  9. Simulation Learning PC Screen-Based vs. High Fidelity

    DTIC Science & Technology

    2011-08-01

    D., Burgess, L., Berg, B . and Connolly, K . (2009). Teaching mass casualty triage skills using iterative multimanikin simulations. Prehospital...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b . ABSTRACT U...learning PC screen-based vs. high fidelity – progress chart Attachment B . Approved Protocol - Simulation Learning: PC-Screen Based (PCSB) versus High

  10. The National Shipbuilding Reseaerch Program, Proceedings of the IREAPS Technical Symposium, Paper No. 8: Modern Ship Repair Technology Applied to Naval Vessels (The National Shipbuilding Research Program)

    DTIC Science & Technology

    1982-09-01

    ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 20 19a. NAME OF RESPONSIBLE...progressed; and, on netowrks of a higher level. This feature enables the user to reschedule work as the situation changes. Moreover, impact of late

  11. Molecular Dynamics Simulations of Surface Processes: Oxygen Recombination on Silica Surfaces at High Temperature

    DTIC Science & Technology

    2007-07-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18 . NUMBER OF PAGES 22 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 Molecular Dynamics Simulations of Surface...phase. O + Oad + silica -------> O2(v,j) + silica ( 18 ) The first step is

  12. A Digital Radio Receiver for Ionospheric Research

    DTIC Science & Technology

    2006-06-01

    amplification, the signals are digitized and then processed by a digital down converter ( DDC ) and decimating low-pass filter. The resultant digital...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 41 19a. NAME OF...the University of Calgary under a Contributions Agreement contract awarded by the Canadian Space Agency. The present paper follows an earlier article

  13. Sino-African Relationship: Its Implications on U.S. National Security Interests

    DTIC Science & Technology

    2017-03-20

    AIR WAR COLLEGE AIR UNIVERSITY SINO-AFRICAN RELATIONSHIP : ITS IMPLICATIONS ON U.S. NATIONAL SECURITY INTERESTS by Kimberly S. Vinson... Management Apprentice after graduating from tech school, but converted to a Personnel Apprentice in 1998. Chief Vinson has been assigned to bases in...Maryland, South Korea, Germany, Nevada, Italy, New Mexico, Ohio, South Dakota, and Texas. iv Abstract The Sino-African relationship has

  14. A Joint Force Medical Command is Required to Fix Combat Casualty Care

    DTIC Science & Technology

    2017-10-05

    that poses an operations security risk. Author: ☒ PA: ☒ 13. SUPPLEMENTARY NOTES Word Count: 10,665 14. ABSTRACT The Military Health System...15. SUBJECT TERMS Military Health System, Joint Trauma System, Defense Health Agency, PROFIS 16. SECURITY CLASSIFICATION OF: 17...The Military Health System (MHS) is required to provide medical operational forces for military and contingency operations while also providing

  15. Maritime Cyber Security University Research

    DTIC Science & Technology

    2016-05-01

    traffic so vital to the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously...Abstract (MAXIMUM 200 WORDS) Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping...integrity of the entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime

  16. Cloning and Characterization of a Cell Senescence Gene for Breast Cancer Cells

    DTIC Science & Technology

    2004-07-01

    have already established the inducible expression system in a retroviral vector for these studies. F. References 1. Hayflick , L. (1965). The limited ...CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OFABSTRACT Unclassified...13-14 Annual report A. Introduction Normal diploid mammalian cells display a limited proliferative life span in culture (1-3

  17. Mobile Tracking and Location Awareness in Disaster Relief and Humanitarian Assistance Situations

    DTIC Science & Technology

    2012-09-01

    establishing mobile ad - hoc networks. Smartphones also have accelerometers that are used to detect any motion by the device. Furthermore, almost every...AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words...Picture, Situational Awareness 15. NUMBER OF PAGES 55 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY

  18. U.S.-Egypt Security Cooperation after Egypt’s January 2011 Revolution

    DTIC Science & Technology

    2011-12-01

    SECURITY CLASSIFICATION OF: (U) 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 70 19a. NAME OF RESPONSIBLE PERSON Thomas C. Graves COL, U.S...Monograph Director Scott Gorman, Ph.D. ___________________________________ Director, Thomas C. Graves, COL, IN School of Advanced Military...a broad network of dairy farms, milk processing facilities, cattle feed lots, poultry farms, and fish farms. The military produced eighteen percent

  19. Illicit Drug Trade-Impact on United States National Health Care

    DTIC Science & Technology

    2013-03-01

    pobreza en Mexico sube a 52 milliones,” CNN Expansion, July 29, 2011, http://www.cnnexpansion.com/ economia /2011/07/29/pobreza- mexico -2010 (accessed...Unlimited. 13. SUPPLEMENTARY NOTES Word Count: 5,569 14. ABSTRACT The United States and Mexico face a myriad of threats to national security...Policy Classification: Unclassified The United States and Mexico face a myriad of threats to national security

  20. Energy Security: Emerging Challenges and Opportunities

    DTIC Science & Technology

    2010-08-01

    46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy

  1. Challenges and Responses to Asian Food Security

    NASA Astrophysics Data System (ADS)

    Teng, Paul P. S.; Oliveros, Jurise A. P.

    2015-10-01

    Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.

  2. BIGCHEM: Challenges and Opportunities for Big Data Analysis in Chemistry

    PubMed Central

    Engkvist, Ola; Koch, Uwe; Reymond, Jean‐Louis; Chen, Hongming

    2016-01-01

    Abstract The increasing volume of biomedical data in chemistry and life sciences requires the development of new methods and approaches for their handling. Here, we briefly discuss some challenges and opportunities of this fast growing area of research with a focus on those to be addressed within the BIGCHEM project. The article starts with a brief description of some available resources for “Big Data” in chemistry and a discussion of the importance of data quality. We then discuss challenges with visualization of millions of compounds by combining chemical and biological data, the expectations from mining the “Big Data” using advanced machine‐learning methods, and their applications in polypharmacology prediction and target de‐convolution in phenotypic screening. We show that the efficient exploration of billions of molecules requires the development of smart strategies. We also address the issue of secure information sharing without disclosing chemical structures, which is critical to enable bi‐party or multi‐party data sharing. Data sharing is important in the context of the recent trend of “open innovation” in pharmaceutical industry, which has led to not only more information sharing among academics and pharma industries but also the so‐called “precompetitive” collaboration between pharma companies. At the end we highlight the importance of education in “Big Data” for further progress of this area. PMID:27464907

  3. Israel security in the 21st century: Risks and opportunities. Research report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eisenkot, G.

    Unlike the United States which publicizes its national security strategy and national military strategy in official public documents, Israel, does not produce such documents for the general public. This may appear paradoxical in that the State of Israel, from its very inception, has invested enormous energy in its security. Nevertheless, Israel has no detailed security doctrine approved and updated by the Cabinet, the Knesset (Israel`s parliament) or the General Staff. The lack of an official, published, security doctrine does not imply that Israel lacks a coherent political and military strategy based on doctrine-like concepts. Israel`s political and military successes aremore » proof to the contrary. Our purpose, then, is to identify a number of the critical Security Principles that have shaped Israeli strategy. This will provide us the foundation for our main discussion which is the risks and challenges to Israeli security in the 21st century and possible responses to those challenges.« less

  4. Implementing Maternal Death Surveillance and Response in Kenya: Incremental Progress and Lessons Learned

    PubMed Central

    Smith, Helen; Ameh, Charles; Godia, Pamela; Maua, Judith; Bartilol, Kigen; Amoth, Patrick; Mathai, Matthews; van den Broek, Nynke

    2017-01-01

    ABSTRACT Maternal death surveillance and response (MDSR) constitutes a quality improvement approach to identify how many maternal deaths occur, what the underlying causes of death and associated factors are, and how to implement actions to reduce the number of preventable stillbirths and maternal and neonatal deaths. This requires a coordinated approach, ensuring both national- and district-level stakeholders are enabled and supported and can implement MDSR in a “no name, no blame” environment. This field action report from Kenya provides an example of how MDSR can be implemented in a “real-life” setting by summarizing the experiences and challenges faced thus far by maternal death assessors and Ministry of Health representatives in implementing MDSR. Strong national leadership via a coordinating secretariat has worked well in Kenya. However, several challenges were encountered including underreporting of data, difficulties with reviewing the data, and suboptimal aggregation of data on cause of death. To ensure progress toward a full national enquiry of all maternal deaths, we recommend improving the notification of maternal deaths, ensuring regular audits and feedback at referral hospitals lead to continuous quality improvement, and strengthening community linkages with health facilities to expedite maternal death reporting. Ultimately, both a top-down and bottom-up approach is needed to ensure success of an MDSR system. Perinatal death surveillance and response is planned as a next phase of MDSR implementation in Kenya. To ensure the process continues to evolve into a full national enquiry of all maternal deaths, we recommend securing longer-term budget allocation and financial commitment from the ministry, securing a national legal framework for MDSR, and improving processes at the subnational level. PMID:28963171

  5. Honduran-U.S. Relations

    DTIC Science & Technology

    2010-11-30

    legislature should help the government secure approval of its policy agenda, the political crisis left the new President with daunting challenges...The Lobo government faces significant challenges in fostering economic development in one of the hemisphere’s poorest countries; securing...indicators. The government has little room to address these issues as the country’s fiscal balance has deteriorated in recent years despite benefiting

  6. Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack

    NASA Astrophysics Data System (ADS)

    Nikolopoulos, Georgios M.

    2018-01-01

    We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.

  7. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges

    PubMed Central

    Curiac, Daniel-Ioan

    2016-01-01

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601

  8. Common Capabilities for Trust and Security in Service Oriented Infrastructures

    NASA Astrophysics Data System (ADS)

    Brossard, David; Colombo, Maurizio

    In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.

  9. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  10. The Secure Medical Research Workspace: An IT Infrastructure to Enable Secure Research on Clinical Data

    PubMed Central

    Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.

    2013-01-01

    Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029

  11. Boltzmann Transport in Hybrid PIC HET Modeling

    DTIC Science & Technology

    2015-07-01

    Paper 3. DATES COVERED (From - To) July 2015-July 2015 4. TITLE AND SUBTITLE Boltzmann transport in hybrid PIC HET modeling 5a. CONTRACT NUMBER In...reproduce experimentally observed mobility trends derived from HPHall, a workhorse hybrid- PIC HET simulation code. 15. SUBJECT TERMS 16. SECURITY...CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Justin Koo a. REPORT Unclassified b. ABSTRACT

  12. Learning and Olfaction: Understanding and Enhancing a Critical Information Channel

    DTIC Science & Technology

    2013-05-13

    a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a ...REPORT Learning and Olfaction: Understanding and Enhancing a Critical Information Channel 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: This research...Prescribed by ANSI Std. Z39.18 - 14-Feb-2013 Learning and Olfaction: Understanding and Enhancing a Critical Information Channel Report Title ABSTRACT This

  13. Molecular Determinants of Radioresponse in Prostate Cancer

    DTIC Science & Technology

    2002-08-01

    SECURITY CLASSIFICATION OF ABSTRACT Unclassified 15. NUMBER OF PAGES 72 16. PRICE CODE 20. LIMITATION OF ABSTRACT Unlimited Standard Form...irradiated LNCaP cells; right panel, irradiated RAT-1 HO 15.19 positive control cells (magnification lOOOx); (b) Time course of IR-induced apoptosis... right ) at 5 days post-irradiation following doses of OGy (control, mock- irradiated), 2Gy and lOGy. Shown is a representative experiment with total cell

  14. Alcohol-to-Jet (ATJ) Fuel Blending Study

    DTIC Science & Technology

    2015-09-01

    distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT The U.S. Army sought to study the effect of blending highly iso-paraffinic ATJ blending...stock into JP-8 in order to understand the effect ATJ fuel blends will have on ground vehicle engines and support equipment. This subtask under Work... Synthetic Fuel, JP-8, diesel engine, combustion 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF

  15. Spring 2004 Industry Study: Space Industry

    DTIC Science & Technology

    2004-01-01

    a heavier spacecraft mass direct to geostationary orbit or place a payload into a higher perigee. The Sea Launch web site is located at http...NOTES The original document contains color images . 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...other people, the citizens of the U.S. rely on the commercial space sector for their way of life. Remote sensing by optical, radar and infrared

  16. Development of a Ballistic Impact Detection System

    DTIC Science & Technology

    2004-09-01

    body surface remains the largest variable to overcome. The snug fit of the body amour stabilizes the sensors and their response . The data from the...estimated to average 1 hour per response , including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 22 19a. NAME OF RESPONSIBLE PERSON

  17. Molecular Basis of Essential Thrombocytosis

    DTIC Science & Technology

    2006-06-01

    penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR...intact protein synthetic capabilities, remarkably little is known about platelet mRNAs. The pathogenesis of essential thrombocytosis (ET), a disease of...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a . REPORT U b. ABSTRACT U

  18. Intelligence Spending: Public Disclosure Issues

    DTIC Science & Technology

    2006-09-25

    would have affirmed the Court of Appeals holding that the taxpayer had standing to sue. 54 418 U.S. at 179. Judicial Interpretation Further insight may...court lacked jurisdiction over an interlocutory appeal of a district court order granting the CIA’s summary judgment motion on plaintiff’s FOIA...unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES

  19. A Critical Review of Options for Tool and Workpiece Sensing

    DTIC Science & Technology

    1989-06-02

    Tool Temperature Control ." International Machine Tool Design Res., Vol. 7, pp. 465-75, 1967. 5. Cook, N. H., Subramanian, K., and Basile, S. A...if necessury and identify by block riumber) FIELD GROUP SUB-GROUP 1. Detectors 3. Control Equipment 1 08 2. Sensor Characteristics 4. Process Control ...will provide conceptual designs and recommend a system (Continued) 20. DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION 0

  20. Identification and Validation of PTEN Complex, Associated Proteins

    DTIC Science & Technology

    2006-11-01

    Signal Transduction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC...a. REPORT U b. ABSTRACT U c. THIS PAGE U UU 18 19b. TELEPHONE NUMBER (include area code) Standard Form 298 (Rev. 8-98) Prescribed...nonsense, frame-shift, deletion or insertion mutations, (reviewed in [14]) are observed in prostate cancer, as well as in endometrial cancer, glioblastoma

  1. Study of the Effects of Drugs upon the Cardiovascular and Respiratory Systems

    DTIC Science & Technology

    1986-06-01

    ed. The C.V. Mosby Company, St . Louis, 1971. Spence, 3.T., Underwood, B.3., Duncan, C.P., and Cotton, J.W. Elementary Statistics. Appleton- Century ...I.I)" ,,,- 20. DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 . ABSTRACT SECURITY CLASSIFICATION C3 UNCLASSIFIED/UNLIMITED 0 SAME AS RPT. - OTIC USERS...50, resistance units - -. ° ! U { {{{{{{ {{{{{{{{{{{{{{{ { {{{{ I {{{ {{{{ { {{{{{{ {{{{{{{ {{{{{ 21 3. Calibration of the Buxco Data Logger Model DL

  2. Chemotherapy Necessitates Increased Immune Control of HHVs: A Cause of Persistent Inflammation Enabling Protracted Fatigue in Breast Cancer Survivors

    DTIC Science & Technology

    2014-10-01

    14. ABSTRACT This work hypothesizes that chemotherapy can permanently alter the balance between the immune system and chronic herpes virus...infections. We predicted that herpes virus-driven inflammatory cytokines exacerbate cancer treatment related fatigue (CTRF). Here we report the significant...TERMS breast cancer, chemotherapy, immunology, human herpes viruses, survivor fatigue 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  3. Iraq Reconstruction: Time for a Plan

    DTIC Science & Technology

    2004-05-03

    Long Time Coming.” 9 September 2003. Available from <https:// webmail .us.army.mil/frame.html?rtfPossible=true&lang=en>. Internet. Accessed 11 September...22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply...unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT See attached file. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  4. Time of Flight Estimation in the Presence of Outliers: A Biosonar-Inspired Machine Learning Approach

    DTIC Science & Technology

    2013-08-29

    REPORT Time of Flight Estimation in the Presence of Outliers: A biosonar -inspired machine learning approach 14. ABSTRACT 16. SECURITY CLASSIFICATION OF...installations, biosonar , remote sensing, sonar resolution, sonar accuracy, sonar energy consumption Nathan Intrator, Leon N Cooper Brown University...Presence of Outliers: A biosonar -inspired machine learning approach Report Title ABSTRACT When the Signal-to-Noise Ratio (SNR) falls below a certain

  5. Alpena, Michigan. Revised Uniform Summary of Surface Weather Observations. Parts A-F.

    DTIC Science & Technology

    1987-10-01

    Rpoirt, Nober: USAFETACDS-87/059. 5. *mitorma Organization Report Nuber: USAIETAC/DS-87/059. Ga. Obaf of Performin Oranization: USAFETAC/OL-A Sb. Office...description of contents and Instructions for ue.- 20 DistrIbutieel/vmilability of Abstract: Same as report . 21 Abstract Security Clasalficatiem...large, or by the Defense Technical Information Center (DTIC) to the National Technical Information Service (NTIS). This document has been reviewed and

  6. Design and Analysis of a Hydrogen Compression and Storage Station

    DTIC Science & Technology

    2017-12-01

    Holmes THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...than fossil fuels [2]. Renewably generated hydrogen gas, such as the hydrogen station demonstrated at NPS, falls into this category of alternative

  7. Phase Zero Contracting for U.S. Arctic National Security

    DTIC Science & Technology

    2017-06-01

    THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of...CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std...north and west of the boundary formed by the Porcupine, Yukon, and Kuskokwim Rivers; all contiguous seas, including the Arctic Ocean and the

  8. Saving Green: How the DoD Can Better Manage Energy Efficiency Initiatives

    DTIC Science & Technology

    2017-12-01

    Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...project adoption within the DOD. An abbreviated literature review is nested within the presentation of each hypothesis. These hypotheses form the

  9. Phytoremediation of Atmospheric Methane

    DTIC Science & Technology

    2013-04-15

    REPORT Phytoremediation of Atmospheric Methane 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: We have transformed a plant, Arabidopsis thaliana, with the...298 (Rev 8/98) Prescribed by ANSI Std. Z39.18 - 31-Mar-2012 Phytoremediation of Atmospheric Methane Report Title ABSTRACT We have transformed a...DD882) Scientific Progress See attachment Technology Transfer 1    Final Report for DARPA project W911NF1010027  Phytoremediation  of Atmospheric

  10. Bid Protests on DoD Source Selections

    DTIC Science & Technology

    2017-06-13

    values, Government Accountability Office 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT OF...Logistics (AT&L) closely monitors the Government Accountability Office (GAO) Bid Protest statistics for trends. These statistics combined with our trend...large protests are removed, there was still a slight trend since FY 2006 but it disappears if measured since 2009. Also, if we remove the 23 large

  11. Mechanism of Cytotoxicity of the AIDS Virus, HTLV-III/LAV

    DTIC Science & Technology

    1990-06-25

    AIDS) and associated diseases . Studies of related viruses , simian inmunodeficiency virus (SIV) and HIV-1, complement these studies and allow additional...envelope alterations in inmune evasion and tissue tropism. 20 DISTRIBUTIONIAVAILASILITY OF ABSTRACT j21 ABSTRACT SECURITY CLASSIFICATION O- UNCLASSIFMI...the pathogenesis of HIV-1 infections in vivo, and to the development of vaccines for this disease . It is clear that HIV-l’s are a heterogeneous

  12. Blind Ambitions and Political Rhetoric: Why We Need a New Drug Strategy

    DTIC Science & Technology

    1992-03-31

    Andean countries. Their movement to other areas creates violence as they attempt to traffick in others’ territories. Violence and expansion efforts can...impossible to effectively control any one area . If supply sources are damaged at all, treatment facili- ties have not been expanded to handle the...consumption, violence and the social ills which cause them. 20. DISTRIBUTION/ AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION fl#10

  13. Exfoliation and Reassembly of Cobalt Oxide Nanosheets into a Reversible Lithium-Ion Battery Cathode

    DTIC Science & Technology

    2012-01-01

    REPORT Exfoliation and Reassembly of Cobalt Oxide Nanosheets into a Reversible Lithium-Ion Battery Cathode 14. ABSTRACT 16. SECURITY CLASSIFICATION OF...battery fabrication, cobalt oxide Owen C. Compton, Ali Abouimrane, Zhi An, Marc J. Palmeri, L. Catherine Brinson, Khalil Amine, SonBinh T. Nguyen...Exfoliation and Reassembly of Cobalt Oxide Nanosheets into a Reversible Lithium-Ion Battery Cathode Report Title ABSTRACT An exfoliation–reassembly

  14. Silicon/Carbon Anodes with One-Dimensional Pore Structure for Lithium-Ion Batteries

    DTIC Science & Technology

    2012-02-28

    REPORT Silicon/Carbon Anodes with One-Dimensional Pore Structure for Lithium - Ion Batteries 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: A series of...Dimensional Pore Structure for Lithium - Ion Batteries Report Title ABSTRACT A series of composite electrode materials have been synthesized and...1 Silicon/Carbon Anodes with One-Dimensional Pore Structure for Lithium - Ion Batteries Grant # W911NF1110231 Annual Progress report June

  15. Maximizing PTH Anabolic Osteoporosis Therapy

    DTIC Science & Technology

    2015-09-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U c...normalization or endogenous controls and calculates fold 263 changes with P values. Gene expression data were normalized to five endogenous controls ( 18S ...adapters were ligated and the sample was size-fractionated (200-300 bp) on an agarose gel. After a final 294 PCR amplification step ( 18 cycles), the

  16. Angiogenic Signaling in Living Breast Tumor Models

    DTIC Science & Technology

    2006-06-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U c ...convection versus diffusion in transport out of a tumor vessel during steady state conditions. C . Determine relative contribution of convection...on the results of the diffusion/convection measurements. Consequently, implicit in Tasks 1b and c (the use of MPFRAP in vivo) is the establishment

  17. War Termination: A Theater CINCs Responsibility

    DTIC Science & Technology

    1997-01-01

    response , including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 13 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...Ternzznatzon of War, (Santa Momca The Rand Corporation , 1976) quoted in Bruce C Bade, War Termznatzon lvhy Don ‘t We Plan For It7 (Wash, DC National

  18. Modeling of Mechanical Properties of Advanced Nanostructured Ceramic Composites

    DTIC Science & Technology

    2010-03-15

    of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently...nucleation of nanograins near crack tips and its role as a special toughening mechanism in ceramic nanocomposites; (vii) generation of nanoscale tracks at...mechanical properties 16. SECURITY CLASSIFICATION OF : a . REPORT b. ABSTRACT c. THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES

  19. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    EPA Pesticide Factsheets

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  20. Improving the Automated Detection and Analysis of Secure Coding Violations

    DTIC Science & Technology

    2014-06-01

    eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree

  1. Programming Retinal Stem Cells into Cone Photoreceptors

    DTIC Science & Technology

    2015-12-01

    0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response , including the time for reviewing...development. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT...PERIOD: Nothing to report. This is the final report for this award. However, using funds from philanthropic sources we have recently secured (11/2015

  2. Securing BGP Using External Security Monitors

    DTIC Science & Technology

    2006-01-01

    forms. In Proc. SOSP, Brighton , UK , Oct. 2005. [19] A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: Software-based Attestation for...Williams, E. G. Sirer, and F. B. Schnei- der. Nexus: A New Operating System for Trustwor- thy Computing (extended abstract). In Proc. SOSP, Brighton , UK ...as a distributed database of untrustworthy hosts or messages. An ESM that detects invalid behavior issues a certifi- cate describing the behavior or

  3. Balancing Social Media with Operations Security (OPSEC) in the 21st Century

    DTIC Science & Technology

    2010-05-03

    anticipated since the inception of digital media and the World Wide Web. Military personnel are equally influenced by social media and social ...FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Balancing Social Media with Operations Security (OPSEC) in the...necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The use of social media and networking sites like Facebook, MySpace, and

  4. SAFER Under Vehicle Inspection Through Video Mosaic Building

    DTIC Science & Technology

    2004-01-01

    this work were taken using a Polaris Wp-300c Lipstick video camera mounted on a mobile platform. Infrared video was taken using a Raytheon PalmIR PRO...Tank- Automotive Research, Development and Engineering Center, US Army RDECOM, Warren, Michigan, USA. Keywords Inspection, Road vehicles, State...security, Robotics Abstract The current threats to US security, both military and civilian, have led to an increased interest in the development of

  5. National Security Implications of Transnational Economic Activity

    DTIC Science & Technology

    1993-04-01

    ABSTRACT SECURITY CLASSIFICATION rUNCLASSIFIED/UNLIMITED El SAME AS RPT. O DTIC USERS Unclassified 22a. NAME OF RESPONSIBLE INDIVIDUAL 22b. TELEPHONE...Activity This paper discusses the impact of regional trading arrangements (RTA’s), multinational corporations (MNC’s), and transnational financial activity...multinational corporation investment and taxation. o The U.S. must strengthen its national economy in order to be a world class player in transnational

  6. CHIPS. Volume 27, Number 2, April-June 2009

    DTIC Science & Technology

    2009-07-01

    unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Navy Network Enterprise 9 CARS Task Force Shortens Original Timeline – Reducing the number of Navy legacy networks to improve security and save...NETWARCOM and edited from the original article published in the Winter 2008-2009 edition of Info Domain. “A plan of action and milestones (POA&M) for

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relatingmore » to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.« less

  8. Insecure Behaviors on Mobile Devices Under Stress

    DTIC Science & Technology

    2014-04-08

    a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user

  9. Analysis of the gut bacterial communities in beef cattle and their association with feed intake, growth, and efficiency

    USDA-ARS?s Scientific Manuscript database

    The impetus behind the global food security challenge is direct, with the necessity to feed over 9 billion people by 2050. Developing a food-secure world, where people have access to a safe and sustainable food supply is the principal goal of this challenge. To achieve this end, beef production ent...

  10. Options for Synthetic DNA Order Screening, Revisited.

    PubMed

    DiEuliis, Diane; Carter, Sarah R; Gronvall, Gigi Kwik

    2017-01-01

    Gene synthesis providers affiliated with the International Gene Synthesis Consortium (IGSC) voluntarily screen double-stranded DNA (dsDNA) synthesis orders over 200 bp to check for matches to regulated pathogens and to screen customers. Questions have been raised, however, about the continuing feasibility and effectiveness of screening. There are technical challenges (e.g., oligonucleotides and tracts of DNA less than 200 bp are not screened) and corporate challenges (e.g., the costs of screening are high, but other costs are dropping, so screening is an increasing portion of operating costs). In this article, we describe tangible actions that should be taken to (i) preserve the effectiveness of DNA order screening as a security tool and (ii) develop additional mechanisms to increase the safety and security of DNA synthesis technologies. Screening is not a perfect solution to DNA synthesis security challenges, but we believe it is still a valuable addition to security, and it can remain effective for some time.

  11. Security. Review Software for Advanced CHOICE. CHOICE (Challenging Options in Career Education).

    ERIC Educational Resources Information Center

    Pitts, Ilse M.; And Others

    CHOICE Security is an Apple computer game activity designed to help secondary migrant students memorize their social security numbers and reinforce job and role information presented in "Career Notes, First Applications." The learner may choose from four time options and whether to have the social security number visible on the screen or…

  12. Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur

    DOT National Transportation Integrated Search

    2010-03-17

    The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...

  13. The Threat of Security: Hindering Technology Integration in the Classroom

    ERIC Educational Resources Information Center

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  14. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  15. Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  16. 46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Interagency Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information...

  17. The African Peace and Security Architecture: Myth or Reality

    DTIC Science & Technology

    2013-03-01

    resolving the conflicts. Efforts by African leaders to create continental peace and security mechanisms failed miserably . Consequently, Africans depended...Framework Document, October 2001), 14. 6 Andre Le Sage, “Africa’s Irregular Security Threats: Challenges for U.S. Engagement,” (Strategic Forum

  18. Cryptography and the Internet: lessons and challenges

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCurley, K.S.

    1996-12-31

    The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising newmore » questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.« less

  19. Integrating security in multiple, remote, and diverse facilities: how major health systems are meeting today's and tomorrow's technological and organizational challenges.

    PubMed

    1996-11-01

    As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.

  20. Network gateway security method for enterprise Grid: a literature review

    NASA Astrophysics Data System (ADS)

    Sujarwo, A.; Tan, J.

    2017-03-01

    The computational Grid has brought big computational resources closer to scientists. It enables people to do a large computational job anytime and anywhere without any physical border anymore. However, the massive and spread of computer participants either as user or computational provider arise problems in security. The challenge is on how the security system, especially the one which filters data in the gateway could works in flexibility depends on the registered Grid participants. This paper surveys what people have done to approach this challenge, in order to find the better and new method for enterprise Grid. The findings of this paper is the dynamically controlled enterprise firewall to secure the Grid resources from unwanted connections with a new firewall controlling method and components.

  1. High Assurance Models for Secure Systems

    ERIC Educational Resources Information Center

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  2. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  3. Microelectrode Geochemical Observatory for In Situ Monitoring of Metals Concentration and Mobility in Contaminated Sediments

    DTIC Science & Technology

    2013-09-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT b. ABSTRACT c . THIS PAGE 19b. TELEPHONE...Report Microelectrode Geochemcial Observatory for In Situ Monitoring of Metals Concentration and Mobility in Contaminated Sediments N62583-11- C -0524...Representative Poor Electrochemical Scans APPENDIX B: Standard Solution Test Data APPENDIX C : Bremerton Porewater Test Data APPENDIX D: Porewater

  4. Molecular Mechanisms of Prostate Cancer Progression

    DTIC Science & Technology

    2006-01-01

    Weinberg. 1999. Inhibition of telomerase limits the growth of human cancer cells. Nat. Med. 5:1164-1170. 16. Hayflick , L. 1965. The limited in vitro...radicicol 16. SECURITY CLASSIFICATION OF: a. REPORT u b. ABSTRACT u c. THIS PAGE u 17. LIMITATION OF ABSTRACT uu 18. NUMBER OF PAGES 35...P69 nontumorigenic cells and show an increase in p23 without a concomitant increase in telomerase activity, suggesting that p23 is not limiting in

  5. Real-Time Detection of Telomerase in a Microelectromechanical Systems Platform

    DTIC Science & Technology

    2005-05-01

    contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 147 19a...Telomerase accomplishes this by alleviating the “end-replication problem” (6,10,14,23,33,43). First described by Hayflick in 1965, the end-replication...were produced to determine the minimum detection limit of the ABI Prism 7000 as an optical fluorescent detection device. In addition, I wanted to

  6. Military Tactical Aircraft Engine Noise Matching to Infrared Signatures

    DTIC Science & Technology

    2016-12-16

    Modulation,” Naval Postgraduate School MS thesis (1990). [8] Sinha, N., Ungewitter, R. J ., Kenzakowski, D. C ., and Seiner, J . M., “Gas Turbine Engine Jet...11] Harley, Jacob L., Rolling, August J ., Wisniewski, Charles F., and Gross, Kevin C ., “Spatially resolved infrared spectra of F109 turbofan exhaust...SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c . THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF

  7. Demonstration and Commercialization of the Sediment Ecosystem Assessment Protocol

    DTIC Science & Technology

    2017-01-01

    J . Hunt, B. Anderson, S. Tudor, C . Wilson, F. LaCaro, M. Stephensen, M. Puckett, and E. Long. 1996. Chemistry, toxicity and benthic community...201131. Kirtay .V, G. Rosen, M. Colvin, J . Guerrero, C . Katz, B. Chadwick, M. Grover, J . Conder, K. Fetters, V. Magar, J . T. Weidner, in prep...STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c . THIS PAGE 17. LIMITATION OF

  8. An Engineered Resupply System for Humanitarian Assistance and Disaster Relief Operations

    DTIC Science & Technology

    2017-09-01

    Alejandro S. Hernandez Co-Advisor: Susan M. Sanchez Second Reader: Mary McDonald THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form ...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...time or place. Military doctrine for HADR operations is not yet fully formed ; deliverables of the mission, scope of operations, and coordination

  9. Business Case Analysis Of Small Modular Reactors (SMR) For DOD Assured Power

    DTIC Science & Technology

    2017-12-01

    Smith Second Reader: Thomas L. Albright THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89...attack (EMP) represents one of the most devastating forms of attack on the power grid. Because the North American grid is made up of three major

  10. The Development of Ada (Trademark) Software for Secure Environments

    DTIC Science & Technology

    1986-05-23

    Telecommunications environment, This paper discusses software socurity and seeks to demostrate how the Ada programming language can be utilizec as a tool...complexity 4 . We use abstraction in our lives every day to control complexity; the principles of abstraction for software engineering are ro different...systems. These features directly sup,) )-t t.ie m odernp software engineering principles d1 s I , , 1 t, thne previous section. This is not surprising

  11. Fundamental Studies on Phase Transformations and Mechanical Properties of Fusion Welds in Advanced Naval Steels

    DTIC Science & Technology

    2017-07-31

    Studies on Phase Transformations and Mechanical Properties of Fusion Welds in Advanced Naval Steels Sb. GRANT NUMBER N00014-12-1-0475 Sc. PROGRAM...naval and structural applications. However, prior to this research project, a fundamental understanding of the phase transformation behavior under the...Steel, Phase Transformations 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER a. REPORT b.ABSTRACT c. THIS PAGE ABSTRACT OF PAGES u u

  12. Biological Environmental Arctic Project (BEAP) Preliminary Data (Arctic West Summer 1986 Cruise).

    DTIC Science & Technology

    1986-11-01

    predictive model of bioluminescence in near-surface arctic waters . Data were collected during Arctic West Summer 1986 from USCG POLAR STAR (WAGB 10). . %. J...2 20ODISTRIBUTION AVAILABILIT "Y OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION C]UNCLASSIFIED UNLIMITED SAME AS RPT C] DTIC USERS UNCLASSIFIED David...correlates for a predictive model of bioluminescence in near-surface arctic waters . - In previous years, these measurements were conducted from the USCG

  13. N-Terminal Tau Fragments as Biomarkers for Alzheimer’s Disease and Neurotrauma

    DTIC Science & Technology

    2014-10-01

    construed as an official Department of the Army position, policy or decision unless so designated by other documentation. REPORT DOCUMENTATION PAGE Form...SUBJECT TERMS- nothing listed 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a...REPORT U b. ABSTRACT U c. THIS PAGE U UU 19b. TELEPHONE NUMBER (include area code) 45 Table of Contents Page 1. Introduction

  14. A Generalized Orienteering Problem for Optimal Search and Interdiction Planning

    DTIC Science & Technology

    2013-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA DISSERTATION A GENERALIZED ORIENTEERING PROBLEM FOR OPTIMAL SEARCH AND INTERDICTION PLANNING by Jesse...provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently...16. SECURITY CLASSIFICATION OF: a . REPORT b. ABSTRACT c. THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON 19b

  15. Mouse Model for Aerosol Infection of Influenza (Postprint)

    DTIC Science & Technology

    2011-12-01

    Min, J.-Y., Lamirande, E.W., Santos, C., Jin, H., Kemble, G. and Subbarao , K . (2011) Comparison of a live attenuated 2009 H1N1 vaccine with...AFRL-RX-TY-TP-2012-0010 MOUSE MODEL FOR AEROSOL INFECTION OF INFLUENZA POSTPRINT Rashelle S. McDonald, Brian K . Heimbuch Applied Research...AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b . ABSTRACT c. THIS PAGE 17

  16. Dose-Dependent Thresholds of 10-ns Electric Pulse Induced Plasma Membrane Disruption and Cytotoxicity in Multiple Cell Lines

    DTIC Science & Technology

    2010-01-01

    Bioelectrics, Old Dominion University, Norfolk, VA 8. PERFORMING ORGANIZATION REPORT NUMBER 3 General Dynamics Inf. Tech Brooks City-Base, San... 16 . SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT U b. ABSTRACT...Sta tes of America, 2 Frank Reidy Research Center for Bioelectrics, Old Dominion University, Norfolk, Virginia, United States of America, 3 General

  17. Early Diagnosis and Intervention Strategies for Post-Traumatic Heterotopic Ossification in Severely Injured Extremities

    DTIC Science & Technology

    2013-10-01

    therapies for prevention or mitigation of HO can be optimally targeted. This study seeks to contribute to advancement in each of these key areas...NOTES 14. ABSTRACT This study will recruit wounded warriors with severe extremity trauma, which places them at high risk for heterotopic... therapies for prevention or mitigation of HO. 15. SUBJECT TERMS Wound healing 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  18. Cadmium Coating Alternatives for High- Strength Steel JTP - Phase 2

    DTIC Science & Technology

    2009-09-03

    Substrate 4130 Washer 17 - 4PH Washer CuBe Washer AlNiBr Washer Salt Spray Cyclic Salt Spray Cyclic Salt Spray Cyclic Salt Spray Cyclic No coating...2009, Westminster, CO. Sponsored by SERDP/ESTCP. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17 . LIMITATION OF ABSTRACT Same...Passed Appearance Testing U.S. AIR FORCE Primary Coating Bend Adhesion Test Results Coating Bend Adhesion Results 4130 steel substrate 17 -4 PH stainless

  19. Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable Fibers

    DTIC Science & Technology

    2005-05-01

    AD_ Award Number: DAMD17-03-1-0353 TITLE: Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable Fibers...30 Apr 2005 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable ... biodegradable fiber 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES a. REPORT b. ABSTRACT c

  20. On Specifying the Functional Design for a Protected DMS Tool

    DTIC Science & Technology

    1977-03-01

    of a secure data management system in terms of abstract entities. In keeping with this, the model identifies a security policy which is sufficient... policy of the model may be expressed, there- fore, as the rules which mediate the access of subjects to objects. The access authorization of the...level of a subject; however, this possibly is not acknowledged in our model. The specification of the DMS tool embodies this protection policy

  1. The System Engineering Approach: Taiwan Navy Incorporation of Mobile Devices (Smartphone) into Its Force Structure

    DTIC Science & Technology

    2015-06-01

    words) Attempting different approaches to explore the best practice of optimizing mobile security and productivity is necessary to improve the...INTENTIONALLY LEFT BLANK iv ABSTRACT Attempting different approaches to explore the best practice of optimizing mobile security and productivity is...incredible kindness and unfathomable generosity. I am grateful to have watched Super Bowl XLIX in your living room, washed dirty clothes in your laundry room

  2. Strengthening the Security of ESA Ground Data Systems

    NASA Astrophysics Data System (ADS)

    Flentge, Felix; Eggleston, James; Garcia Mateos, Marc

    2013-08-01

    A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.

  3. Fires. A Joint Professional Bulletin for U.S. Field and Air Defense Artillerymen. September-October 2011

    DTIC Science & Technology

    2011-10-01

    said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most

  4. Automated, Certified Program-rewriting for Software Security Enforcement

    DTIC Science & Technology

    2012-03-05

    VLC ), pages 257-260, Oak Brook, Illinois, Oc- tober 2010. [14] Aditi A. Patwardhan. Security-aware program visualization for analyz- ing in-lined...January 2010. [17] Meera Sridhar and Kevin W. Hamlen. Flexible in-lined reference moni- tor certification: Challenges and future directions. In...pages 55-60, Austin, Texas, January 2011. [18] Bhavani Thuraisingham and Kevin W. Hamlen. Challenges and future directions of software technology

  5. 33 CFR 165.T09-0073 - Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes; Cleveland, OH; Bay City, MI...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes; Cleveland, OH; Bay City, MI; Duluth, MN; Green Bay, WI; Sturgeon Bay...; Cleveland, OH; Bay City, MI; Duluth, MN; Green Bay, WI; Sturgeon Bay, WI; Chicago, IL; Erie, PA. (a...

  6. Information Leakage Analysis by Abstract Interpretation

    NASA Astrophysics Data System (ADS)

    Zanioli, Matteo; Cortesi, Agostino

    Protecting the confidentiality of information stored in a computer system or transmitted over a public network is a relevant problem in computer security. The approach of information flow analysis involves performing a static analysis of the program with the aim of proving that there will not be leaks of sensitive information. In this paper we propose a new domain that combines variable dependency analysis, based on propositional formulas, and variables' value analysis, based on polyhedra. The resulting analysis is strictly more accurate than the state of the art abstract interpretation based analyses for information leakage detection. Its modular construction allows to deal with the tradeoff between efficiency and accuracy by tuning the granularity of the abstraction and the complexity of the abstract operators.

  7. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  8. 32 CFR 1907.14 - Transmission.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...

  9. 32 CFR 1907.14 - Transmission.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...

  10. 32 CFR 1907.14 - Transmission.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...

  11. 32 CFR 1907.14 - Transmission.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...

  12. 32 CFR 1907.14 - Transmission.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... from the CIA as well as corporate or other federal agency security departments. Action on Challenges ... the holder transmit same in full accordance with established security procedures. In general...

  13. HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs

    DTIC Science & Technology

    2001-11-07

    air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts

  14. Education, Underdevelopment, Unnecessary War and Human Security in Kosovo/Kosova

    ERIC Educational Resources Information Center

    Nelles, W.

    2005-01-01

    This paper examines educational linkages to persistent conflicts and contemporary security challenges in Kosovo. It reviews some historic foundations, debates and socioeconomic contexts concerning education as a security issue. It argues that poverty and underdevelopment coupled with failed diplomacy (particularly surrounding a 1996 ''Education…

  15. The Graduate MIS Security Course: Objectives and Challenges

    ERIC Educational Resources Information Center

    Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew

    2009-01-01

    Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…

  16. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  17. Rhetorical Variation across Research Article Abstracts in Environmental Science and Applied Linguistics

    ERIC Educational Resources Information Center

    Saeeaw, Supachai; Tangkiengsirisin, Supong

    2014-01-01

    Abstract is of a pivotal genre in scientific communication, assisting not only highly selective readers with judgment of the pertinent articles but also researchers in disseminating new knowledge and intellectual discoveries. Difficult yet challenging, however, is the task of writing effective abstracts particularly among non-English speaking…

  18. Transportation security : post-September 11th initiatives and long-term challenges : statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues

    DOT National Transportation Integrated Search

    2003-04-01

    This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...

  19. Realizing Scientific Methods for Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber securitymore » science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.« less

  20. Authentication systems for securing clinical documentation workflows. A systematic literature review.

    PubMed

    Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C

    2014-01-01

    Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.

  1. Challenges in researching violence affecting health service delivery in complex security environments.

    PubMed

    Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel

    2016-08-01

    Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research collaboration among aid organizations, researchers and multilateral organizations, such as the WHO, is needed to address these challenges. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Strategic Challenges during Changing Times: A Prioritized Research Program, 1994

    DTIC Science & Technology

    1994-04-01

    and planning. 14, SUBJECT T[RMS 15 NUMBER OF PAGES strategic assessments; domestic and global issues and 5 trends; peace operations; political...1994 or which, for a variety of reasons, will riot be published. 3 SECTION I TRANSREGIONAL SECURITY CONCERNS Regional Challenges, Global Issues . When...but global issues . Global security issues derive from three forms of connectivity. The first is economic. Today, there is truly a world economy. Markets

  3. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-02-26

    climate change ;  ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and  increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen

  4. Soliton Dynamics of an Atomic Spinor Condensate on a Ring Lattice

    DTIC Science & Technology

    2013-02-22

    REPORT Soliton dynamics of an atomic spinor condensate on a Ring Lattice 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: We study the dynamics of...8/98) Prescribed by ANSI Std. Z39.18 - Soliton dynamics of an atomic spinor condensate on a Ring Lattice Report Title ABSTRACT We study the dynamics...Report Number Soliton dynamics of an atomic spinor condensat Block 13: Supplementary Note © 2013 . Published in Physical Review A (accepted), Vol. Ed

  5. A Study to Develop Transition Plan Requirements for the Occupancy of the New Madigan Army Medical Center at Fort Lewis, Washington

    DTIC Science & Technology

    1988-07-01

    DISTRIBUTION, AVAILABILITY OF REPORTAD-A209 747 JoUL01 UNCLASSIFIED/ UNLIMITED S ..- ,,*,* crui NUMBER 5. MONITORING ORGANIZATION REPORT NUMBER( S ) S ...OCCUPANCY OF THE NEW MADIGAN ARMY MEDICAL CENTER AT FORT LEWIS, WASHINGTON 12. PERSONAL AUTHOR( S ) Peterson, John Phillip 13a. TYPE OF REPORT 113b. TIME...transition areas N requiring extensive development.-.(continuep) \\ 20, DISTRIBUTION/AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION S

  6. Application of Thin Film Photovoltaic CIGS Cells to Extend the Endurance of Small Unmanned Aerial Systems

    DTIC Science & Technology

    2017-06-01

    Sherif Michael Second Reader: James Calusdian THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...States Military utilizes an extensive variety of UAVs, whether electric or fossil fuel propulsion. In this section, we review the distinctive sorts of

  7. Analysis of Key Factors Driving Japan’s Military Normalization

    DTIC Science & Technology

    2017-09-01

    Clay Moltz THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2...agenda. Most people pointed to the rise of China, the end of wars in the Middle East, and regional shifts in reliance on fossil fuels, among other issues

  8. Weight Measurements and Standards for Soldiers, Phase 2

    DTIC Science & Technology

    2016-10-01

    SUPPLEMENTARY NOTES 14. ABSTRACT The specific aims of the study are to: 1) examine body weight and fat changes associated with participation in a...maintenance of changes in body weight, body fat , and fitness after discontinuation of the promotion associated with the H.E.A.L.T.H. program. The study is a...physical fitness, health, weight, body fat 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 26 19a. NAME OF

  9. Feasibility of Rectangular Concrete Pressure Vessels for Human Occupancy

    DTIC Science & Technology

    1990-07-01

    incorporated: into the s 1.71 ! -1 rule-. 20 DISTRIBUTION/ AVAILABILIT ’- ,"r ABSTRACT 2’ ABSTRACT SECURITY CLASSIFICATION 7 JUNCLASSIFIED/UNLIMITED 0 SAME AS RPT...carried the end loads. Gas cooled reactors were never very popular in the US. Domestic utilities preferred boiling water reactors that operated at...Point Tower); 1975 - 9,000 psi in Chicago ( Water Tower Place); 1984 - 10,000 psi in Seattle (Century Square Bldg.); 1987 - 10,000 psi in Toronto

  10. A Lean Six Sigma Analysis of Student In-Processing

    DTIC Science & Technology

    2012-12-01

    SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298 (Rev. 2–89...suppliers as they were able to provide produce products that met all their standards –whether it be application or cosmetic. This was, of course, quite...expensive, but after many attempts the customers were unable to find a cheaper foreign source for this product that met all their quality standards

  11. Nonequilibrium Hypersonic Aerothermodynamics Using the Direct Simulation Monte Carlo And Navier-Stokes Models

    DTIC Science & Technology

    2008-01-17

    15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18 . NUMBER OF PAGES 261 19a. NAME OF RESPONSIBLE PERSON a...REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 This material...Sciences Meeting and Exhibit. Several DSMC [13, 58] and CFD [ 18 , 28, 43] solutions were submitted. Later, others compared CFD and DSMC solutions to these

  12. The NATO-Russia Partnership: A Marriage of Convenience or a Troubled Relationship?

    DTIC Science & Technology

    2006-11-01

    distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 ...Rev. 8-98) Prescribed by ANSI Std Z39- 18 ii ***** The views expressed in this report are those of the author and do not necessarily reflect the...has raised it again more recently, though it is difficult to see what Russia gains from withdrawal from that treaty. 18 Withdrawal from the treaty

  13. Heat Tolerance and the Peripheral Effects of Anticholinergics

    DTIC Science & Technology

    1988-01-30

    0c. GENDER: Responses of 27 males and 12 females showed that both SR and AGD increased as a function of log MCh dose. SR was affected by gender only...at the 2 highest doses ( male SR slightly greater). At all but the lowest dose AGD was significantly greater for females. ACCLIMATION: Responses of 6... males to MCh were measured before and after 20. DISTRIBUTION /AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION 0 UNCLASSIFIED/UNLIMITED 0

  14. Effect of Diet on Gulf War Illness: A Pilot Study

    DTIC Science & Technology

    2017-10-01

    illness while on the study. We screened our first participant in September 2016. Overall we have screened 18 and enrolled 14 Gulf War Veterans so...16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18 . 19a. NAME OF RESPONSIBLE PERSON U OF ABSTRACT NUMBER USAMRMC OF PAGES a. REPORT b. ABSTRACT c...healthy. Body: During the last on year the following goals were accomplished:  We have screened 18 Gulf War Veterans and have enrolled 14

  15. Reliability Characterization of Digital Microcircuits - Investigation of an In-Process Oxide Reliability Screening Method

    DTIC Science & Technology

    1993-04-01

    CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURIlY CLASSIFICATION 20. UMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT UNCLASSIFIED UNCLASSIFIED...with the silicon underneath, growing a thin nitride layer. This layer of Si 3 N 4 , if not completely removed, will retard oxidation in the area...C. Shatas, K. C. Saraswat and J. D. Meindl, "Interfacial and Breakdown Characteristics of MOS Devices with Rapidly Grown Ultrathin SiO Gate

  16. Feasibility of Nuclear Power on U.S. Military Installations. 2nd Revision

    DTIC Science & Technology

    2011-03-01

    Small Modular Reactor , Military Installation Energy, Energy Assurance 16. SECURITY CLASSIFICATION OF: a. REPORT I b. ABSTRACT U c. THIS PAGE i; 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 98 19a. NAME OF RESPONSIBLE PERSON Knowledge Center/Rhea Stone 19b. TELEPHONE NUMBER (Include area code) 703-824-2110 Standard Form 298 (Rev. 8/98) Prescribed bv ANSI Sid 239.18 Contents Preliminary note: Development and commercial deployment of small modular reactors

  17. Use of Information Technology for Management of U.S. Postal Service Facilities.

    DTIC Science & Technology

    1996-05-01

    change closeout status, request for proposal log) Projected income and expenses of a U.S. Postal Service facility Direct capitalization model Tax...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 15. NUMBER OF PAGES 107 16. PRICE CODE 20. LIMITATION OF ABSTRACT UL NSN 7540-01...time and at the right price is a huge and complex job. In any one year, the USPS Facilities organization may acquire more than 100 sites, plan

  18. Naval Response to a Changed Security Environment: Maritime Security in the Mediterranean

    DTIC Science & Technology

    2007-01-01

    other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a...PAGES 28 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8...elements. The first was to use inflatable Zodiac -type speedboats to attack ships. The second was to blow up medium-sized vessels near other ships

  19. Homeland Security Within State Departments of Agriculture: Success Factors and Barriers to an Effective Security Program

    DTIC Science & Technology

    2010-09-01

    13. ABSTRACT (maximum 200 words ) The food and agriculture sector in the United States is vulnerable to attack. One solution is to ensure that...Bureau of Investigation FEMA Federal Emergency Management Agency FMD Foot and Mouth Disease GAO General Accounting Office (changed name to...will need to respond to an FMD [foot and mouth disease] outbreak” (GAO, 2002b, p. 5). In many cases, veterinarians serve as 9 first-line

  20. The Rise of China: Redefining War in the 21st Century

    DTIC Science & Technology

    2012-03-22

    Hegemony, Africa, Cold War, Cyber Attack, Deficit 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...FORMAT: Strategy Research Project DATE: 22 March 2012 WORD COUNT: 5,825 PAGES: 30 KEY TERMS: Debt, Security, Hegemony, Africa, Cold War, Cyber ...significantly increasing economic aid. But it’s hard to buy affection; such ‘ friendship ’ does not stand the test of difficult times.”42 The United

  1. Flow Instability Tests for a Particle Bed Reactor Nuclear Thermal Rocket Fuel Element

    DTIC Science & Technology

    1993-05-01

    2.0 with GWBASIC or higher (DOS 5.0 was installed on the machine). Since the source code was written in BASIC, it was easy to make modifications...8217 AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for Public Release IAW 190-1 Distribution Unlimited MICHAEL M. BRICKER, SMSgt, USAF Chief...Administration 13. ABSTRACT (Maximum 200 words) i.14. SUBJECT TERMS 15. NUMBER OF PAGES 339 16. PRICE CODE 󈧕. SECURITY CLASSIFICATION 18. SECURITY

  2. Longitudinal Validation of Non-Cognitive Officer Selection Measures for the U.S. Army Officer Candidate School (OCS)

    DTIC Science & Technology

    2012-09-01

    analysis SECURITY CLASSIFICATION OF 19. LIMITATION OF ABSTRACT Unlimited 20. NUMBER OF PAGES 110 21. RESPONSIBLE PERSON Dorothy...Recognition, Altruism/Benevolence, Skill Development, and Job Security . The coefficient alphas for these scales ranged from .70 to .90. 3...BOLC B 158 3 1.9% Summary Variables Graduated from IOT 1,233 44 3.6% Recycled at Least Once During IOTa 1,171 66 5.6% Note. N

  3. Developing a Regional Recovery Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.

    2011-09-01

    Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other criticalmore » infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.« less

  4. 76 FR 44944 - Intent To Request Renewal From OMB of One Current Public Collection of Information: TSA Airspace...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-27

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0033, abstracted below that we will submit to OMB for renewal in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. This collection of information allows TSA to conduct security threat assessments on individuals on board aircraft operating in restricted airspace pursuant to an airspace waiver. This collection will enhance aviation security and protect assets on the ground that are within the restricted airspace.

  5. Struggling with one’s own parenting after an upbringing with substance abusing parents

    PubMed Central

    Tedgård, Eva; Råstam, Maria; Wirtberg, Ingegerd

    2018-01-01

    ABSTRACT Aim: To add to our knowledge concerning the key elements involved in the individual’s experience of growing up with substance abusing parents and the resulting challenges this involved for their own parenthood. Methods: In-depth interviews were conducted with 19 parents who had participated in a mental health intervention programme. All had experienced substance abusing parents in their family of origin. Qualitative content analysis was used to analyse the data. They also completed a self-report questionnaire assessing their attachment style. Result: Participants reported a high incidence of emotional abuse and neglect coupled with inadequate support from the community. Their own parental role was influenced by high parental stress and a majority had an insecure attachment style. Conclusions: All participants had experienced a very difficult childhood which was reinforced by the fact that they received little support from society. Their childhood experience and the resulting challenges that this created in their own parenting role could negatively influence their own children’s ability to form a secure psychosocial development. It is therefore important to develop instruments that can help to identify children who were raised in misuse families in order to accommodate the transgenerational effects of growing up with substance abusing parents. PMID:29482480

  6. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want to thank the Organizing Committee, the Institutions and Sponsors supporting the Conference, especially 'Centre for Emerging Sciences, Engineering & Technology (CESET), Islamabad', the IOP Publishers and everyone who contributed to the organization of this meeting, for their invaluable efforts to make this event a great success. Professor Dr Ahmed Shuja Syed Chief Editor The PDF also contains lists of the boards, committees and sponsors.

  7. How much land-based greenhouse gas mitigation can be achieved without compromising food security and environmental goals?

    PubMed

    Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven

    2013-08-01

    Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that addresses multiple objectives is required now more than ever. © 2013 John Wiley & Sons Ltd.

  8. Security surveillance challenges and proven thermal imaging capabilities in real-world applications

    NASA Astrophysics Data System (ADS)

    Francisco, Glen L.; Roberts, Sharon

    2004-09-01

    Uncooled thermal imaging was first introduced to the public in early 1980's by Raytheon (legacy Texas Instruments Defense Segment Electronics Group) as a solution for military applications. Since the introduction of this technology, Raytheon has remained the leader in this market as well as introduced commercial versions of thermal imaging products specifically designed for security, law enforcement, fire fighting, automotive and industrial uses. Today, low cost thermal imaging for commercial use in security applications is a reality. Organizations of all types have begun to understand the advantages of using thermal imaging as a means to solve common surveillance problems where other popular technologies fall short. Thermal imaging has proven to be a successful solution for common security needs such as: ¸ vision at night where lighting is undesired and 24x7 surveillance is needed ¸ surveillance over waterways, lakes and ports where water and lighting options are impractical ¸ surveillance through challenging weather conditions where other technologies will be challenged by atmospheric particulates ¸ low maintenance requirements due to remote or difficult locations ¸ low cost over life of product Thermal imaging is now a common addition to the integrated security package. Companies are relying on thermal imaging for specific applications where no other technology can perform.

  9. Visualizing Dynamic Bitcoin Transaction Patterns

    PubMed Central

    McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J.

    2016-01-01

    Abstract This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network. PMID:27441715

  10. A novel surface modification technique for forming porous polymer monoliths in poly(dimethylsiloxane).

    PubMed

    Burke, Jeffrey M; Smela, Elisabeth

    2012-03-01

    A new method of surface modification is described for enabling the in situ formation of homogenous porous polymer monoliths (PPMs) within poly(dimethylsiloxane) (PDMS) microfluidic channels that uses 365 nm UV illumination for polymerization. Porous polymer monolith formation in PDMS can be challenging because PDMS readily absorbs the monomers and solvents, changing the final monolith morphology, and because PDMS absorbs oxygen, which inhibits free-radical polymerization. The new approach is based on sequentially absorbing a non-hydrogen-abstracting photoinitiator and the monomers methyl methacrylate and ethylene diacrylate within the walls of the microchannel, and then polymerizing the surface treatment polymer within the PDMS, entangled with it but not covalently bound. Four different monolith compositions were tested, all of which yielded monoliths that were securely anchored and could withstand pressures exceeding the bonding strength of PDMS (40 psi) without dislodging. One was a recipe that was optimized to give a larger average pore size, required for low back pressure. This monolith was used to concentrate and subsequently mechanical lyse B lymphocytes.

  11. Human Purposive Movement Theory

    DTIC Science & Technology

    2012-03-01

    theory and provides examples of developmental and operational technologies that could use this theory in common settings. 15. SUBJECT TERMS human ... activity , prediction of behavior, human algorithms purposive movement theory 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18

  12. Network Visualization Project (NVP)

    DTIC Science & Technology

    2016-07-01

    network visualization, network traffic analysis, network forensics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF...shell, is a command-line framework used for network forensic analysis. Dshell processes existing pcap files and filters output information based on

  13. 75 FR 9919 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on November 16, 2009, 74 FR 58969. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.

  14. 77 FR 11146 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Certified...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0053, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF); (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs; (3) acceptance of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; and (5) recordkeeping requirements for CCSFs. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo.

  15. 76 FR 4362 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-25

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below, to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of this collection of information on October 14, 2010, 75 FR 63192. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: Security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.

  16. 6 CFR 7.30 - Classification challenges.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...

  17. 6 CFR 7.30 - Classification challenges.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...

  18. 6 CFR 7.30 - Classification challenges.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...

  19. 6 CFR 7.30 - Classification challenges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...

  20. 6 CFR 7.30 - Classification challenges.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Classification challenges. 7.30 Section 7.30... INFORMATION Classified Information § 7.30 Classification challenges. (a) Authorized holders of information... classified are encouraged and expected to challenge the classification status of that information pursuant to...

  1. Secure Skyline Queries on Cloud Platform.

    PubMed

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-04-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.

  2. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  3. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  4. A Framework for the Governance of Information Security

    ERIC Educational Resources Information Center

    Edwards, Charles K.

    2013-01-01

    Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…

  5. Federated Security: The Shibboleth Approach

    ERIC Educational Resources Information Center

    Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken

    2004-01-01

    The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…

  6. The Battle to Secure Our Public Access Computers

    ERIC Educational Resources Information Center

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  7. Research on information security in big data era

    NASA Astrophysics Data System (ADS)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  8. Strategic Planning for Comprehensive Security in the European Union’s Military Operations: EUFOR RD Congo, EUFOR Tchad/RCA, and EUNAVFOR Somalia

    DTIC Science & Technology

    2010-06-01

    Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century, 947. 11 Marco A. Ferroni and Ashoka Mody, International Public...Security and Defence Policy, 67–70; Howorth, Security and Defence Policy in the European Union, 152–154. 47 Hubert Zimmermann, “Security Exporters...consilium.europa.eu/showPage.aspx?id=1519&lang=en (accessed 12 March 2010). Ferroni, Marco A. and Ashoka Mody. International Public Goods: Incentives

  9. Biomedical devices and systems security.

    PubMed

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  10. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  11. 77 FR 11145 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Air Cargo...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0040, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. This ICR involves five broad categories of affected populations: airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. The collections of information that make up this ICR are security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), Air Cargo Data Management System (ACDMS), Cargo Reporting Tool for cargo screening reporting, and evidence of compliance recordkeeping. TSA seeks continued OMB approval in order to secure passenger aircraft carrying cargo as authorized in the Aviation and Transportation Security Act.

  12. Security training symposium: Meeting the challenge: Firearms and explosives recognition and detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-09-01

    These conference proceedings have been prepared in support of the US Nuclear Regulatory Commission's Security Training Symposium on Meeting the Challenge -- Firearms and Explosives Recognition and Detection,'' November 28 through 30, 1989, in Bethesda, Maryland. This document contains the edited transcripts of the guest speakers. It also contains some of the speakers' formal papers that were distributed and some of the slides that were shown at the symposium (Appendix A).

  13. A Social Infrastructure for Hometown Security. Evolving the Homeland Security Paradigm

    DTIC Science & Technology

    2009-01-23

    information, including suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations and Reports, 1215...national call to service . This call offers an opportunity to invest in a social infrastructure for homeland security that will bring the American people... service , we were asked to go shopping.”12 By most accounts, the likely security challenges in the next few years will demand much greater involvement

  14. Combating Terrorism, Rebel Groups, and Armed Militias in the Face of Economic Prosperity Opportunities

    DTIC Science & Technology

    2012-05-04

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17

  15. Hazard-Specific Vulnerability Mapping for Water Security in a Shale Gas Context

    NASA Astrophysics Data System (ADS)

    Allen, D. M.; Holding, S.; McKoen, Z.

    2015-12-01

    Northeast British Columbia (NEBC) is estimated to hold large reserves of unconventional natural gas and has experienced rapid growth in shale gas development activities over recent decades. Shale gas development has the potential to impact the quality and quantity of surface and ground water. Robust policies and sound water management are required to protect water security in relation to the water-energy nexus surrounding shale gas development. In this study, hazard-specific vulnerability mapping was conducted across NEBC to identify areas most vulnerable to water quality and quantity deterioration due to shale gas development. Vulnerability represents the combination of a specific hazard threat and the susceptibility of the water system to that threat. Hazard threats (i.e. potential contamination sources and water abstraction) were mapped spatially across the region. The shallow aquifer susceptibility to contamination was characterised using the DRASTIC aquifer vulnerability approach, while the aquifer susceptibility to abstraction was mapped according to aquifer productivity. Surface water susceptibility to contamination was characterised on a watershed basis to describe the propensity for overland flow (i.e. contaminant transport), while watershed discharge estimates were used to assess surface water susceptibility to water abstractions. The spatial distribution of hazard threats and susceptibility were combined to form hazard-specific vulnerability maps for groundwater quality, groundwater quantity, surface water quality and surface water quantity. The vulnerability maps identify priority areas for further research, monitoring and policy development. Priority areas regarding water quality occur where hazard threat (contamination potential) coincide with high aquifer susceptibility or high overland flow potential. Priority areas regarding water quantity occur where demand is estimated to represent a significant proportion of estimated supply. The identification of priority areas allows for characterization of the vulnerability of water security in the region. This vulnerability mapping approach, using the hazard threat and susceptibility indicators, can be applied to other shale gas areas to assess vulnerability to shale gas activities and support water security.

  16. Strategies for online test security.

    PubMed

    Hart, Leigh; Morgan, Lesley

    2009-01-01

    As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.

  17. Security aspects of electronic data interchange between a state health department and a hospital emergency department.

    PubMed

    Magnuson, J A; Klockner, Rocke; Ladd-Wilson, Stephen; Zechnich, Andrew; Bangs, Christopher; Kohn, Melvin A

    2004-01-01

    Electronic emergency department reporting provides the potential for enhancing local and state surveillance capabilities for a wide variety of syndromes and reportable conditions. The task of protecting data confidentiality and integrity while developing electronic data interchange between a hospital emergency department and a state public health department proved more complex than expected. This case study reports on the significant challenges that had to be resolved to accomplish this goal; these included application restrictions and incompatibilities, technical malfunctions, changing standards, and insufficient dedicated resources. One of the key administrative challenges was that of coordinating project security with enterprise security. The original project has evolved into an ongoing pilot, with the health department currently receiving secure data from the emergency department at four-hour intervals. Currently, planning is underway to add more emergency departments to the project.

  18. Technology Empowerment: Security Challenges.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren, Drake Edward; Backus, George A.; Jones, Wendell

    “Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less

  19. HIV/AIDS Securitization: Outcomes and Current Challenges.

    PubMed

    Shadyab, Aladdin H; Hale, Braden R; Shaffer, Richard A

    2017-01-01

    The securitization (i.e., framing of a health issue as a security threat) of HIV/AIDS by the United Nations Security Council in 2000 changed the belief that HIV/AIDS is only a health issue. Although now accepted that HIV/AIDS represents a security threat, the consequences of securitization are still not widely established. The purpose of this paper was to present an evidence-based review of the outcomes and current challenges associated with HIV/AIDS securitization in the context of national security. We provided an overview of HIV/AIDS securitization, followed by a discussion of the impact of securitization on peacekeeping personnel and uniformed services. We also reviewed the United States Government's response to securitization and potential risks and benefits of securitization. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  20. Diagnosing water security in the rural North with an environmental security framework.

    PubMed

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Solidago Vigaurea for Prostate Cancer Therapy

    DTIC Science & Technology

    2011-04-01

    Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 ...tumorigenesis using a xenograft model. Human prostate cancer cell line PC3mm which was “labeled” with the luciferase gene was injected into the dorsal flank...with treatment (A) (B) 0 5 10 15 20 25 16 17 18 19 20 21 22 23 24 Control Cacalol Days B od y w ei gh t ( g) Hepatic injury maker  Control

  2. Efficient Simulation and Novel Modeling by Using Generic Three-Dimensional Exact Solutions to Analyze Transport Dynamics in Turbulent Vortices

    DTIC Science & Technology

    2009-02-28

    algorithm 16. SECURITY CLASSIFICATION OF: a. REPORT C b. ABSTRACT (’ c . THIS PAGE C 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 16...further improved by in- cluding Fi^Fs ... obtained by very fast predictor - corrector scheme along / direction. 2 n/(El) 4 Fig. 1: Preliminary...by solving eq.l 1 with Euler predictor - corrector method. As a result, Uj can be evaluated from the expansion eq.9. • Step 2:- The normal

  3. A Comparison of Manual Scaled and Predicted foE and foF1 Critical Frequencies

    DTIC Science & Technology

    1990-07-01

    Statistics for the lonograms Studied 17 xi 1.0 INTRODUCTION The ARTIST autoscaling routines use a predicted foE to determine a range to search for the...recommendations are made to help improve autoscaling . 20. DISTRIBUTIONIAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UUNCLASSIFIEDUNLIMITED 0...to estimate foE. In the ARTIST , the predicted foE is the CCIR model described in the CCIR Supplement Report 252-2.1 We have also tested a foE

  4. A Socio-Technical Analysis of Computer Application within the Fourth Marine Aircraft Wing.

    DTIC Science & Technology

    1987-03-01

    IDENTIFICATION NUMBER ORGANIZATION j I applicable) SC ADDRE SS (City, State, and ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM IPROjECT ITASK WORK .jNIr... currently being- used is not sufficient to meet all the needs of 14tii MAW , Z0 11YR’UTiON /AVAILABILITY Of ABSTRACT 21 ABSTRACT SECURITY...implementation process currently being used is not sufficient to meet all the needs of 4th MAW units. This study identifies alternatives necessary to

  5. Design and Implementation of a High-Flux Photoneutron Converter for Analysis of Fast Neutron Radiation Damage on Gallium Nitride Transistors

    DTIC Science & Technology

    2017-06-01

    Porter Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704...THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev...infrastructure in today’s society. Due to the projected depletion of fossil fuel sources in the 21st century, nuclear power is a potential source of

  6. Assessment of the Effectiveness of Economic Sanctions: The Cases of Iran, North Korea, Myanmar, and Cuba

    DTIC Science & Technology

    2017-06-01

    Naazneen Barma Second Reader: Emily Meierding THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89...to military force.”7 Hufbauer, Schott, and Elliott emphasize that it is important not to “conflate” economic sanctions with other forms of economic

  7. Automated Control of a Solar Microgrid-Powered Air Compressor for Use in a Small-Scale Compressed Air Energy Storage System

    DTIC Science & Technology

    2017-06-01

    in the form of fossil fuels for ships, tanks, and aircraft; however, there was still a significant consumption of fossil fuel by means of electrical...Thesis Advisor: Anthony J. Gannon Co-Advisor: Andrea Holmes THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2

  8. Consumable Guide Electroslag Welding of 4 to 24 Inch Thick Carbon Steel Castings (The National Shipbuilding Research Program)

    DTIC Science & Technology

    1986-08-01

    aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 168 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...States, nor the Maritime Administration, nor any person acting on behalf of the Maritime Administration (A) makes any warranty or representation, expressed

  9. Improving the Distortional Deformation Capabilities of Aerospace Composite Networks

    DTIC Science & Technology

    2011-02-28

    Standard Form 298 (Rev. 8/98) REPORT DOCUMENTATION PAGE Prescribed by ANSI Std. Z39.18 Form Approved OMB No. 0704-0188 The public reporting...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c. THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...secondary motions. 165 170 175 180 185 190 195 200 205 210 215 220 225 230 235 40 45 50 55 60 65 70 75 Zero entropy line Chain isomerization in linear

  10. Feasibility Study for a Computerized Serials Control System in the Defense Communications Agency Technical and Management Information Center.

    DTIC Science & Technology

    1984-06-20

    AD-A162 ±88 FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL 1/1 SYSTEM IN THE DEFENS (U) DEFENSE COMMUNICATIONS AGENCY WASHINGTON DC TECHNICAL...NATIONAL BUREAU OF STANDARDS- 1963-A 0FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL SYSTEM IN THE DEFENSE COMMUNICATIONS 0AGENCY TECHNICAL AND...ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED/UNLIMITED R1 SAME AS RPT. 0 DTIC USERS 0 UNCLASSIFIED 22&. NAME OF RESPONSIBLE INDIVIDUAL 22b

  11. Methods for Effective Virtual Screening and Scaffold-Hopping in Chemical Compounds

    DTIC Science & Technology

    2007-04-04

    contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 12 19a...Opterons with 4 GB of memory . We used the descriptor- spaces GF, ECZ3, and ErG (described in Section 4) for the evaluating the methods introduced in...screening: Use of data fusion and machine learning to enchance the effectiveness of sim- ilarity searching. J. Chem. Info. Model., (46):462–470, 2006. [18] J

  12. An Experimental Investigation Into The Effect Of Plasma On The Flow Features Of An Axisymmetric Jet

    DTIC Science & Technology

    2007-10-01

    document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18 . NUMBER OF PAGES 386...Prescribed by ANSI Std Z39- 18 AN EXPERIMENTAL INVESTIGATION INTO THE EFFECT OF PLASMA ON THE FLOW FEATURES OF AN AXISYMMETRIC JET BY RICHARD E. HUFFMAN...A. 18 Comparison of Plasma Effects on Skewness and Kurtosis: Case 611LINE3051 . . . . . . . . . 223 A.19 Comparison of Plasma Effects on Mean Velocity

  13. Comparison Between Self-Guided Langevin Dynamics and Molecular Dynamics Simulations for Structure Refinement of Protein Loop Conformations

    DTIC Science & Technology

    2011-01-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18 . NUMBER OF PAGES 9 19a. NAME OF RESPONSIBLE PERSON a. REPORT...unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 sampling is based on...atom distance-scaled ideal-gas reference state (DFIRE-AA) statistical potential func- tion.[ 18 ] The third approach is the Rosetta all-atom energy func

  14. Radiation Database for Earth and Mars Entry

    DTIC Science & Technology

    2008-11-17

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18 . NUMBER OF PAGES 40 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 wall, and zero otherwise. The radiative...coupling scheme, we have the additional selection rules for the electric dipolar transition ∆S = 0, (16) ∆L = 0,±1, (17) L = 0 6↔ L = 0 ( 18 ) where we have

  15. Phase I Trial of Intratumoral Administration of NIS Expressing Strain of Measles Virus in Unresectable or Recurrent Malignant Peripheral Nerve Sheath Tumor

    DTIC Science & Technology

    2016-10-01

    Release; Distribution Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Study approved by Mayo IRB on April 18 , 2016, and by USAMRMC/ORP/HRPO on May 6...MV-NIS, Oncolytic Virus, Measles Virus 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PPAGES 19a. NAME OF...1. Received Mayo IRB approval on 04/ 18 /2016 2. The US Army Medical Research and Materiel Command (USAMRMC), Office of Research Protections (ORP

  16. Antifungal Resistance Patterns in Molds Isolated from Wounds of Combat Related Trauma Patients

    DTIC Science & Technology

    2017-10-05

    mucormycetes (MM). Results: Included are 18 patients with 28 initial mold isolates with 72% oflFI diagnosed via histopathology. All patients were male with...and co 1S. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b.ABSTRACT c. THIS PAGE ABSTRACT uu 18 . NUMBER OF PAGES...MM). .... tt.: Included are 18 patients with 21 lnltlal mold Isolate with 71% of IFI dll1nosed vii hlstopatholotY. All patients wrre male with a

  17. Prevalence of Hepatitis B and C in US Air Force Basic Military Trainees

    DTIC Science & Technology

    2017-08-29

    REPORT TYPE 08/29/2017 Journal -4. TITLE AND SUBTITLE Prevalence ofliepatitis B and C in US Air Force Basic Military Trainees 6. AUTHOR(S) Capt...unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER a. REPORT b.ABSTRACT c ...Prescnbed by ANSI Sld, Z3B.16 Adobe Prnfeodohal 7.0 Prevalence of Hepatitis Band C in US Air Force Basic Military Trainees from Blood Donations 2 3

  18. Information security risk management for computerized health information systems in hospitals: a case study of Iran.

    PubMed

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.

  19. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    DTIC Science & Technology

    2010-01-01

    SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE 13 . ABSTRACT After ten years the ESDP has reached an important...premier_ministre/2008/11- novembre /16­ juncker/index.html - accessed 14 September 2009. 2 Javier Solana, “Preface,” in: What Ambitions for European Defense in...security of the Union, including the eventual framing of a common defense policy ….” 13 First and foremost the Treaty required member nations to build

  20. Protecting Commercial Space Systems: A Critical National Security Issue

    DTIC Science & Technology

    1999-04-01

    The Influence of Sea Power on World History: 1660-1783” (excerpt). Air Command and Staff College War Theory Coursebook (Academic Year 1999), 87- 88. 6...Publications. State of the Space Industry, 1998, 42, 49; and (2) US Census Bureau, Statistical Abstract of the United States: 1998, 1 Oct 1998, 578...College War Theory Coursebook (Academic Year 1999), 109. 2 Stubbs, Captain Bruce B., “The Coast Guard’s National Security Role in the 21st Century.” Air

  1. The North African Franchise: AQIM’s Threat to U.S. Security. Strategic Insights, Volume 8, Issue 5

    DTIC Science & Technology

    2009-12-01

    The North African Franchise : AQIM’s Threat to U.S. Security Strategic Insights, Volume VIII, Issue 5 (December 2009) By Captain Russell J. Isaacs...the U.S. Government. Abstract Al Qaeda of the Islamic Maghreb (AQIM) is a growing and evolving North African franchise of Al Qaeda. While the group...in towns east of Algiers. Although this attack officially marked the emergence of Al Qaeda of the Islamic Maghreb (AQIM), a North African franchise

  2. Physical Cryptography: A New Approach to Key Generation and Direct Encryption

    DTIC Science & Technology

    2009-11-18

    has been  further studied theoretically and P a g e  | 4    experimentally to only a limited extent. The second is quantum cryptography [3] based on...Std Z39-18 P a g e  | 2    Abstract: The security of key generation and direct encryption in quantum and physical cryptography have been...investigated. It is found that similar to the situation of conventional mathematics based cryptography , fundamental and meaningful security levels for either

  3. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  4. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  5. 77 FR 3843 - Agency Information Collection (Procedures, and Security for Government Financing) Activities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-25

    ...: 2900-0688. Type of Review: Extension of a currently approved collection. Abstract: Data collected under... continue contract performance if payments are reduced or suspended upon a finding of fraud. VA will use the...

  6. 78 FR 41995 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ... of United States Savings Bonds/Notes Involved in a Chain Letter Scheme. Form: PD F 2966. Abstract... purchased in a chain letter scheme and used to identify the securities involved and to issue a refund of the...

  7. The High Angular Resolution Multiplicity of Massive Stars

    DTIC Science & Technology

    2009-02-01

    binaries: visual – stars: early-type – stars: individual ( iota Ori, delta Ori, delta Sco) – techniques: interferometric Online-only material...STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY

  8. Using software security analysis to verify the secure socket layer (SSL) protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2004-01-01

    nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.

  9. A European Perspective on Security Research

    NASA Astrophysics Data System (ADS)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  10. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  11. TCIA Secure Cyber Critical Infrastructure Modernization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  12. Security Games Applied to Real-World: Research Contributions and Challenges

    DTIC Science & Technology

    2012-01-01

    Marecki, J.: GUARDS and PROTECT: Next Generation Applications of Security Games . SIGECOM 10 (March 2011) 31–34 4. Shieh, E ., An, B., Yang, R., Tambe...Steigerwald, E .: GUARDS - Game Theoretic Security Allocation on a National Scale. In: Proc. of The 10th International Conference on Autonomous Agents...Shieh, E ., Kiekintveld, C.: Refinement of Strong Stackelberg Equilibria in Security Games . In: Proc. of the 25th Conference on Artificial Intelligence

  13. PKI security in large-scale healthcare networks.

    PubMed

    Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos

    2012-06-01

    During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.

  14. A scoping review of traditional food security in Alaska

    PubMed Central

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-01-01

    ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675

  15. IT-security challenges in IoT environments and autonomous systems

    NASA Astrophysics Data System (ADS)

    Heun, Ulrich

    2017-05-01

    Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.

  16. DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2010

    2010-01-01

    The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…

  17. Securing electronic health records with novel mobile encryption schemes.

    PubMed

    Weerasinghe, Dasun; Elmufti, Kalid; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    2007-01-01

    Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.

  18. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  19. The research of computer network security and protection strategy

    NASA Astrophysics Data System (ADS)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  20. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  1. Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords

    PubMed Central

    Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697

  2. CyFall: A Cyber-Network Game Scenario

    DTIC Science & Technology

    2014-08-01

    results. This report examines the development of a conceptual game ( gamification ) that would aid nonexperts in identifying with their role and the...user study, gamification 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 36 19a

  3. A governor's guide to emergency management. Volume two : homeland security

    DOT National Transportation Integrated Search

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  4. A DHS Skunkworks Project: Defining and Addressing Homeland Security Grand Challenges

    DTIC Science & Technology

    2016-12-01

    Peter Diamandis, Ansari XPRIZE, market failure, technology, stealth technologies, Pasteur’s quadrant, Heilmeier Catechism, Homeland Security Advanced...Judging and Scoring ....................................................................27 D. OPTIMIZING FOR AN EMERGING MARKET ...37 Figure 3. Market /Technology Chart

  5. No weapons in the weapons lab

    NASA Astrophysics Data System (ADS)

    Trebino, Rick

    2010-03-01

    I spent 12 years working at a top-secret nuclear-weapons lab that had its own dedicated force of heavily armed security guards. Of course, security-related incidents were rare, so the guards' main challenge was simply staying awake.

  6. Privacy and Security in Mobile Health: A Research Agenda

    PubMed Central

    Kotz, David; Gunter, Carl A.; Kumar, Santosh; Weiner, Jonathan P.

    2017-01-01

    Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges. PMID:28344359

  7. NREL Workshop Convenes Industry Experts on Cybersecurity and an Evolving

    Science.gov Websites

    silos in a field that demands greater collaboration, and the benefits of systemic security architecture groups to identify possible solutions to the challenges in securing DERs-from a technology, business, and

  8. Plant security during decommissioning; challenges and lessons learned from German phase out decision

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Renner, Andrea; Esch, Markus

    2013-07-01

    Purpose of this paper is to point out the security challenges that may occur during the decommissioning, based on the issues and lessons learned from the German phase out decision. Though national regulations may be different in other countries the basic problems and issues will be the same. Therefore presented solutions will be applicable in other countries as well. The radioactive material remaining at the NPP during decommissioning has the most influence on how the security measures have to be designed. The radioactive material defines the risk potential of the plant and this determines the needed security level. The followingmore » aspects have been challenging in Germany: - Scenarios varying from those, used for plants in operation, due to changed operating conditions - Spent fuel will stay in the spent fuel pool for a quite long period before it can be removed from the plant. Risk potential of the plant stays high and requires a high level of security measures - Security measures according to the existing operating license have to stay in place as they are, unless the first license for decommissioning is given respective the spent fuel is removed from the plant site. This even led to the question if improvements of security measures, planned and announced with focus on a plant remaining in operation for another couple of years, need to be done although they will not be required after removing the spent fuel from the plant. A further important aspect for the security design is the fact that a plant under decommissioning has completely different and strongly varying operating procedures, compared to the stable ones of an operating plant. This leads to different needs concerning workspace, infrastructure on plant site, access to buildings etc. An optimized and highly flexible security concept is needed to ensure an adequate level of security as well as an efficient decommissioning. A deep analysis of the vital plant functions, depending on the different decommissioning stages, is required to determine the vital equipment, its location and its need for protection. (authors)« less

  9. Building a Secure and Feature-rich Mobile Mapping Service App Using HTML5: Challenges and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre

    Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less

  10. Let's talk conflict: using mediation in healthcare security disputes.

    PubMed

    Armstrong, Brad

    2013-01-01

    Healthcare security administrators face weekly, if not daily challenges and conflict. This article considers that security leaders must anticipate disputes in highly complex healthcare systems. When disputes cannot be resolved by organizational efforts, security administrators may be in a position to recommend or participate in mediation. Here the concept of mediation is introduced to healthcare security leaders as a viable means to resolve disputes with patients, visitors, and the community. This includes a description of the facilitative versus evaluative mediation processes, as well as pragmatic guidance when preparing for mediation.

  11. Conducted electrical weapons within healthcare: a comprehensive use of force model.

    PubMed

    Ho, Jeffrey D; Williams, Martin F; Coplen, Michael J

    2014-01-01

    Healthcare settings are experiencing increased amounts of violent activity that are challenging to the health care security profession. There is difficulty in addressing this issue completely. Some of this difficulty is because of factors that include inexperienced and untrained clinicians and administrators that are often the decision-makers in the health care setting. As part of an effective solution, we propose that a security plan, including a comprehensive use of force program incorporating conducted electrical weapons, is a necessary and best-practice goal. This paper outlines the background of the problem and discusses the challenges we encountered in reaching this goal as well as the benefits we have discovered along the way. This paper will be beneficial to any healthcare security professional that is interested in enhancing or improving their current health care security use of force model to further counter the increasing violent activity in their respective healthcare setting.

  12. Old age security in rural China: there is a long way to go.

    PubMed

    Dai, Bao-Zhen; Zhou, Lu-Lin; Mei, Y John

    2013-11-01

    We aimed to examine the current developments and challenges confronted by old age security in rural China. This study is based on the data from PubMed, Elsevier, Wiley, EBSCO, EMBASE, SCI Expanded, ProQuest, Google, and CNKI which is the most informative database in Chinese. Articles were selected with the search terms "rural", "China", "old", "older", or "elder", "elderly", or "aged", "aging", "security", "culture", "value", "medical insurance" or "community based medical insurance" or "cooperative medical scheme". Related websites and yearbooks were searched as well. The socio-economic development has made the burden of traditional care for the rural elderly heavier than ever, and new challenges are emerging in rural communities, such as poor economic, deteriorating natural environment and health crisis. The governments should improve the scale and caliber of rural old age security and strengthen regulations with great efforts in developing the rural economy and protecting the natural environment of rural communities.

  13. Human Reliability Program Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less

  14. Social Security and Disability Due to Mental Impairment in Adults.

    PubMed

    Goldman, Howard H; Frey, William D; Riley, Jarnee K

    2018-05-07

    The Social Security Administration (SSA) oversees two disability programs, Social Security Disability Insurance (SSDI) and Supplemental Security Income (SSI). Adults with mental impairments represent a very large component of the programs. Policy makers and SSA are concerned about the accuracy of disability determination and also about low levels of labor force participation among individuals with disabilities. Adults with mental impairments are challenging to assess for work-related functional limitations. They are also a challenge to return to labor force participation. SSA has sponsored several demonstration research programs focusing on improving the accuracy of disability determination and on interventions in supported employment to return individuals with mental impairments to competitive employment. This article reviews the demonstration research focused on both entry into the disability system (at the "front door") and potential exit from it (through the "back door"). All of the research holds promise to "right-size" the SSA disability program.

  15. Editors' Introduction: Abstract Concepts: Structure, Processing, and Modeling.

    PubMed

    Bolognesi, Marianna; Steen, Gerard

    2018-06-22

    Our ability to deal with abstract concepts is one of the most intriguing faculties of human cognition. Still, we know little about how such concepts are formed, processed, and represented in mind. For example, because abstract concepts do not designate referents that can be experienced through our body, the role of perceptual experiences in shaping their content remains controversial. Current theories suggest a variety of alternative explanations to the question of "how abstract concepts are represented in the human mind." These views pinpoint specific streams of semantic information that would play a prominent role in shaping the content of abstract concepts, such as situation-based information (e.g., Barsalou & Wiemer-Hastings, ), affective information (Kousta, Vigliocco, Vinson, Andrews, & Del Campo, ), and linguistic information (Louwerse, ). Rarely, these theoretical views are directly compared. In this special issue, current views are presented in their most recent and advanced form, and directly compared and discussed in a debate, which is reported at the end of each article. As a result, new exciting questions and challenges arise. These questions and challenges, reported in this introductory article, can arguably pave the way to new empirical studies and theoretical developments on the nature of abstract concepts. © 2018 Cognitive Science Society, Inc.

  16. Secure Skyline Queries on Cloud Platform

    PubMed Central

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-01-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710

  17. Case study: adapting the IAHSS curriculum in Thailand.

    PubMed

    Goss, Richard J

    2009-01-01

    In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.

  18. Security Assistance: DOD’s Ongoing Reforms Address Some Challenges, but Additional Information Is Needed to Further Enhance Program Management

    DTIC Science & Technology

    2012-11-01

    Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments

  19. Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011

    DTIC Science & Technology

    2011-01-01

    the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional

  20. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

Top