NASA Astrophysics Data System (ADS)
Guo, Sangang
2017-09-01
There are two stages in solving security-constrained unit commitment problems (SCUC) within Lagrangian framework: one is to obtain feasible units’ states (UC), the other is power economic dispatch (ED) for each unit. The accurate solution of ED is more important for enhancing the efficiency of the solution to SCUC for the fixed feasible units’ statues. Two novel methods named after Convex Combinatorial Coefficient Method and Power Increment Method respectively based on linear programming problem for solving ED are proposed by the piecewise linear approximation to the nonlinear convex fuel cost functions. Numerical testing results show that the methods are effective and efficient.
HIPPO Unit Commitment Version 1
DOE Office of Scientific and Technical Information (OSTI.GOV)
2017-01-17
Developed for the Midcontinent Independent System Operator, Inc. (MISO), HIPPO-Unit Commitment Version 1 is for solving security constrained unit commitment problem. The model was developed to solve MISO's cases. This version of codes includes I/O module to read in MISO's csv files, modules to create a state-based mixed integer programming formulation for solving MIP, and modules to test basic procedures to solve MIP via HPC.
Public-Private Collaboration in the Department of Defense
2012-07-01
In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.
The United States -- India Strategic Relationship
2012-05-17
India and Pakistan in the late 1990s complicated India’s national security calculus . This section will examine the seminal national security events...This opinion was also shared by Indian nuclear scientist A.P. J . Kalam, who advocated that India should not be constrained by the Missile Technology...Affairs 89, no. 2 (March-April 2010), and Ashley J . Tellis, “The Merits of Dehypenation: Explaining U.S. Success in Engaging India and Pakistan,” The
Stochastic Multi-Timescale Power System Operations With Variable Wind Generation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Hongyu; Krad, Ibrahim; Florita, Anthony
This paper describes a novel set of stochastic unit commitment and economic dispatch models that consider stochastic loads and variable generation at multiple operational timescales. The stochastic model includes four distinct stages: stochastic day-ahead security-constrained unit commitment (SCUC), stochastic real-time SCUC, stochastic real-time security-constrained economic dispatch (SCED), and deterministic automatic generation control (AGC). These sub-models are integrated together such that they are continually updated with decisions passed from one to another. The progressive hedging algorithm (PHA) is applied to solve the stochastic models to maintain the computational tractability of the proposed models. Comparative case studies with deterministic approaches are conductedmore » in low wind and high wind penetration scenarios to highlight the advantages of the proposed methodology, one with perfect forecasts and the other with current state-of-the-art but imperfect deterministic forecasts. The effectiveness of the proposed method is evaluated with sensitivity tests using both economic and reliability metrics to provide a broader view of its impact.« less
Cutting planes for the multistage stochastic unit commitment problem
Jiang, Ruiwei; Guan, Yongpei; Watson, Jean -Paul
2016-04-20
As renewable energy penetration rates continue to increase in power systems worldwide, new challenges arise for system operators in both regulated and deregulated electricity markets to solve the security-constrained coal-fired unit commitment problem with intermittent generation (due to renewables) and uncertain load, in order to ensure system reliability and maintain cost effectiveness. In this paper, we study a security-constrained coal-fired stochastic unit commitment model, which we use to enhance the reliability unit commitment process for day-ahead power system operations. In our approach, we first develop a deterministic equivalent formulation for the problem, which leads to a large-scale mixed-integer linear program.more » Then, we verify that the turn on/off inequalities provide a convex hull representation of the minimum-up/down time polytope under the stochastic setting. Next, we develop several families of strong valid inequalities mainly through lifting schemes. In particular, by exploring sequence independent lifting and subadditive approximation lifting properties for the lifting schemes, we obtain strong valid inequalities for the ramping and general load balance polytopes. Lastly, branch-and-cut algorithms are developed to employ these valid inequalities as cutting planes to solve the problem. Our computational results verify the effectiveness of the proposed approach.« less
Cutting planes for the multistage stochastic unit commitment problem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jiang, Ruiwei; Guan, Yongpei; Watson, Jean -Paul
As renewable energy penetration rates continue to increase in power systems worldwide, new challenges arise for system operators in both regulated and deregulated electricity markets to solve the security-constrained coal-fired unit commitment problem with intermittent generation (due to renewables) and uncertain load, in order to ensure system reliability and maintain cost effectiveness. In this paper, we study a security-constrained coal-fired stochastic unit commitment model, which we use to enhance the reliability unit commitment process for day-ahead power system operations. In our approach, we first develop a deterministic equivalent formulation for the problem, which leads to a large-scale mixed-integer linear program.more » Then, we verify that the turn on/off inequalities provide a convex hull representation of the minimum-up/down time polytope under the stochastic setting. Next, we develop several families of strong valid inequalities mainly through lifting schemes. In particular, by exploring sequence independent lifting and subadditive approximation lifting properties for the lifting schemes, we obtain strong valid inequalities for the ramping and general load balance polytopes. Lastly, branch-and-cut algorithms are developed to employ these valid inequalities as cutting planes to solve the problem. Our computational results verify the effectiveness of the proposed approach.« less
Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study
ERIC Educational Resources Information Center
Beyer, Dawn M.
2014-01-01
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve…
Reviews of the Comprehensive Nuclear-Test-Ban Treaty and U.S. security
NASA Astrophysics Data System (ADS)
Jeanloz, Raymond
2017-11-01
Reviews of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the National Academy of Sciences concluded that the United States has the technical expertise and physical means to i) maintain a safe, secure and reliable nuclear-weapons stockpile without nuclear-explosion testing, and ii) effectively monitor global compliance once the Treaty enters into force. Moreover, the CTBT is judged to help constrain proliferation of nuclear-weapons technology, so it is considered favorable to U.S. security. Review of developments since the studies were published, in 2002 and 2012, show that the study conclusions remain valid and that technical capabilities are better than anticipated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krishnamurthy, Dheepak
This paper is an overview of Power System Simulation Toolbox (psst). psst is an open-source Python application for the simulation and analysis of power system models. psst simulates the wholesale market operation by solving a DC Optimal Power Flow (DCOPF), Security Constrained Unit Commitment (SCUC) and a Security Constrained Economic Dispatch (SCED). psst also includes models for the various entities in a power system such as Generator Companies (GenCos), Load Serving Entities (LSEs) and an Independent System Operator (ISO). psst features an open modular object oriented architecture that will make it useful for researchers to customize, expand, experiment beyond solvingmore » traditional problems. psst also includes a web based Graphical User Interface (GUI) that allows for user friendly interaction and for implementation on remote High Performance Computing (HPCs) clusters for parallelized operations. This paper also provides an illustrative application of psst and benchmarks with standard IEEE test cases to show the advanced features and the performance of toolbox.« less
Megacities and the United States Army: Preparing for a Complex and Uncertain Future
2014-06-01
NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Office of the Chief of Staff of the Army,Strategic...problems found in megacities (explosive growth rates, vast and growing income disparity and a security envi- ronment that is increasingly attractive to the ...that growth oc- curring almost entirely in developing world. 5 As re- sources become constrained, illicit networks could po- tentially fill the gap left
2009-03-01
and state constitutions designed to maintain freedom from coercive governmental actions .3 Research shows that when a government constrains liberties... actions including all habeas corpus petitions made pursuant to the United States Constitution. Author unknown, “Comparing Federal and State Court...Terrorist Information (Master’s Thesis, Naval Postgraduate School, Monterey, CA, March 2006), 12. 5 enforcement and intelligence actions taken
A Brief Survey of Democracy Promotion in U.S. Foreign Policy
2014-03-01
highlight that economic and security concerns both pre-dated active democracy promotion efforts. 2 For its first centennial , the United States was...the troubles of the world. The 1930s brought the Great Depression and the perception that democracy and capitalism might not be such good ideas after...peacetime foreign policy on democracy was somewhat constrained by the Great Depression and World War II. As World War II raged, FDR eloquently
The Terrorism Threat and U.S. Government Response: Operational and Organizational Factors
2001-03-01
Searching for National Security Report Documentation Page Report Date 00Mar2001 Report Type N/A Dates Covered (from... to) - Title and Subtitle The...future, will constrain them from doing so. Look at Aum Shrinkyo. Aum was not a stereotypical terrorist organization. It was a national industry with...Palestinian Liberation Organization had gained the world’s attention. Arafat was invited to address the United Nations General Assembly and Palestine was
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things
Van den Abeele, Floris; Moerman, Ingrid; Demeester, Piet
2017-01-01
As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things. PMID:28696393
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things.
Van den Abeele, Floris; Moerman, Ingrid; Demeester, Piet; Hoebeke, Jeroen
2017-07-11
As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things.
Flexible Energy Scheduling Tool for Integrating Variable Generation | Grid
, security-constrained economic dispatch, and automatic generation control programs. DOWNLOAD PAPER Electric commitment, security-constrained economic dispatch, and automatic generation control sub-models. Each sub resolutions and operating strategies can be explored. FESTIV produces not only economic metrics but also
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
Sampangi, Raghav V.; Sampalli, Srinivas
2015-01-01
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. PMID:26389899
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
Sampangi, Raghav V; Sampalli, Srinivas
2015-09-15
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.
Power grid operation risk management: V2G deployment for sustainable development
NASA Astrophysics Data System (ADS)
Haddadian, Ghazale J.
The production, transmission, and delivery of cost--efficient energy to supply ever-increasing peak loads along with a quest for developing a low-carbon economy require significant evolutions in the power grid operations. Lower prices of vast natural gas resources in the United States, Fukushima nuclear disaster, higher and more intense energy consumptions in China and India, issues related to energy security, and recent Middle East conflicts, have urged decisions makers throughout the world to look into other means of generating electricity locally. As the world look to combat climate changes, a shift from carbon-based fuels to non-carbon based fuels is inevitable. However, the variability of distributed generation assets in the electricity grid has introduced major reliability challenges for power grid operators. While spearheading sustainable and reliable power grid operations, this dissertation develops a multi-stakeholder approach to power grid operation design; aiming to address economic, security, and environmental challenges of the constrained electricity generation. It investigates the role of Electric Vehicle (EV) fleets integration, as distributed and mobile storage assets to support high penetrations of renewable energy sources, in the power grid. The vehicle-to-grid (V2G) concept is considered to demonstrate the bidirectional role of EV fleets both as a provider and consumer of energy in securing a sustainable power grid operation. The proposed optimization modeling is the application of Mixed-Integer Linear Programing (MILP) to large-scale systems to solve the hourly security-constrained unit commitment (SCUC) -- an optimal scheduling concept in the economic operation of electric power systems. The Monte Carlo scenario-based approach is utilized to evaluate different scenarios concerning the uncertainties in the operation of power grid system. Further, in order to expedite the real-time solution of the proposed approach for large-scale power systems, it considers a two-stage model using the Benders Decomposition (BD). The numerical simulation demonstrate that the utilization of smart EV fleets in power grid systems would ensure a sustainable grid operation with lower carbon footprints, smoother integration of renewable sources, higher security, and lower power grid operation costs. The results, additionally, illustrate the effectiveness of the proposed MILP approach and its potentials as an optimization tool for sustainable operation of large scale electric power systems.
Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li
2018-06-01
State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-06-08
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-01-01
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382
Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun
2016-01-01
In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme. PMID:27136550
Parrott, Fiona R
2010-12-01
Research into the character of social relationships in psychiatric inpatient facilities has focused on face-to-face interaction between individuals and within groups in the communal areas of wards. Using theories developed in material culture and media studies, this article argues that patients' relationships to goods, namely, photographs, cards and gifts from family or friends, televisions and radios, are important mediators and constituents of sociability. In an ethnographic study of a medium-secure psychiatric unit, I show how these goods are put to use in private space in ways that reflect and mitigate the constraints of incarceration and stigmatization. The data were derived from 3 months of participant observation on a male and a female ward at a unit in the south of England, including a series of anthropological interviews with 19 patients. This article highlights two important findings. First, potentially isolating activities are perceived by patients as sociable, in that watching television and looking at photographs in their room helps to counter feelings of loneliness and isolation. Second, potentially sociable activities, exchanging goods or watching the communal television, are often practiced in such a way as to maintain distance between patients in acknowledgment of the constrained and volatile nature of these relationships. This suggests that patients aspire to retain a sense of the artificiality of their situation, preferring to confine their notion of 'real' relationships to those that exist outside the institution.
Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach
2014-06-01
We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.
Identification of different geologic units using fuzzy constrained resistivity tomography
NASA Astrophysics Data System (ADS)
Singh, Anand; Sharma, S. P.
2018-01-01
Different geophysical inversion strategies are utilized as a component of an interpretation process that tries to separate geologic units based on the resistivity distribution. In the present study, we present the results of separating different geologic units using fuzzy constrained resistivity tomography. This was accomplished using fuzzy c means, a clustering procedure to improve the 2D resistivity image and geologic separation within the iterative minimization through inversion. First, we developed a Matlab-based inversion technique to obtain a reliable resistivity image using different geophysical data sets (electrical resistivity and electromagnetic data). Following this, the recovered resistivity model was converted into a fuzzy constrained resistivity model by assigning the highest probability value of each model cell to the cluster utilizing fuzzy c means clustering procedure during the iterative process. The efficacy of the algorithm is demonstrated using three synthetic plane wave electromagnetic data sets and one electrical resistivity field dataset. The presented approach shows improvement on the conventional inversion approach to differentiate between different geologic units if the correct number of geologic units will be identified. Further, fuzzy constrained resistivity tomography was performed to examine the augmentation of uranium mineralization in the Beldih open cast mine as a case study. We also compared geologic units identified by fuzzy constrained resistivity tomography with geologic units interpreted from the borehole information.
Security in Wireless Sensor Networks Employing MACGSP6
ERIC Educational Resources Information Center
Nitipaichit, Yuttasart
2010-01-01
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Securing, Stabilizing, and Rebuilding Iraq: Key Issues for Congressional Oversight
2007-01-01
Been Constrained by Security, Management , and Funding Challenges 72 U.S. Military Readiness 79 Enclosure XII: Extended Operations Have Had...Forces Have Resulted in Shortages of Critical Items 92 Improving Acquisition Outcomes 97 Enclosure XV: DOD Needs to Improve Its Capacity to Manage ...International Monetary Fund IRMO Iraq Reconstruction Management Office IRRF Iraqi Relief and Reconstruction Fund ISF Iraqi security forces ISFF
Ease Security Limits on Research, Panel Says
ERIC Educational Resources Information Center
Monastersky, Richard
2007-01-01
Security restrictions imposed since 2001 have unnecessarily constrained university researchers, and those controls should be loosened in order to enhance the nation's economic and strategic competitiveness, says a report issued by the National Research Council of the National Academies. The report's authors, a committee of high-ranking officials…
Implantable electronics: emerging design issues and an ultra light-weight security solution.
Narasimhan, Seetharam; Wang, Xinmu; Bhunia, Swarup
2010-01-01
Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Master. 104.205 Section 104.205... SECURITY: VESSELS Vessel Security Requirements § 104.205 Master. (a) Nothing in this part is intended to permit the Master to be constrained by the Company, the vessel owner or operator, or any other person...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Master. 104.205 Section 104.205... SECURITY: VESSELS Vessel Security Requirements § 104.205 Master. (a) Nothing in this part is intended to permit the Master to be constrained by the Company, the vessel owner or operator, or any other person...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Master. 104.205 Section 104.205... SECURITY: VESSELS Vessel Security Requirements § 104.205 Master. (a) Nothing in this part is intended to permit the Master to be constrained by the Company, the vessel owner or operator, or any other person...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Master. 104.205 Section 104.205... SECURITY: VESSELS Vessel Security Requirements § 104.205 Master. (a) Nothing in this part is intended to permit the Master to be constrained by the Company, the vessel owner or operator, or any other person...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Master. 104.205 Section 104.205... SECURITY: VESSELS Vessel Security Requirements § 104.205 Master. (a) Nothing in this part is intended to permit the Master to be constrained by the Company, the vessel owner or operator, or any other person...
A Decomposition Method for Security Constrained Economic Dispatch of a Three-Layer Power System
NASA Astrophysics Data System (ADS)
Yang, Junfeng; Luo, Zhiqiang; Dong, Cheng; Lai, Xiaowen; Wang, Yang
2018-01-01
This paper proposes a new decomposition method for the security-constrained economic dispatch in a three-layer large-scale power system. The decomposition is realized using two main techniques. The first is to use Ward equivalencing-based network reduction to reduce the number of variables and constraints in the high-layer model without sacrificing accuracy. The second is to develop a price response function to exchange signal information between neighboring layers, which significantly improves the information exchange efficiency of each iteration and results in less iterations and less computational time. The case studies based on the duplicated RTS-79 system demonstrate the effectiveness and robustness of the proposed method.
A malicious pattern detection engine for embedded security systems in the Internet of Things.
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
2014-12-16
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.
NASA Astrophysics Data System (ADS)
Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter
2013-05-01
Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.
NASA Astrophysics Data System (ADS)
Cai, X.; Zhang, X.; Zhu, T.
2014-12-01
Global food security is constrained by local and regional land and water availability, as well as other agricultural input limitations and inappropriate national and global regulations. In a theoretical context, this study assumes that optimal water and land uses in local food production to maximize food security and social welfare at the global level can be driven by global trade. It follows the context of "virtual resources trade", i.e., utilizing international trade of agricultural commodities to reduce dependency on local resources, and achieves land and water savings in the world. An optimization model based on the partial equilibrium of agriculture is developed for the analysis, including local commodity production and land and water resources constraints, demand by country, and global food market. Through the model, the marginal values (MVs) of social welfare for water and land at the level of so-called food production units (i.e., sub-basins with similar agricultural production conditions) are derived and mapped in the world. In this personation, we will introduce the model structure, explain the meaning of MVs at the local level and their distribution around the world, and discuss the policy implications for global communities to enhance global food security. In particular, we will examine the economic values of water and land under different world targets of food security (e.g., number of malnourished population or children in a future year). In addition, we will also discuss the opportunities on data to improve such global modeling exercises.
Disk mass and disk heating in the spiral galaxy NGC 3223
NASA Astrophysics Data System (ADS)
Gentile, G.; Tydtgat, C.; Baes, M.; De Geyter, G.; Koleva, M.; Angus, G. W.; de Blok, W. J. G.; Saftly, W.; Viaene, S.
2015-04-01
We present the stellar and gaseous kinematics of an Sb galaxy, NGC 3223, with the aim of determining the vertical and radial stellar velocity dispersion as a function of radius, which can help to constrain disk heating theories. Together with the observed NIR photometry, the vertical velocity dispersion is also used to determine the stellar mass-to-light (M/L) ratio, typically one of the largest uncertainties when deriving the dark matter distribution from the observed rotation curve. We find a vertical-to-radial velocity dispersion ratio of σz/σR = 1.21 ± 0.14, significantly higher than expectations from known correlations, and a weakly-constrained Ks-band stellar M/L ratio in the range 0.5-1.7, which is at the high end of (but consistent with) the predictions of stellar population synthesis models. Such a weak constraint on the stellar M/L ratio, however, does not allow us to securely determine the dark matter density distribution. To achieve this, either a statistical approach or additional data (e.g. integral-field unit) are needed. Based on observations collected at the European Southern Observatory, Chile, under proposal 68.B-0588.
A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
2014-01-01
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382
Reed, Sasha C.; Smith, William K.; Cleveland, Cory C.; Miller, Norman L.; Running, Steven W.
2012-01-01
Background/Question/Methods Currently, the United States (U.S.) supplies roughly half the world’s biofuel (secondary bioenergy), with the Energy Independence and Security Act of 2007 (EISA) stipulating an additional three-fold increase in annual production by 2022. Implicit in such energy targets is an associated increase in annual biomass demand (primary bioenergy) from roughly 2.9 to 7.4 exajoules (EJ; 1018 Joules). Yet, many of the factors used to estimate future bioenergy potential are relatively unresolved, bringing into question the practicality of the EISA’s ambitious bioenergy targets. Here, our objective was to constrain estimates of primary bioenergy potential (PBP) for the conterminous U.S. using satellite-derived net primary productivity (NPP) data (measured for every 1 km2 of the 7.2 million km2 of vegetated land in the conterminous U.S) as the most geographically explicit measure of terrestrial growth capacity. Results/Conclusions We show that the annual primary bioenergy potential (PBP) of the conterminous U.S. realistically ranges from approximately 5.9 (± 1.4) to 22.2 (± 4.4) EJ, depending on land use. The low end of this range represents current harvest residuals, an attractive potential energy source since no additional harvest land is required. In contrast, the high end represents an annual harvest over an additional 5.4 million km2 or 75% of vegetated land in the conterminous U.S. While we identify EISA energy targets as achievable, our results indicate that meeting such targets using current technology would require either an 80% displacement of current croplands or the conversion of 60% of total rangelands. Our results differ from previous evaluations in that we use high resolution, satellite-derived NPP as an upper-envelope constraint on bioenergy potential, which removes the need for extrapolation of plot-level observed yields over large spatial areas. Establishing realistically constrained estimates of bioenergy potential seems a critical next step for effectively incorporating bioenergy into future U.S. energy portfolios.
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable security...
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-06-26
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-01-01
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669
Smith, W. Kolby; Cleveland, Cory C.; Reed, Sasha C.; Miller, Norman L.; Running, Steven W.
2012-01-01
United States (U.S.) energy policy includes an expectation that bioenergy will be a substantial future energy source. In particular, the Energy Independence and Security Act of 2007 (EISA) aims to increase annual U.S. biofuel (secondary bioenergy) production by more than 3-fold, from 40 to 136 billion liters ethanol, which implies an even larger increase in biomass demand (primary energy), from roughly 2.9 to 7.4 EJ yr–1. However, our understanding of many of the factors used to establish such energy targets is far from complete, introducing significgant uncertainty into the feasibility of current estimates of bioenergy potential. Here, we utilized satellite-derived net primary productivity (NPP) data—measured for every 1 km2 of the 7.2 million km2 of vegetated land in the conterminous U.S.—to estimate primary bioenergy potential (PBP). Our results indicate that PBP of the conterminous U.S. ranges from roughly 5.9 to 22.2 EJ yr–1, depending on land use. The low end of this range represents the potential when harvesting residues only, while the high end would require an annual biomass harvest over an area more than three times current U.S. agricultural extent. While EISA energy targets are theoretically achievable, we show that meeting these targets utilizing current technology would require either an 80% displacement of current crop harvest or the conversion of 60% of rangeland productivity. Accordingly, realistically constrained estimates of bioenergy potential are critical for effective incorporation of bioenergy into the national energy portfolio.
Deep resistivity structure of Yucca Flat, Nevada Test Site, Nevada
Asch, Theodore H.; Rodriguez, Brian D.; Sampson, Jay A.; Wallin, Erin L.; Williams, Jackie M.
2006-01-01
The Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) at their Nevada Site Office are addressing groundwater contamination resulting from historical underground nuclear testing through the Environmental Management program and, in particular, the Underground Test Area project. One issue of concern is the nature of the somewhat poorly constrained pre Tertiary geology and its effects on ground-water flow in the area adjacent to a nuclear test. Ground water modelers would like to know more about the hydrostratigraphy and geologic structure to support a hydrostratigraphic framework model that is under development for the Yucca Flat Corrective Action Unit (CAU). During 2003, the U.S. Geological Survey, supported by the DOE and NNSA-NSO, collected and processed data from 51 magnetotelluric (MT) and audio-magnetotelluric (AMT) stations at the Nevada Test Site in and near Yucca Flat to assist in characterizing the pre-Tertiary geology in that area. The primary purpose was to refine the character, thickness, and lateral extent of pre Tertiary confining units. In particular, a major goal has been to define the upper clastic confining unit (late Devonian - Mississippian-age siliciclastic rocks assigned to the Eleana Formation and Chainman Shale) in the Yucca Flat area. The MT and AMT data have been released in separate USGS Open File Reports. The Nevada Test Site magnetotelluric data interpretation presented in this report includes the results of detailed two-dimensional (2 D) resistivity modeling for each profile (including alternative interpretations) and gross inferences on the three dimensional (3 D) character of the geology beneath each station. The character, thickness, and lateral extent of the Chainman Shale and Eleana Formation that comprise the Upper Clastic Confining Unit are generally well determined in the upper 5 km. Inferences can be made regarding the presence of the Lower Clastic Confining Unit at depths below 5 km. Large fault structures such as the CP Thrust fault, the Carpetbag fault, and the Yucca fault that cross Yucca Flat are also discernable as are other smaller faults. The subsurface electrical resistivity distribution and inferred geologic structures determined by this investigation should help constrain the hydrostratigraphic framework model that is under development.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vargas, L.S.; Quintana, V.H.; Vannelli, A.
This paper deals with the use of Successive Linear Programming (SLP) for the solution of the Security-Constrained Economic Dispatch (SCED) problem. The authors tutorially describe an Interior Point Method (IPM) for the solution of Linear Programming (LP) problems, discussing important implementation issues that really make this method far superior to the simplex method. A study of the convergence of the SLP technique and a practical criterion to avoid oscillatory behavior in the iteration process are also proposed. A comparison of the proposed method with an efficient simplex code (MINOS) is carried out by solving SCED problems on two standard IEEEmore » systems. The results show that the interior point technique is reliable, accurate and more than two times faster than the simplex algorithm.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Elbert, Stephen T.; Kalsi, Karanjit; Vlachopoulou, Maria
Financial Transmission Rights (FTRs) help power market participants reduce price risks associated with transmission congestion. FTRs are issued based on a process of solving a constrained optimization problem with the objective to maximize the FTR social welfare under power flow security constraints. Security constraints for different FTR categories (monthly, seasonal or annual) are usually coupled and the number of constraints increases exponentially with the number of categories. Commercial software for FTR calculation can only provide limited categories of FTRs due to the inherent computational challenges mentioned above. In this paper, a novel non-linear dynamical system (NDS) approach is proposed tomore » solve the optimization problem. The new formulation and performance of the NDS solver is benchmarked against widely used linear programming (LP) solvers like CPLEX™ and tested on large-scale systems using data from the Western Electricity Coordinating Council (WECC). The NDS is demonstrated to outperform the widely used CPLEX algorithms while exhibiting superior scalability. Furthermore, the NDS based solver can be easily parallelized which results in significant computational improvement.« less
2002-06-01
NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS WHAT PRACTICES IN AIRPORT SECURITY SHOULD THE UNITED STATES IMPLEMENT AT...COVERED Master’s Thesis 4. TITLE AND SUBTITLE What Practices in Airport Security Should the United States Implement at Commercial...complacency and conflicts of interest. 14. SUBJECT TERMS Airport Security , Aviation Security Systems, Terrorism, Hijacking
2012-05-15
strategies, department and agency policies, doctrine, and reports, as well as independent studies and articles . Research findings demonstrate a...strategies, department and agency policies, doctrine, and reports, as well as independent studies and articles . Research findings demonstrate a...security interests abroad with the constraints of our domestic financial crisis. The U.S. national deficit is almost $16 trillion and competitors such as
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... Rule 5.2(j)(3), the Exchange's listing standards for Investment Company Units (``Units'').\\3\\ \\3\\ An Investment Company Unit is a security that represents an interest in a registered investment company that... of securities (or holds securities in another registered investment company that holds securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... 1974; Department of Homeland Security/United States Citizenship and Immigration Services--DHS/USCIS-011... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
Unbalanced Stability: Applying Lessons from American Cities in Stability Operations
2011-05-19
teenagers congregating on street corners, public solicitation for prostitution, begging, public drinking, verbal harassment of women on the street, and...United Nations Security Council, “United Nations Security Council Resolution 1590 (2005).” http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590 (2005...Security Council. “United Nations Security Council Resolution 1590 (2005).” United Nations. http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590
31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.
Code of Federal Regulations, 2010 CFR
2010-07-01
... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities of the United States. The existing distinctive papers shall be used for the printing of interest...
Whither the RMA: Two Perspectives on Tomorrow’s Army
1994-07-22
HENRI (ROY) ALCALA heads a consulting firm, Alcala Enterprises, which specializes in national security and foreign policy issues . He retired from the...thinking about national security was too constrained by immediate issues . Downsizing of force structure, budget reductions, Bosnia, and other issues were all...these immediate issues as signposts of the future, even though little evidence existed to support such aI :use. From many years of experience in long
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments
2014-01-01
systems and enterprise services during mission operation can enable greater situational awareness and empowerment for the tactical user . For example...April 01, 2007. [17] Robbins, D., Unmanned Aircraft Operational Integration using MITRE’s Cursor on Target, The Edge, Volume 10, Number 2, MITRE...appropriate level of security protection and quality of service (QoS) for the tactical users is one possibility. Such an approach is not cost ef
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.
Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro
2018-02-13
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors
Huarte, Maider; Romaña, Pedro
2018-01-01
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
Guo, Lifeng; Yau, Wei-Chuen
2015-02-01
Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.
Evaluating Options for Civil Space Situational Awareness (SSA)
NASA Astrophysics Data System (ADS)
Lal, B.; Carioscia, S. A.
In recent years, the number of active satellites and human-made orbital space debris has increased dramatically. An expansion of activities in space, as is currently being proposed by many commercial and international entities, is expected to further exacerbate this challenge. The 18th Space Control Squadron under the Department of Defense (DOD) United States Strategic Command provides space situational awareness (SSA) services to users outside the national security community at no cost. International and commercial users demand better SSA service than is currently feasible, and the demand comes at a time when DOD is under pressure to better prepare for and respond to growing space-based threats to national security. Concerned about the possibility of overextending across conflicting missions in a fiscally constrained environment, some DOD officials have publicly noted a desire to move SSA services not related to national security out of DOD purview. Responding to a request from the Federal Aviation Administration (FAA) Office of Commercial Space Transportation (AST), researchers at the Science and Technology Policy Institute (STPI) identified and evaluated potential approaches for providing SSA services for civil and commercial operations in space. In this paper, we summarize the report [1] and present the pros and cons of four approaches to the provision of civil SSA services in the United States: (1) maintaining status quo through continued provision by DOD; (2) provision by a civil government entity; (3) industry self-provision; and (4) provision by an international organization. Within the second approach, assuming the provision of SSA by a civil agency, STPI further identified and discussed four options: (1) civil agency service capability embedded within DOD; (2) independent civil service capability, using DOD software and systems; (3) independent civil service capability, using commercial software and systems; and (4) the government certifies non-governmental entities (NGEs) to provide service capability. All of these approaches keep military and national security SSA services within DOD. Selecting which approach or option to proceed with depends on the determination of the role of government in the domain as well as consideration of other policy challenges.
Quan, Hao; Srinivasan, Dipti; Khosravi, Abbas
2015-09-01
Penetration of renewable energy resources, such as wind and solar power, into power systems significantly increases the uncertainties on system operation, stability, and reliability in smart grids. In this paper, the nonparametric neural network-based prediction intervals (PIs) are implemented for forecast uncertainty quantification. Instead of a single level PI, wind power forecast uncertainties are represented in a list of PIs. These PIs are then decomposed into quantiles of wind power. A new scenario generation method is proposed to handle wind power forecast uncertainties. For each hour, an empirical cumulative distribution function (ECDF) is fitted to these quantile points. The Monte Carlo simulation method is used to generate scenarios from the ECDF. Then the wind power scenarios are incorporated into a stochastic security-constrained unit commitment (SCUC) model. The heuristic genetic algorithm is utilized to solve the stochastic SCUC problem. Five deterministic and four stochastic case studies incorporated with interval forecasts of wind power are implemented. The results of these cases are presented and discussed together. Generation costs, and the scheduled and real-time economic dispatch reserves of different unit commitment strategies are compared. The experimental results show that the stochastic model is more robust than deterministic ones and, thus, decreases the risk in system operations of smart grids.
78 FR 29147 - 30-Day Notice and Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... DEPARTMENT OF HOMELAND SECURITY United States Secret Service 30-Day Notice and Request for... Management and Budget, Attn: Desk Officer for United States Secret Service, Department of Homeland Security... directed to: United States Secret Service, Security Clearance Division, Attn: ASAIC Michael Smith...
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio
2015-08-28
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.
Retirement and health benefits for Mexican migrant workers returning from the United States
Aguila, Emma; Zissimopoulos, Julie
2013-01-01
In the absence of a bilateral agreement for the portability and totalization of social security contributions between the United States and Mexico, this article examines the access to pension and health insurance benefits and employment status of older Mexican return migrants. We find that return migrants who have spent less than a year in the United States have a similar level of access to social security benefits as non-migrants. Return migrants who have spent at least a year in the United States are less likely to have public health insurance or social security benefits, and could be more vulnerable to poverty in old age. These results inform the debate on a bilateral social security agreement between the United States and Mexico to improve return migrants’ social security. PMID:23750049
77 FR 55777 - Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... 1625-AA87 Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY AGENCY... a permanent security zone on the waters of the East River and Bronx Kill, in the vicinity of... security zone on the East River, New York; and clarify the enforcement times and locations of the security...
49 CFR 1554.101 - Security Measures.
Code of Federal Regulations, 2014 CFR
2014-10-01
... certificated repair stations located— (1) On airport. On an air operations area or security identification display area of an airport covered by an airport security program under 49 CFR part 1542 in the United States, or on the security restricted area of any commensurate airport outside the United States...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E-Verify Self Check System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Self Check...
Analysis of the Strategy to Combat Maritime Piracy
2009-12-11
26 Contemporary Maritime Piracy: Causative Factors...NSC National Security Council PUC Persons Under Control viii SLOC Sea lines of communication SSA Ships Security Assessment SSP Ships Security Plan...UNCLOS United Nations Convention on the Law of the Sea USD United States Dollar U.S. United States ix ILLUSTRATIONS Page Figure 1. Factors
6 CFR 13.45 - Deposit in Treasury of United States.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Deposit in Treasury of United States. 13.45 Section 13.45 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.45 Deposit in Treasury of United States. All amounts collected pursuant to this part...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-18
... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of... titled, ``DHS/USCG-024 Auxiliary Database (AUXDATA) System of Records.'' The AUXDATA system is the USCG's...
Enhancing National Security in Jamaica Through the Development and Employment of Special Forces
2005-06-01
face Jamaica. This study examines the value, utility, and possible roles of such a unit in the Jamaican security landscape, and makes recommendations...and possible roles of such a unit in the Jamaican security landscape, and makes recommendations for the establishment and employment of such a unit...
Beyond Containment and Deterrence: A Security Framework for Europe in the 21st Century
1990-04-02
decades of the 21st Century in Europe, and examines DDO FJoA 1473 E. T1O. Of INOV 65 IS OBSOLETE Uaf eSECRIT CUnclassified SECURITY CLASSIFICATION’ OF THIS... Poland , and parts of France and Russia, but it did not truely unify Germany. Bismarck unified only parts of Germany which he could constrain under...Europe, Central Europe, the Balkans, and the Soviet Union. Central Europe includes Vest Germany, East Germany, Austria, Czechoslavakia, Poland , and
Social Security: A Present Value Analysis of Old Age Survivors Insurance (OASI) Taxes and Benefits.
1995-12-01
private sector plans and provides a spreadsheet model for making this comparison of plans using different assumptions. The investigation was done by collecting data from various books, Government publications, and various Government agencies to conduct a spreadsheet analysis of three different wage-earning groups, assuming various real interest rates potentially earned in the private sector . A comparison of Social Security with alternative private sector plans is important to the DoD/DoN because less constrained budgets could
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
20 CFR 404.1901 - Introduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... social security system of the United States and the social security system of a foreign country. An... be based on a combination of a person's periods of coverage under the social security system of the United States and the social security system of the foreign country. An agreement also provides for the...
Jordaan, Sarah M; Diaz Anadon, Laura; Mielke, Erik; Schrag, Daniel P
2013-01-01
The Renewable Fuel Standard (RFS) is among the cornerstone policies created to increase U.S. energy independence by using biofuels. Although greenhouse gas emissions have played a role in shaping the RFS, water implications are less understood. We demonstrate a spatial, life cycle approach to estimate water consumption of transportation fuel scenarios, including a comparison to current water withdrawals and drought incidence by state. The water consumption and land footprint of six scenarios are compared to the RFS, including shale oil, coal-to-liquids, shale gas-to-liquids, corn ethanol, and cellulosic ethanol from switchgrass. The corn scenario is the most water and land intense option and is weighted toward drought-prone states. Fossil options and cellulosic ethanol require significantly less water and are weighted toward less drought-prone states. Coal-to-liquids is an exception, where water consumption is partially weighted toward drought-prone states. Results suggest that there may be considerable water and land impacts associated with meeting energy security goals through using only biofuels. Ultimately, water and land requirements may constrain energy security goals without careful planning, indicating that there is a need to better balance trade-offs. Our approach provides policymakers with a method to integrate federal policies with regional planning over various temporal and spatial scales.
2013-06-01
the former Allies of the Second World War, several European countries, the United States of America , and Canada came together to provide for their...European countries, the United States of America , and Canada came together to provide for their security and in 1949 formed a unique security alliance, the ...European countries, the United States of America (U.S.), and Canada came together to provide for their
United States Air Force Security Forces in an Era of Terrorist Threats
1999-06-01
their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices
Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio
2015-01-01
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677
Hidden Costs of the Campus Security Force.
ERIC Educational Resources Information Center
Temple, Charles M.
1981-01-01
Information on the security operations of public four-year colleges and universities is examined, and the case of the University of Tennessee, Chattanooga (UTC), which saved $66,000 a year from the security unit's operational budget, is noted. Of 561 questionnaires sent to public institutions regarding the general operation of security units,…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0031] Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011...
[Psychiatric security units in Norway. Patients and activity].
Linaker, O M; Thoresen, R; Figenschou, L; Sølvberg, H; Refsnes, U; Jakobsen, D
1994-05-20
The authors briefly discuss past and present reasons for the psychiatric security unit system in Norway. They describe the patients in these units at the beginning of 1993 (N = 123). Of these patients, 16% were females, 78% had a main diagnosis of schizophrenia, and 12% were admitted because of personality disorders. Physical restraints had been used for 25%, pharmacological restraints for 17%, and forced pharmacological treatment had been necessary for 26% of the patients during the last six months. There were high rates of behaviour problems related to criminality, abuse, violence and auto-aggression. Nearly all the patients were committed involuntarily, and additional legal restrictions were imposed for one third of them. The majority (63%) of the patients had been in security units for more than one year. The highest levels of security within the security unit system were used for those with the most serious criminality or behaviour problems prior to admission.
A Cluster-Based Framework for the Security of Medical Sensor Environments
NASA Astrophysics Data System (ADS)
Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos
The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.
Method of securing filter elements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Erik P.; Haslam, Jeffery L.; Mitchell, Mark A.
2016-10-04
A filter securing system including a filter unit body housing; at least one tubular filter element positioned in the filter unit body housing, the tubular filter element having a closed top and an open bottom; a dimple in either the filter unit body housing or the top of the tubular filter element; and a socket in either the filter unit body housing or the top of the tubular filter element that receives the dimple in either the filter unit body housing or the top of the tubular filter element to secure the tubular filter element to the filter unit bodymore » housing.« less
Code of Federal Regulations, 2011 CFR
2011-07-01
.... 1 et seq.), the tariff laws of the United States, or the Social Security Act (42 U.S.C. 301 et seq... individual, the taxpayer identifying number is generally the individual's social security number. (c) General...) Social Security benefit payments (excluding Supplemental Security Income payments), Black Lung (part B...
Rep. Miller, Jeff [R-FL-1
2009-04-30
House - 05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
Advanced Computational Methods for Security Constrained Financial Transmission Rights
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kalsi, Karanjit; Elbert, Stephen T.; Vlachopoulou, Maria
Financial Transmission Rights (FTRs) are financial insurance tools to help power market participants reduce price risks associated with transmission congestion. FTRs are issued based on a process of solving a constrained optimization problem with the objective to maximize the FTR social welfare under power flow security constraints. Security constraints for different FTR categories (monthly, seasonal or annual) are usually coupled and the number of constraints increases exponentially with the number of categories. Commercial software for FTR calculation can only provide limited categories of FTRs due to the inherent computational challenges mentioned above. In this paper, first an innovative mathematical reformulationmore » of the FTR problem is presented which dramatically improves the computational efficiency of optimization problem. After having re-formulated the problem, a novel non-linear dynamic system (NDS) approach is proposed to solve the optimization problem. The new formulation and performance of the NDS solver is benchmarked against widely used linear programming (LP) solvers like CPLEX™ and tested on both standard IEEE test systems and large-scale systems using data from the Western Electricity Coordinating Council (WECC). The performance of the NDS is demonstrated to be comparable and in some cases is shown to outperform the widely used CPLEX algorithms. The proposed formulation and NDS based solver is also easily parallelizable enabling further computational improvement.« less
Securing resource constraints embedded devices using elliptic curve cryptography
NASA Astrophysics Data System (ADS)
Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad
2014-06-01
The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A feedback-based secure path approach for wireless sensor network data collection.
Mao, Yuxin; Wei, Guiyi
2010-01-01
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jim Alves-Foss
2011-08-01
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less
Exploring Public Health's roles and limitations in advancing food security in British Columbia.
Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S
2014-07-22
This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-19
... security zones as RNAs. The Marine Air Terminal, United Nations, and United Nations West Channel Closure... United Nations General Assembly RNA Regulated Navigation Area UN United Nations A. Public Participation... comment, it will be considered as having been received by the Coast Guard when it is received at the...
Khan, Muhammad Khurram; Alghathbar, Khaled
2010-01-01
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0062] Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027 Recruiting Files System of... accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue an...
Constrained State Estimation for Individual Localization in Wireless Body Sensor Networks
Feng, Xiaoxue; Snoussi, Hichem; Liang, Yan; Jiao, Lianmeng
2014-01-01
Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF) show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS), which gets better filtering performance than NILS without constraint. PMID:25390408
The deterrent forces of the Commonwealth of Independent States
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kortunov, S.
The rapid changes that are occurring in Europe and in the world at large create qualitatively new military and political realities and will force nuclear powers to make major adjustments in their foreign policy and military-technological thinking. The new situation will certainly lead to changes in both the nuclear doctrines of those countries and their approaches to nuclear forces - both strategic and tactical - as will be needed to ensure national security. This applies fully to the Commonwealth of Independent States (the former USSR), whose nuclear doctrine, like that of the North Atlantic Treaty Organization (NATO), is now beingmore » overhauled. It is well known that the former Soviet Union in its public declarations, including those made at the highest political level, has been strongly critical of the doctrine of deterrence. An unbiased historical analysis of the postwar period also demonstrates that military competition between the Soviet Union and the United States in the nuclear field followed the action-reaction logic, the constraining factors being primarily financial and technological rather than moral. Parity was initially interpreted as numerical equality in strategic nuclear arms and later as rough equality in operational nuclear capabilities. Another confirmation that the Soviet Union had based its policy precisely on the doctrine of deterrence is the Antiballistic Missile (ABM) Treaty, which limits the antiballistic missile systems of the two sides to purely symbolic numbers of ABMs and effectively exposes the former Soviet Union and the United States to a retaliatory strike. Nuclear deterrence is a modus vivendi of the world we live in, and it will stay that way until nations devise a fundamentally new system of maintaining international security. The problem is that the nuclear powers have more than enough nuclear weapons to make deterrence work effectively.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... DEPARTMENT OF HOMELAND SECURITY United States Immigration and Customs Enforcement Agency... Department of Homeland Security, U.S. Immigration and Customs Enforcement (ICE), will submit the following... United States Immigration and Customs Enforcement, Department of Homeland Security, and sent via...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gibbs, P. W.
Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.
Achieving an Effective National Security Posture in an Age of Austerity
2014-05-14
then the packages move through 300 miles of conveyor sorting- belts Wal-Mart and Dell distinguish themselves based on their “sense and respond...Require “cost” as a design /military “requirement” (because cost, in a resource-constrained environment, is numbers; and, per Lanchester, numbers are
Challenge and Response: Anticipating US Military Security Concerns
1994-08-01
in the U.S. And the Russian Orthodox Church may emerge as another such political force as was evidenced by its mediative role in the turbulent days...objectives (ends) and public opinion. Recall the turmoil in the United States during the Vietnam War and how 471 internal politics affected the...ABSTRACT 15. SUBJECT TERMS Military planning - United States; National Security - United States; World politics - 1989 - 16. SECURITY CLASSIFICATION OF
Fenelon, Joseph M.; Sweetkind, Donald S.; Elliott, Peggy E.; Laczniak, Randell J.
2012-01-01
Contaminants introduced into the subsurface of Yucca Flat, Nevada National Security Site, by underground nuclear testing are of concern to the U.S. Department of Energy and regulators responsible for protecting human health and safety. The potential for contaminant movement away from the underground test areas and into the accessible environment is greatest by groundwater transport. The primary hydrologic control on this transport is evaluated and examined through a set of contour maps developed to represent the hydraulic-head distribution within the two major aquifer systems underlying the area. Aquifers and confining units within these systems were identified and their extents delineated by merging and analyzing hydrostratigraphic framework models developed by other investigators from existing geologic information. Maps of the hydraulic-head distributions in the major aquifer systems were developed from a detailed evaluation and assessment of available water-level measurements. The maps, in conjunction with regional and detailed hydrogeologic cross sections, were used to conceptualize flow within and between aquifer systems. Aquifers and confining units are mapped and discussed in general terms as being one of two aquifer systems: alluvial-volcanic or carbonate. The carbonate aquifers are subdivided and mapped as independent regional and local aquifers, based on the continuity of their component rock. Groundwater flow directions, approximated from potentiometric contours, are indicated on the maps and sections and discussed for the alluvial-volcanic and regional carbonate aquifers. Flow in the alluvial-volcanic aquifer generally is constrained by the bounding volcanic confining unit, whereas flow in the regional carbonate aquifer is constrained by the siliceous confining unit. Hydraulic heads in the alluvial-volcanic aquifer typically range from 2,400 to 2,530 feet and commonly are elevated about 20-100 feet above heads in the underlying regional carbonate aquifer. Flow directions in the alluvial-volcanic aquifer are variable and are controlled by localized areas where small amounts of water can drain into the regional carbonate aquifer. These areas commonly are controlled by geologic structures, such as Yucca fault. Flow in the regional carbonate aquifer generally drains to the center of the basin; from there flow is to the south-southeast out of the study area toward downgradient discharge areas. Southward flow in the regional carbonate aquifer occurs in a prominent potentiometric trough that results from a faulted zone of enhanced permeability centered about Yucca fault. Vertical hydraulic gradients between the aquifer systems are downward throughout the study area; however, flow from the alluvial-volcanic aquifer into the underlying carbonate aquifer is believed to be minor because of the intervening confining unit. Transient water levels were identified and analyzed to understand hydraulic responses to stresses in Yucca Flat. Transient responses have only a minimal influence on the general predevelopment flow directions in the aquifers. The two primary anthropogenic stresses on the groundwater system since about 1950 are nuclear testing and pumping. Most of the potentiometric response in the aquifers to pumping or past nuclear testing is interim and localized. Persistent, long-lasting changes in hydraulic head caused by nuclear testing occur only in confining units where groundwater fluxes are negligible. A third stress on the groundwater system is natural recharge, which can cause minor, short- and long-term changes in water levels. Long-term hydrographs affected by natural recharge, grouped by similar trend, cluster in distinct areas of Yucca Flat and are controlled primarily by spatial differences in local recharge patterns.
78 FR 25324 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-30
... rules governing offers and sales of securities made outside the United States without registration under... 5 of the Securities Act applies to offers and sales of securities outside of the United States...) Whether this collection of information is necessary for the proper performance of the functions of the...
Algebra for All: California's Eighth-Grade Algebra Initiative as Constrained Curricula
ERIC Educational Resources Information Center
Domina, Thurston; Penner, Andrew M.; Penner, Emily K.; Conley, AnneMarie
2014-01-01
Background/Context: Across the United States, secondary school curricula are intensifying as a growing proportion of students enroll in high-level academic math courses. In many districts, this intensification process occurs as early as eighth grade, where schools are effectively constraining their mathematics curricula by restricting course…
Constrained tri-sphere kinematic positioning system
Viola, Robert J
2010-12-14
A scalable and adaptable, six-degree-of-freedom, kinematic positioning system is described. The system can position objects supported on top of, or suspended from, jacks comprising constrained joints. The system is compatible with extreme low temperature or high vacuum environments. When constant adjustment is not required a removable motor unit is available.
Source partitioning of methane emissions and its seasonality in the U.S. Midwest
USDA-ARS?s Scientific Manuscript database
The methane (CH4) budget and its source partitioning are poorly constrained in the Midwestern, United States. We used tall tower (185 m) aerodynamic flux measurements and atmospheric scale factor Bayesian inversions (SFBI) to constrain the monthly budget and to partition the total budget into natura...
75 FR 51854 - Privacy Act of 1974: Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... schedules of the United States Securities and Exchange Commission and as approved by the National Archives... of Trading and Markets, U.S. Securities and Exchange Commission, 100 F Street, NE., Washington, DC... schedules of the United States Securities and Exchange Commission and as approved by the National Archives...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-09
... of 1974: Implementation of Exemptions; Department of Homeland Security United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records System of Records AGENCY... rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Immigration...
Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.
2007-01-01
The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930
Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P
2007-10-11
The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.
NASA Technical Reports Server (NTRS)
Deliyannis, Constantine P.; Demarque, Pierre
1991-01-01
Stellar evolutionary models with diffusion are used to show that observations of lithium in extreme halo stars provide crucial constraints on the magnitude of the effects of helium diffusion. The flatness of the observed Li-T(eff) relation severely constrains diffusion Li isochrones, which tend to curve downward toward higher T(eff). It is argued that Li observations at the hot edge of the plateau are particularly important in constraining the effects of helium diffusion; yet, they are currently few in number. It is proposed that additional observations are required there, as well as below 5500 K, to define more securely the morphology of the halo Li abundances. Implications for the primordial Li abundance are considered. It is suggested that a conservative upper limit to the initial Li abundance, due to diffusive effects alone, is 2.35.
Bode, Ingvild
2017-01-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586
Bode, Ingvild
2018-06-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-27
... immigrants or nonimmigrants, of aliens who are subject to United Nations Security Council travel bans as of... served by suspending the entry into the United States, as immigrants or nonimmigrants, of aliens whose... find that the unrestricted immigrant and nonimmigrant entry into the United States of persons described...
Code of Federal Regulations, 2014 CFR
2014-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2013 CFR
2013-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2012 CFR
2012-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2010 CFR
2010-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Code of Federal Regulations, 2011 CFR
2011-04-01
... otherwise permanently residing in the United States under color of law. 416.1329 Section 416.1329 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... in the United States under color of law. (a) A recipient ceases to be an eligible individual or...
Mission Assurance Modeling and Simulation: A Cyber Security Roadmap
NASA Technical Reports Server (NTRS)
Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna
2012-01-01
This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.
78 FR 30847 - White Pine-Nye Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... Advisory Committee will meet in Eureka, Nevada. The Committee is authorized under the Secure Rural Schools... the full agenda may be previewed at: https://fsplaces.fs.fed.us/fsfiles/unit/wo/secure_rural_schools... will be posted at https://fsplaces.fs.fed.us/fsfiles/unit/wo/secure_rural_schools.nsf , within 21 days...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-08
... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services -011 E-Verify Program... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
26 CFR 1.884-5 - Qualified resident.
Code of Federal Regulations, 2014 CFR
2014-04-01
... established securities market (within the meaning of paragraph (d) of this section) in that country or the... securities market (within the meaning of paragraph (d) of this section) in the United States; (D) A not-for... class of stock is listed on an established securities market in the United States or in the country of...
26 CFR 1.884-5 - Qualified resident.
Code of Federal Regulations, 2013 CFR
2013-04-01
... established securities market (within the meaning of paragraph (d) of this section) in that country or the... securities market (within the meaning of paragraph (d) of this section) in the United States; (D) A not-for... class of stock is listed on an established securities market in the United States or in the country of...
26 CFR 1.884-5 - Qualified resident.
Code of Federal Regulations, 2012 CFR
2012-04-01
... established securities market (within the meaning of paragraph (d) of this section) in that country or the... securities market (within the meaning of paragraph (d) of this section) in the United States; (D) A not-for... class of stock is listed on an established securities market in the United States or in the country of...
7 CFR 160.75 - Loan of standards under security deposit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 3 2010-01-01 2010-01-01 false Loan of standards under security deposit. 160.75... REGULATIONS AND STANDARDS FOR NAVAL STORES Loan and Care of United States Standards § 160.75 Loan of standards under security deposit. Duplicates of the United States Standards for rosin may be loaned to interested...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... involves important physical modifications to the HNP, Unit 1 security system. There are several issues... in which some important security modifications are planned. A direct outside access route to the... implementation deadline, the licensee currently maintains a security system acceptable to the NRC and that will...
USDA-ARS?s Scientific Manuscript database
Following its continent-wide spread in Africa during the 1970s and early 1980s, the cassava mealybug, Phenacoccus manihoti (Homoptera: Pseudococcidae) was inadvertently introduced to Southeast (SE) Asia in late 2008. In both regions P. manihoti can inflict severe damage on cassava, impact food secur...
2003-05-01
space requires both contractors---at least until sustainable performance is demonstrated • EELV program has occurred in highly cost constrained...both contractors • Take necessary actions to assure both contractors remain viable---at least until sustainable performance is demonstrated
A Multilevel Secure Constrained Intrusion Detection System Prototype
2010-12-01
information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and...Reduction Project (0704-0188) Washington DC 20503. 1 . AGENCY USE ONLY (Leave blank) 2. REPORT DATE December 2010 3. REPORT TYPE AND DATES COVERED... 1 A. MOTIVATION....................................................................................... 1 B. PURPOSE OF STUDY
USDA-ARS?s Scientific Manuscript database
Complex watershed simulation models are powerful tools that can help scientists and policy-makers address challenging topics, such as land use management and water security. In the Western Lake Erie Basin (WLEB), complex hydrological models have been applied at various scales to help describe relat...
Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA
Lee, Donggeon; Kim, Dong-Chan; Kwon, Daesung; Kim, Howon
2014-01-01
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, the computing environment is changing. Because our daily life is deeply intertwined with ubiquitous networks, the importance of security is growing. A lightweight encryption algorithm is essential for secure communication between these kinds of resource-constrained devices, and many researchers have been investigating this field. Recently, a lightweight block cipher called LEA was proposed. LEA was originally targeted for efficient implementation on microprocessors, as it is fast when implemented in software and furthermore, it has a small memory footprint. To reflect on recent technology, all required calculations utilize 32-bit wide operations. In addition, the algorithm is comprised of not complex S-Box-like structures but simple Addition, Rotation, and XOR operations. To the best of our knowledge, this paper is the first report on a comprehensive hardware implementation of LEA. We present various hardware structures and their implementation results according to key sizes. Even though LEA was originally targeted at software efficiency, it also shows high efficiency when implemented as hardware. PMID:24406859
A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection
Mao, Yuxin; Wei, Guiyi
2010-01-01
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose. PMID:22163424
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kong, Bo
China’s energy insecurity largely originates from its constrained availability, questionable reliability, and uncertain affordability of its oil supplies. The country’s fast industrialization and urbanization, together with demand for infrastructure and increasing popularity of automobiles, requires a lot of energy, but it consumes energy both intensively and inefficiently, threatening the environmental well-being of China and its neighbors. China’s risk aversion and poor energy policy making system further magnifies its perceptions of the low availability, reliability and affordability of oil imports, which further compounds its sense of energy insecurity. Distrustful of the market, and suspicious of other major energy players in themore » international market, the Chinese leadership relies on the state-centered approach, or economic nationalism, rather than a market approach to enhance its energy security. However, the country lacks not only an energy policy making system that can make and implement sound energy policies but also an energy market that relies on market prices to allocate energy resources efficiently. As a result of this domestic failure, China has pushed its national flagship companies to undertake a global scavenger hunt for energy while muddling along a messy road of energy reform at home. Setbacks in acquiring new sources of oil have validated the Chinese leadership’s belief that the international oil market is not free and China’s access to international oil is not guaranteed through the market. China’s problems in the international energy market are also perceived as evidence of attempts to prevent China from exerting international influence. China’s leadership is convinced that China should focus on areas where western capital is not heavily concentrated or where western influences are weak. With the recent revaluation of Chinese currency and growing economy, China has both the wherewithal and appetite to acquire more oil assets abroad. Both China and the United States stand at a critical juncture of history where China’s rise depends on reliable energy supplies which it increasingly imports from abroad and where the growing wealth of the United States is increasingly dependent upon China’s success. If China does not have energy security it’s 1.3 billion fuel-starved people will prevent the rest of the world from achieving energy security.« less
SNL Five-Year Facilities & Infrastructure Plan FY2015-2019
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cipriani, Ralph J.
2014-12-01
Sandia’s development vision is to provide an agile, flexible, safer, more secure, and efficient enterprise that leverages the scientific and technical capabilities of the workforce and supports national security requirements in multiple areas. Sandia’s Five-Year Facilities & Infrastructure Planning program represents a tool to budget and prioritize immediate and short-term actions from indirect funding sources in light of the bigger picture of proposed investments from direct-funded, Work for Others and other funding sources. As a complementary F&I investment program, Sandia’s indirect investment program supports incremental achievement of the development vision within a constrained resource environment.
Five Models for European Security: Implications for the United States
1992-01-01
tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in part to...distinguish the five systems from each other are reasonably clear (ad hoc, bipolar, tripolar , multi-polar collective, and overlapping), there is room...based on a tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-01-01
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-06-17
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.
Designing an optimal software intensive system acquisition: A game theoretic approach
NASA Astrophysics Data System (ADS)
Buettner, Douglas John
The development of schedule-constrained software-intensive space systems is challenging. Case study data from national security space programs developed at the U.S. Air Force Space and Missile Systems Center (USAF SMC) provide evidence of the strong desire by contractors to skip or severely reduce software development design and early defect detection methods in these schedule-constrained environments. The research findings suggest recommendations to fully address these issues at numerous levels. However, the observations lead us to investigate modeling and theoretical methods to fundamentally understand what motivated this behavior in the first place. As a result, Madachy's inspection-based system dynamics model is modified to include unit testing and an integration test feedback loop. This Modified Madachy Model (MMM) is used as a tool to investigate the consequences of this behavior on the observed defect dynamics for two remarkably different case study software projects. Latin Hypercube sampling of the MMM with sample distributions for quality, schedule and cost-driven strategies demonstrate that the higher cost and effort quality-driven strategies provide consistently better schedule performance than the schedule-driven up-front effort-reduction strategies. Game theory reasoning for schedule-driven engineers cutting corners on inspections and unit testing is based on the case study evidence and Austin's agency model to describe the observed phenomena. Game theory concepts are then used to argue that the source of the problem and hence the solution to developers cutting corners on quality for schedule-driven system acquisitions ultimately lies with the government. The game theory arguments also lead to the suggestion that the use of a multi-player dynamic Nash bargaining game provides a solution for our observed lack of quality game between the government (the acquirer) and "large-corporation" software developers. A note is provided that argues this multi-player dynamic Nash bargaining game also provides the solution to Freeman Dyson's problem, for a way to place a label of good or bad on systems.
28 CFR 0.111B - Witness Security Program.
Code of Federal Regulations, 2014 CFR
2014-07-01
... United States Marshals Service § 0.111B Witness Security Program. (a) In connection with the protection... potential witness, the Director of the United States Marshals Service and officers of the United States Marshals Service designated by the Director may: (1) Provide suitable documents to enable the person to...
28 CFR 0.111B - Witness Security Program.
Code of Federal Regulations, 2013 CFR
2013-07-01
... United States Marshals Service § 0.111B Witness Security Program. (a) In connection with the protection... potential witness, the Director of the United States Marshals Service and officers of the United States Marshals Service designated by the Director may: (1) Provide suitable documents to enable the person to...
31 CFR 370.0 - What does this part cover?
Code of Federal Regulations, 2010 CFR
2010-07-01
... RELATING TO UNITED STATES SECURITIES General Information § 370.0 What does this part cover? (a) Scope. This... does not apply to transactions for the sale of United States Savings Bonds accomplished through savings... connection with United States securities. This part also provides regulations for the electronic submission...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
...; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Physical Security Requirements 1.0... the ZNPS Physical Security Plan (PSP) for the protection of the nuclear material while in transit to... the new physical security requirements in 10 CFR 73.55. The December 2, 2010, letter included...
NASA Astrophysics Data System (ADS)
Zhao, M.; Velicogna, I.; Kimball, J. S.
2017-12-01
Climate change such as more frequent heatwaves and drought is threatening our food security and ecosystem by reducing water supply to vegetation. Characterizing vegetation response to water supply changes is not only important for evaluating and mitigating climatic change impacts on ecosystem functions and services, but also to determine the feedback mechanisms that ecosystem response may generate on the climate itself. However, such characterization is not well-known at the global scale partly because large scale observations of underground water supply changes are limited. Satellite observations of soil moisture (SM) datasets such as from Soil Moisture Active and Passive (SMAP) and European Space Agency Climate Change Initiative (ESA CCI) do not penetrate more than a few centimeters and do not capture the entire root-zone. Here we employ a newly developed Drought Severity Index from Gravity Recovery and Climate Experiment (GRACE-DSI) to complement SM observations by informing total water supply changes in the entire terrestrial hydrological cycle. We use MODIS vegetation indices as proxies for vegetation growth and investigate their seasonal and interannual variability in relation to GRACE-DSI. We find that total water supply constrains vegetation growth across the entire continental US. Water constraint begins at an earlier date of year and lasts for a longer period in the lower latitude than in the higher latitude. We also find that water constraint occurs at different phenological stages depending on vegetation type. For instance, water constrain forest growth during reproductive period in eastern US but constrain shrub land growth during green-up in Arizona (Fig. 1). In western United States, eastern Australia and the horn of Africa, we find that vegetation growth changes closely follows GRACE-DSI but can have 16-day to one-month delay with respect to SM anomalies from SMAP and ESA CCI. This suggests that in these regions, vegetation is sensitive to water supply changes in the deeper soil layers than in the shallower surface.
Source partitioning of methane emissions and its seasonality in the U.S. Midwest
Zichong Chen; Timothy J. Griffis; John M. Baker; Dylan B. Millet; Jeffrey D. Wood; Edward J. Dlugokencky; Arlyn E. Andrews; Colm Sweeney; Cheng Hu; Randall K. Kolka
2018-01-01
The methane (CH4) budget and its source partitioning are poorly constrained in the Midwestern United States. We used tall tower (185 m) aerodynamic flux measurements and atmospheric scale factor Bayesian inversions to constrain the monthly budget and to partition the total budget into natural (e.g., wetlands) and anthropogenic (e.g., livestock,...
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael
2016-03-11
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length.
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things
Garcia-Carrillo, Dan; Marin-Lopez, Rafael
2016-01-01
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length. PMID:26978362
Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)
2012-05-01
protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
VizieR Online Data Catalog: QSO eHAQ0111+0641 spectra (Fynbo+, 2017)
NASA Astrophysics Data System (ADS)
Fynbo, J. P. U.; Krogager, J.-K.; Heintz, K. E.; Geier, S.; Moller, P.; Noterdaeme, P.; Christensen, L.; Ledoux, C.; Jakobsson, P.
2017-09-01
eHAQ0111+0641 was observed with the OSIRIS instrument at the Gran Telescopio Canarias (GTC) as part of a larger sample of candidate red quasars. We secured spectroscopy with OSIRIS and a range of grisms to better constrain the spectral energy distribution, metal lines, and hydrogen Lyα line. (2 data files).
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-07
... to amend Chapter VII, Section 6, Market Maker Quotations, to provide that respecting in-the-money...-money series, which is the spread in the underlying security in the primary market. NASDAQ believes that...-money option is particularly constrained by a quote spread parameter requirement that does not take into...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-03
... for certificates representing units of fractional undivided interest in the Series' portfolio (``Units... offering price plus a front-end sales charge. If such a market is not maintained at any time for any Series... Equity Series will not restrict their portfolio investments to ``eligible trust securities.'' D. Capital...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: American United Gold Corporation, AMS Homecare Inc., Aucxis Corp., and CYOP Systems International Inc.; Order of Suspension of... current and accurate information concerning the securities of American United Gold Corporation because it...
NASA Astrophysics Data System (ADS)
Rodríguez-Castañeda, José Luis; Ortega-Rivera, Amabel; Roldán-Quintana, Jaime; Espinoza-Maldonado, Inocente Guadalupe
2018-07-01
In the Arivechi region of eastern Sonora, northwestern Mexico, mountainous exposures of Upper Cretaceous rocks that contain monoliths within coarse sedimentary debris are enigmatic, in a province of largely Late Cretaceous continental-margin arc rocks. The rocks sequence in the study area are grouped in two Upper Cretaceous units: the lower Cañada de Tarachi and the younger El Potrero Grande. Detrital zircons collected from three samples of the Cañada de Tarachi and El Potrero Grande units have been analyzed for U-Pb ages to constrain their provenance. These ages constrain the age of the exposed rocks and provide new insights into the geological evolution of eastern Sonora Cretaceous rocks. The detrital zircon age populations determined for the Cañada de Tarachi and El Potrero Grande units contain distinctive Precambrian, Paleozoic, and Mesozoic zircon ages that provide probable source areas which are discussed in detail constraining the tectonic evolution of the region. Comparison of these knew ages with published data suggests that the source terranes, that supplied zircons to the Arivechi basin, correlate with Proterozoic, Paleozoic and Mesozoic domains in southern California and Baja California, northern Sonora, southern Arizona and eastern Chihuahua. The provenance variation is vital to constrain the source of the Cretaceous rocks in eastern Sonora and support a better understanding of the Permo-Triassic Cordilleran Magmatic Arc in the southwestern North America.
USDA-ARS?s Scientific Manuscript database
Northern areas of the western United States are one of the most productive wheat growing regions in the United States. Increasing productivity through breeding is hindered by several biotic stresses which slow and constrain targeted yield improvement. In order to understand genetic variation for str...
Yu Wei; Michael Bevers; Erin Belval; Benjamin Bird
2015-01-01
This research developed a chance-constrained two-stage stochastic programming model to support wildfire initial attack resource acquisition and location on a planning unit for a fire season. Fire growth constraints account for the interaction between fire perimeter growth and construction to prevent overestimation of resource requirements. We used this model to examine...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-21
...; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Security Requirements 1.0 Background Zion Nuclear Power Station (ZNPS or Zion), Unit 1, is a Westinghouse 3250 MWt Pressurized Water Reactor... activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1) states, ``The licensee...
Weaponizing the Final Frontier: The United States and the New Space Race
2017-06-09
42 CHAPTER 3 RESEARCH METHODOLOGY ................................................................43 Documentary Analysis...Commission to Assess United States National Security Space Management and Organization, Executive Summary. The report concluded that to avoid a “Space Pearl...2010), 36. 10 Report of the Commission to Assess United States National Security Space Management and Organization pursuant to Public Law 106-65
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
... for Grant Proposals: Study of the United States Institute on U.S. National Security Policymaking... 11, 2011. Executive Summary: The Branch for the Study of the U.S., Office of Academic Exchange... design and implementation of the Study of the United States Institute on U.S. National Security...
Code of Federal Regulations, 2014 CFR
2014-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2013 CFR
2013-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2011 CFR
2011-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Code of Federal Regulations, 2012 CFR
2012-04-01
... residing in the United States under color of law. 416.1619 Section 416.1619 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Residence and Citizenship § 416.1619 When you cannot be considered permanently residing in the United States under color of...
Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
Doroodgar, Farzan; Razzaque, Mohammad Abdur; Isnin, Ismail Fauzi
2014-01-01
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge. PMID:24618781
Seluge++: a secure over-the-air programming scheme in wireless sensor networks.
Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi
2014-03-11
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
Use of Security Officers on Inpatient Psychiatry Units.
Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B
2018-04-02
Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, p<.001, CI=2.28-11.33), and going to court for any reason (OR=5.80, p=.004, CI=1.75-19.15). Security officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.
Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej
2015-01-01
Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things. PMID:26506357
Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej
2015-10-22
Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things.
Rep. Lamborn, Doug [R-CO-5
2014-04-01
House - 04/16/2014 Referred to the Subcommittee on Immigration and Border Security. (All Actions) Notes: For further action, see S.2195, which became Public Law 113-100 on 4/18/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
5 CFR 1312.31 - Security violations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...
The Role Of Moral Awareness In Computer Security
NASA Astrophysics Data System (ADS)
Stawinski, Arthur
1984-08-01
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of the...
37 CFR 5.1 - Applications and correspondence involving national security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...
2013-08-14
Time-Varying (LTV); Clohessy - Wiltshire -Hill (CWH) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...linearized Hill- Clohessy - Wiltshire (HCW) equations [15] approximate the relative motion of the spacecraft on a circular orbit as ẍ− 3n2x− 2nẏ = Fx mc
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
12 CFR 615.5500 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...
76 FR 14678 - Communications Unit Leader Prerequisite and Evaluation
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0004] Communications Unit Leader Prerequisite... Security (DHS), National Protection and Programs Directorate (NPPD), Cybersecurity and Communications (CS&C), Office of Emergency Communications (OEC) will submit the following information collection request to the...
Army Global Basing Posture: An Analytic Framework for Maximizing Responsiveness and Effectiveness
2015-01-01
potential changes in the national security environment and to evaluate U.S. Army stationing, prepositioning, security cooperation activities, and...report should be of interest to those concerned with U.S. global posture and national security strategy, especially as it pertains to U.S. land power...40 A.1. United Nations Support Index for Plenary Votes, by State ................................................ 64 A.2. United Nations
Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States
2006-06-01
least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3
Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP
NASA Astrophysics Data System (ADS)
Laghi, Maria Chiara; Amoretti, Michele; Conte, Gianni
The effective convergence of service-oriented architectures (SOA) and peer-to-peer (P2P) is an urgent task, with many important applications ranging from e-business to ambient intelligence. A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing. In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks. Recently we focused on security aspects, providing JXTA-SOAP with a general security management system, and specialized policies that target both J2SE and J2ME versions of the component. Among others, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.
NASA Astrophysics Data System (ADS)
Alemadi, Nasser Ahmed
Deregulation has brought opportunities for increasing efficiency of production and delivery and reduced costs to customers. Deregulation has also bought great challenges to provide the reliability and security customers have come to expect and demand from the electrical delivery system. One of the challenges in the deregulated power system is voltage instability. Voltage instability has become the principal constraint on power system operation for many utilities. Voltage instability is a unique problem because it can produce an uncontrollable, cascading instability that results in blackout for a large region or an entire country. In this work we define a system of advanced analytical methods and tools for secure and efficient operation of the power system in the deregulated environment. The work consists of two modules; (a) contingency selection module and (b) a Security Constrained Optimization module. The contingency selection module to be used for voltage instability is the Voltage Stability Security Assessment and Diagnosis (VSSAD). VSSAD shows that each voltage control area and its reactive reserve basin describe a subsystem or agent that has a unique voltage instability problem. VSSAD identifies each such agent. VS SAD is to assess proximity to voltage instability for each agent and rank voltage instability agents for each contingency simulated. Contingency selection and ranking for each agent is also performed. Diagnosis of where, why, when, and what can be done to cure voltage instability for each equipment outage and transaction change combination that has no load flow solution is also performed. A security constrained optimization module developed solves a minimum control solvability problem. A minimum control solvability problem obtains the reactive reserves through action of voltage control devices that VSSAD determines are needed in each agent to obtain solution of the load flow. VSSAD makes a physically impossible recommendation of adding reactive generation capability to specific generators to allow a load flow solution to be obtained. The minimum control solvability problem can also obtain solution of the load flow without curtailing transactions that shed load and generation as recommended by VSSAD. A minimum control solvability problem will be implemented as a corrective control, that will achieve the above objectives by using minimum control changes. The control includes; (1) voltage setpoint on generator bus voltage terminals; (2) under load tap changer tap positions and switchable shunt capacitors; and (3) active generation at generator buses. The minimum control solvability problem uses the VSSAD recommendation to obtain the feasible stable starting point but completely eliminates the impossible or onerous recommendation made by VSSAD. This thesis reviews the capabilities of Voltage Stability Security Assessment and Diagnosis and how it can be used to implement a contingency selection module for the Open Access System Dispatch (OASYDIS). The OASYDIS will also use the corrective control computed by Security Constrained Dispatch. The corrective control would be computed off line and stored for each contingency that produces voltage instability. The control is triggered and implemented to correct the voltage instability in the agent experiencing voltage instability only after the equipment outage or operating changes predicted to produce voltage instability have occurred. The advantages and the requirements to implement the corrective control are also discussed.
A Multi-Band Uncertainty Set Based Robust SCUC With Spatial and Temporal Budget Constraints
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dai, Chenxi; Wu, Lei; Wu, Hongyu
2016-11-01
The dramatic increase of renewable energy resources in recent years, together with the long-existing load forecast errors and increasingly involved price sensitive demands, has introduced significant uncertainties into power systems operation. In order to guarantee the operational security of power systems with such uncertainties, robust optimization has been extensively studied in security-constrained unit commitment (SCUC) problems, for immunizing the system against worst uncertainty realizations. However, traditional robust SCUC models with single-band uncertainty sets may yield over-conservative solutions in most cases. This paper proposes a multi-band robust model to accurately formulate various uncertainties with higher resolution. By properly tuning band intervalsmore » and weight coefficients of individual bands, the proposed multi-band robust model can rigorously and realistically reflect spatial/temporal relationships and asymmetric characteristics of various uncertainties, and in turn could effectively leverage the tradeoff between robustness and economics of robust SCUC solutions. The proposed multi-band robust SCUC model is solved by Benders decomposition (BD) and outer approximation (OA), while taking the advantage of integral property of the proposed multi-band uncertainty set. In addition, several accelerating techniques are developed for enhancing the computational performance and the convergence speed. Numerical studies on a 6-bus system and the modified IEEE 118-bus system verify the effectiveness of the proposed robust SCUC approach for enhancing uncertainty modeling capabilities and mitigating conservativeness of the robust SCUC solution.« less
Options for pricing ancillary services in a deregulated power system
NASA Astrophysics Data System (ADS)
Yamin, Hatim Yahya
2001-07-01
GENCOs in restructured systems are compensated for selling energy in the market. In a restructured market, a mechanism is required to entice participants in the market to provide ancillary services and to ensure adequate compensation that would guarantee its economic viability. The ISO controls the dispatch of generation, manages the reliability of the transmission grid, provides open access to the transmission, buys and provides ancillary services as required, coordinates day-ahead, hour-ahead schedules and performs real time balancing of load and generation, settles real time imbalances and ancillary services sales and purchases. The ISO, also, administers congestion management protocols for the transmission grid. Since the ISO does not own any generating units it must ensure that there is enough reserves for maintaining reliability according to FERC regulations, and sufficient unloaded generating capacity for balancing services in a real-time market. The ISO could meet these requirements by creating a competitive market for ancillary services, which are metered and remain unbundled to provide an accurate compensation for each supplier and cost to each consumer, In this study, we give an overview for restructuring and ancillary services in a restructured power marketplace. Also, we discuss the effect of GENCOs' actions in the competitive energy and ancillary service markets. In addition, we propose an auction market design for hedging ancillary service costs in California market. Furthermore, we show how to include the n-1 and voltage contingencies in security constrained unit commitment. Finally, we present two approaches for GENCOs' unit commitment in a restructured power market; one is based on game theory and the other is based on market price forecasting. In each of the two GENCOs' unit commitment approaches, we discuss the GENCOs' optimal bidding strategies in energy and ancillary service markets to maximize the GENCOs' profit.
24 CFR 891.635 - Security deposits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 891.635 Section... Assistance § 891.635 Security deposits. The general requirements for security deposits on assisted units are... a security deposit equal to one month's rent payable by the family. (b) The Borrower shall maintain...
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
DOT National Transportation Integrated Search
2008-12-05
1) The August 2006 attempt by individuals to carry liquid explosives onboard multiple commercial aircraft bound for the United States from the United Kingdom has highlighted both the continued importance of securing the civil aviation system and the ...
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
49 CFR 1546.211 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...
Rep. Miller, Jeff [R-FL-1
2011-06-14
House - 05/08/2012 Placed on the Union Calendar, Calendar No. 328. (All Actions) Notes: For further action, see H.R.6328, which became Public Law 112-271 on 1/14/2013. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Evaluation of Traditional Security Solutions in the SCADA Environment
2012-03-01
Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of
Illegal Immigration in the United States: Implications for Rule of Law and National Security
2012-02-15
AIR WAR COLLEGE AIR UNIVERSITY ILLEGAL IMMIGRATION IN THE UNITED STATES: IMPLICATIONS FOR RULE OF LAW AND NATIONAL SECURITY By Paul A...government’s failure to strictly enforce immigration laws presents national security vulnerabilities and is subversive to the rule of law . Without...the rule of law , serious social tensions will occur that impel states and localities to fill the void left by the lack of immigration enforcement. In
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ruskauff, Greg; Marutzky, Sam
Model evaluation focused solely on the PIN STRIPE and MILK SHAKE underground nuclear tests’ contaminant boundaries (CBs) because they had the largest extent, uncertainty, and potential consequences. The CAMBRIC radionuclide migration experiment also had a relatively large CB, but because it was constrained by transport data (notably Well UE-5n), there was little uncertainty, and radioactive decay reduced concentrations before much migration could occur. Each evaluation target and the associated data-collection activity were assessed in turn to determine whether the new data support, or demonstrate conservatism of, the CB forecasts. The modeling team—in this case, the same team that developed themore » Frenchman Flat geologic, source term, and groundwater flow and transport models—analyzed the new data and presented the results to a PER committee. Existing site understanding and its representation in numerical groundwater flow and transport models was evaluated in light of the new data and the ability to proceed to the CR stage of long-term monitoring and institutional control.« less
Globalized Security Reshaping America’s Defense Trade Policy
2001-04-01
AU/SCHOOL/NNN/2001-04 THE ATLANTIC COUNCIL OF THE UNITED STATES AIR UNIVERSITY NATIONAL DEFENSE FELLOWSHIP PROGRAM GLOBALIZED SECURITY RESHAPING...Author(s) Sullivan, Shannon M. Project Number Task Number Work Unit Number Performing Organization Name(s) and Address(es) Air University Maxwell...Makins, President of the Atlantic Council of the United States, did appreciate these factors , and he steered me into what became a fascinating
Illicit Drug Trade-Impact on United States National Health Care
2013-03-01
pobreza en Mexico sube a 52 milliones,” CNN Expansion, July 29, 2011, http://www.cnnexpansion.com/ economia /2011/07/29/pobreza- mexico -2010 (accessed...Unlimited. 13. SUPPLEMENTARY NOTES Word Count: 5,569 14. ABSTRACT The United States and Mexico face a myriad of threats to national security...Policy Classification: Unclassified The United States and Mexico face a myriad of threats to national security
NASA Astrophysics Data System (ADS)
Liu, Yuan; Wang, Mingqiang; Ning, Xingyao
2018-02-01
Spinning reserve (SR) should be scheduled considering the balance between economy and reliability. To address the computational intractability cursed by the computation of loss of load probability (LOLP), many probabilistic methods use simplified formulations of LOLP to improve the computational efficiency. Two tradeoffs embedded in the SR optimization model are not explicitly analyzed in these methods. In this paper, two tradeoffs including primary tradeoff and secondary tradeoff between economy and reliability in the maximum LOLP constrained unit commitment (UC) model are explored and analyzed in a small system and in IEEE-RTS System. The analysis on the two tradeoffs can help in establishing new efficient simplified LOLP formulations and new SR optimization models.
Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde
2011-05-01
Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-23
... Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the United.... 110-181, enacted January 28, 2008), section 862, entitled ``Contractors Performing Private Security... NDAA required standardization of rules for private security contractors that are performing in...
Code of Federal Regulations, 2010 CFR
2010-10-01
... to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Transportation of... determines is not known or is a threat to security. (e) At the border. (1) Train crew members who are not U.S...
About the Transportation Secure Data Center | Transportation Secure Data
Center | NREL About the Transportation Secure Data Center About the Transportation Secure Data Center The Transportation Secure Data Center (TSDC) makes vital transportation data broadly available large, colorful map of the United States. NREL data experts and engineers analyze large sets of complex
NASA Astrophysics Data System (ADS)
Born, Joshua
The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.
33 CFR 107.210 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 107.210 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY... Territorial Waters § 107.210 Applicability. (a) This subpart applies to: (1) Vessels of the United States less... territorial waters; (2) Vessels of the United States less than 100 meters (328 feet) in length (and all...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
20 CFR 416.1600 - Introduction.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Introduction. 416.1600 Section 416.1600 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... United States (see § 416.1615); or (c) An alien permanently residing in the United States under color of...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pregenzer, Arian Leigh
2011-12-01
The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunitiesmore » for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.« less
Implementation Of Secure 6LoWPAN Communications For Tactical Wireless Sensor Networks
2016-09-01
wireless sensor networks (WSN) consist of power -constrained devices spread throughout a region-of-interest to provide data extraction in real time...1 A. LOW POWER WIRELESS SENSOR NETWORKS ............................1 B. INTRODUCTION TO...communication protocol for low power wireless personal area networks Since the IEEE 802.15.4 standard only defines the first two layers of the Open
Dover, Robert V H; Lambert, Estelle V
2016-03-16
Using the nexus between food consumption, food security and obesity, this paper addresses the complexity of health behavior decision-making moments that reflect relational social dynamics in context-specific dialogues, often in choice-constrained conditions. A pragmatic review of literature regarding social determinants of health in relation to food consumption, food security and obesity was used to advance this theoretical model. We suggest that health choice, such as food consumption, is based on more than the capacity and volition of individuals to make "healthy" choices, but is dialogic and adaptive. In terms of food consumption, there will always be choice-constrained conditions, along a continuum representing factors over which the individual has little or no control, to those for which they have greater agency. These range from food store geographies and inventories and food availability, logistical considerations such as transportation, food distribution, the structure of equity in food systems, state and non-government food and nutrition programs, to factors where the individual exercises a greater degree of autonomy, such as sociocultural foodways, family and neighborhood shopping strategies, and personal and family food preferences. At any given food decision-making moment, many factors of the continuum are present consciously or unconsciously when the individual makes a decision. These health behavior decision-making moments are mutable, whether from an individual perspective, or within a broader social or policy context. We review the construct of "choice set", the confluence of factors that are temporally weighted by the differentiated and relationally-contextualized importance of certain factors over others in that moment. The choice transition represents an essential shift of the choice set based on the conscious and unconscious weighting of accumulated evidence, such that people can project certain outcomes. Policies and interventions should avoid dichotomies of "good and bad" food choices or health behaviors, but focus on those issues that contribute to the weightedness of factors influencing food choice behavior at a given decision-making moment and within a given choice set.
A security architecture for interconnecting health information systems.
Gritzalis, Dimitris; Lambrinoudakis, Costas
2004-03-31
Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.
NASA Astrophysics Data System (ADS)
Manzotti, Paola; Bosse, Valérie; Pitra, Pavel; Robyr, Martin; Schiavi, Federica; Ballèvre, Michel
2018-03-01
Exhumation rates for high-pressure metamorphic rocks need to be carefully estimated to decipher tectonic processes in subduction/collision belts. In the Gran Paradiso Massif (Western Alps), the Money Unit crops out as a tectonic window below the Gran Paradiso Unit. According to previous studies, the Gran Paradiso and Money Units reached peak pressure conditions at 18 to 20 kbar, 480-520 °C and 17 to 18 kbar, 500-550 °C, respectively. This yields a maximum difference of 9 to 10 km in the subduction depth reached by these two units during the Alpine history. Thrusting of the Gran Paradiso Unit over the Money Unit led to the simultaneous development of the main foliation under the same metamorphic conditions ( 12.5 to 14.5 kbar and 530-560 °C) in both units. The thrust contact was subsequently folded and then both units were exhumed together. The relative timing of the growth and dissolution of the accessory phases was assessed by combining thermodynamic modelling with inclusion, textural and chemical (major and trace element) data from both major and accessory phases. The age of monazite constrained the high-pressure metamorphism in both the Gran Paradiso Unit and the Money Unit at 41.5 ± 0.3 and 42.0 ± 0.6 Ma, respectively. Allanite replacing monazite in the matrix has been dated at 32.7 ± 4.2 Ma. The late growth of xenotime associated with the crystallization of biotite pseudomorphs at the expense of garnet (at about 10 kbar) was dated at 32.3 ± 1.0 Ma. Our petrochronological data indicate about 10 m.y. between the peak pressure conditions and the crystallization of xenotime leading to an exhumation rate of the order of 2.2-5 mm/year. The new ages allow to better constrain the timing of the displacement of the thrust defining the lower boundary of the extruding wedge of eclogite-facies rocks.
Garcia, C. Amanda; Halford, Keith J.; Laczniak, Randell J.
2010-01-01
Hydraulic conductivities of volcanic and carbonate lithologic units at the Nevada Test Site were estimated from flow logs and aquifer-test data. Borehole flow and drawdown were integrated and interpreted using a radial, axisymmetric flow model, AnalyzeHOLE. This integrated approach is used because complex well completions and heterogeneous aquifers and confining units produce vertical flow in the annular space and aquifers adjacent to the wellbore. AnalyzeHOLE simulates vertical flow, in addition to horizontal flow, which accounts for converging flow toward screen ends and diverging flow toward transmissive intervals. Simulated aquifers and confining units uniformly are subdivided by depth into intervals in which the hydraulic conductivity is estimated with the Parameter ESTimation (PEST) software. Between 50 and 150 hydraulic-conductivity parameters were estimated by minimizing weighted differences between simulated and measured flow and drawdown. Transmissivity estimates from single-well or multiple-well aquifer tests were used to constrain estimates of hydraulic conductivity. The distribution of hydraulic conductivity within each lithology had a minimum variance because estimates were constrained with Tikhonov regularization. AnalyzeHOLE simulated hydraulic-conductivity estimates for lithologic units across screened and cased intervals are as much as 100 times less than those estimated using proportional flow-log analyses applied across screened intervals only. Smaller estimates of hydraulic conductivity for individual lithologic units are simulated because sections of the unit behind cased intervals of the wellbore are not assumed to be impermeable, and therefore, can contribute flow to the wellbore. Simulated hydraulic-conductivity estimates vary by more than three orders of magnitude across a lithologic unit, indicating a high degree of heterogeneity in volcanic and carbonate-rock units. The higher water transmitting potential of carbonate-rock units relative to volcanic-rock units is exemplified by the large difference in their estimated maximum hydraulic conductivity; 4,000 and 400 feet per day, respectively. Simulated minimum estimates of hydraulic conductivity are inexact and represent the lower detection limit of the method. Minimum thicknesses of lithologic intervals also were defined for comparing AnalyzeHOLE results to hydraulic properties in regional ground-water flow models.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false General. 204.3 Section 204.3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES RELATING TO DEBT COLLECTION...; the Social Security Act; or the tariff laws of the United States. (e) The procedures for...
The vulnerable do-gooders: security strategies of German aid agencies.
Schneiker, Andrea
2013-04-01
Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
Security policies and trust in ubiquitous computing.
Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand
2008-10-28
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
Optical smart card using semipassive communication.
Glaser, I; Green, Shlomo; Dimkov, Ilan
2006-03-15
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Optical smart card using semipassive communication
NASA Astrophysics Data System (ADS)
Glaser, I.; Green, Shlomo; Dimkov, Ilan
2006-03-01
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Environmental Security in the Danube River Basin: Policy Implications for the United States
1999-01-01
United Nations Environmental Programme and Centre for Human Settlements jointly formed a Balkans Task Force that has been conducting independent and...1199 V ACKNOWLEDGMENTS I would like to thank the United States Air Force Institute for National Security Studies (TNSS) and the Army Environmental...regularly scheduled course on Responsibilities of Military Forces in Environmental Protection. Mr. Robert Jarrett of AEPI provided valuable review
Security Protection on Trust Delegated Data in Public Mobile Networks
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.
The Counter Terrorist Classroom: Religion, Education, and Security
ERIC Educational Resources Information Center
Gearon, Liam
2013-01-01
The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... following: Individual names, addresses, phone numbers, dates of birth, driver's license numbers, social security numbers, license plate numbers, medical information (typically in the case of accidents or... numbers, social security numbers, license plate numbers, medical information (typically in the case of...
Attachment and Culture: Security in the United States and Japan.
ERIC Educational Resources Information Center
Rothman, Fred; Weisz, John; Pott, Martha; Morelli, Gilda; Miyake, Kazuo
2000-01-01
Highlights evidence of cultural variations in child attachment, noting how western values and meanings permeate attachment theory. Comparisons of the United States and Japan emphasize the cultural relativity of three core hypotheses of attachment theory related to: caregiver sensitivity, child social competence, and a secure base for exploring the…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... for the following securities: Index-Linked Exchangeable Notes; Equity Gold Shares; Trust Certificates; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants (together with...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...
20 CFR 416.1327 - Suspension due to absence from the United States.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Suspension due to absence from the United States. 416.1327 Section 416.1327 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Suspensions and Terminations § 416.1327 Suspension due to...
78 FR 22526 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-16
...); (4) United States Social Security Number (SSN), (if any), United States Immigration and Naturalization Service (INS) Identification or similar number(s), (if any), and any equivalent social security or...) spouse; (c) children; (d) brothers; (e) sisters; (f) others; (9) team name; (10) place of insertion; (11...
Privacy and security of patient data in the pathology laboratory
Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904
17 CFR 240.3b-4 - Definition of “foreign government,” “foreign issuer” and “foreign private issuer”.
Code of Federal Regulations, 2010 CFR
2010-04-01
... voting securities beneficially owned by residents of the United States as reported on reports of... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of âforeign... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES...
Coping with Iran: Confrontation, Containment, or Engagement?
2007-01-01
David Ignatius (national security columnist , The Washington Post) IRAN’S NATIONAL SECURITY ENVIRONMENT Mohammad Javad Zarif Iran’s national security...senior editor, Newsweek) David Ignatius (national security columnist , The Washington Post) HOW THE U.S. GOVERNMENT VIEWS IRAN R. Nicholas Burns...Iranian Ambassador to the United Nations Questions Michael Hirsh Senior Editor Newsweek David Ignatius National Security Columnist The Washington
78 FR 17469 - Government Securities: Call for Large Position Reports
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-21
... DEPARTMENT OF THE TREASURY Government Securities: Call for Large Position Reports AGENCY: Office... Reserve Bank of New York, Government Securities Dealer Statistics Unit, 4th Floor, 33 Liberty Street, New... Eidemiller, or Kevin Hawkins; Government Securities Regulations Staff, Department of the Treasury, at 202-504...
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
The neoliberal political economy and erosion of retirement security.
Polivka, Larry; Luo, Baozhen
2015-04-01
The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Land Ecological Security Evaluation of Guangzhou, China
Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun
2014-01-01
As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to −0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail. PMID:25321873
Land ecological security evaluation of Guangzhou, China.
Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun
2014-10-15
As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to -0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.
1982-12-01
ADA2 690 PERSANGU SECUR HEUNEDSAESANDOMANHE / GUL COOPERATION CO..U) NAVAL POSTGRADUATE SCHOOL NC MONTEREY CA J A GAWLIK DEC 82CASSIFIED F/G 5/4 NL...CHART NATIONAL BUREAU OF STANDARDS 1963 A 1 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS PERSIAN GULF SECURITY: THE UNITED STATES AND OMAN...5 PRA OGR NIT uw Naval Postgraduate School Monterey, California 93940 1i. CONTROLLIUG OPPICe NAME AND LOSOESS Ia. REPORT OATS Naval Postgraduate
NEW Manning System Field Evaluation
1986-12-15
M’xzimum 200 wor(ds) 14 . SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE COf 17. SECURITY CLASSIFI.ATION 18. SEC.URITY CLASSIFIC,,TIO 19 SECURITY...three- year life cycle geared to the fLrst-term soldIer’s enlistment. tn the majority or cases, these units were deployed OCONUS for a part of the unit’s...soldiers of selected COHORT and monCO9ORT battalions and companies/batterles )oth in CONUS and USARSUR (five iterations over three years ). The primary
Ideas, Concepts, Doctrine: Basic Thinking in the United States Air Force, 1907-1960. Volume 1
1989-12-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 684 19a. NAME OF RESPONSIBLE PERSON a. REPORT...reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and...lecture have been cleared with the lecturer, even though they may have been unclassified as to military security . To a man these lecturers have been
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2011 CFR
2011-04-01
... security deposits. (c) In order to be considered for the return of the security deposit, a family which vacates its unit will provide the owner with its forwarding address or arrange to pick up the refund. (d...
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security deposits. (c) In order to be considered for the return of the security deposit, a family which vacates its unit will provide the owner with its forwarding address or arrange to pick up the refund. (d...
A model of airport security work flow based on petri net
NASA Astrophysics Data System (ADS)
Dong, Xinming
2017-09-01
Extremely long lines at airports in the United States have been sharply criticized. In order to find out the bottleneck in the existing security system and put forward reasonable improvement plans and proposal, the Petri net model and the Markov Chain are introduced in this paper. This paper uses data collected by transportation Security Agency (TSA), assuming the data can represent the average level of all airports in the Unites States, to analysis the performance of security check system. By calculating the busy probabilities and the utilization probabilities, the bottleneck is found. Moreover, recommendation is given based on the parameters’ modification in Petri net model.
Modular multiplication in GF(p) for public-key cryptography
NASA Astrophysics Data System (ADS)
Olszyna, Jakub
Modular multiplication forms the basis of modular exponentiation which is the core operation of the RSA cryptosystem. It is also present in many other cryptographic algorithms including those based on ECC and HECC. Hence, an efficient implementation of PKC relies on efficient implementation of modular multiplication. The paper presents a survey of most common algorithms for modular multiplication along with hardware architectures especially suitable for cryptographic applications in energy constrained environments. The motivation for studying low-power and areaefficient modular multiplication algorithms comes from enabling public-key security for ultra-low power devices that can perform under constrained environments like wireless sensor networks. Serial architectures for GF(p) are analyzed and presented. Finally proposed architectures are verified and compared according to the amount of power dissipated throughout the operation.
10 CFR 2.903 - Protection of restricted data and national security information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-25
... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services--008 Refugee Access... of records titled, ``Department of Homeland Security/United States Citizenship and Immigration... Department of Homeland Security/U.S. Citizenship and Immigration Services to collect information to verify...
48 CFR 204.470-2 - National security exclusion.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
31 CFR 358.1 - What special terms apply to this part?
Code of Federal Regulations, 2010 CFR
2010-07-01
... unmatured bearer securities are bearer bonds. BECCS means the Treasury's Bearer Corpora Conversion System... BECCS. Callable means a United States Treasury security subject to call before maturity. Callable Coupons means the coupons associated with a callable security that are due after the date the security is...
NASA Astrophysics Data System (ADS)
Prada, Jose Fernando
Keeping a contingency reserve in power systems is necessary to preserve the security of real-time operations. This work studies two different approaches to the optimal allocation of energy and reserves in the day-ahead generation scheduling process. Part I presents a stochastic security-constrained unit commitment model to co-optimize energy and the locational reserves required to respond to a set of uncertain generation contingencies, using a novel state-based formulation. The model is applied in an offer-based electricity market to allocate contingency reserves throughout the power grid, in order to comply with the N-1 security criterion under transmission congestion. The objective is to minimize expected dispatch and reserve costs, together with post contingency corrective redispatch costs, modeling the probability of generation failure and associated post contingency states. The characteristics of the scheduling problem are exploited to formulate a computationally efficient method, consistent with established operational practices. We simulated the distribution of locational contingency reserves on the IEEE RTS96 system and compared the results with the conventional deterministic method. We found that assigning locational spinning reserves can guarantee an N-1 secure dispatch accounting for transmission congestion at a reasonable extra cost. The simulations also showed little value of allocating downward reserves but sizable operating savings from co-optimizing locational nonspinning reserves. Overall, the results indicate the computational tractability of the proposed method. Part II presents a distributed generation scheduling model to optimally allocate energy and spinning reserves among competing generators in a day-ahead market. The model is based on the coordination between individual generators and a market entity. The proposed method uses forecasting, augmented pricing and locational signals to induce efficient commitment of generators based on firm posted prices. It is price-based but does not rely on multiple iterations, minimizes information exchange and simplifies the market clearing process. Simulations of the distributed method performed on a six-bus test system showed that, using an appropriate set of prices, it is possible to emulate the results of a conventional centralized solution, without need of providing make-whole payments to generators. Likewise, they showed that the distributed method can accommodate transactions with different products and complex security constraints.
The New Wild West: Military Support in Border Security Operations
2012-06-08
military service members from being used to enforce the laws of the United States unless expressly authorized by the United States Constitution or the...cartels constitute a significant threat to United States national security that cannot be defeated or deterred by law enforcement methods alone in order...Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for
Exploring the Future of Security in the Caribbean: a Regional Security Partnership?
2007-12-14
by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and
Code of Federal Regulations, 2010 CFR
2010-04-01
... insurance policies. Form N-6 shall be used for registration under the Securities Act of 1933 of securities... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form N-6, registration... policies. 239.17c Section 239.17c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
NASA Astrophysics Data System (ADS)
Yu, Nam Yul
2017-12-01
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix embedding a secret keystream. The keystream is obtained by a keystream generator of stream ciphers, where the initial seed becomes the secret key of the CS-based cryptosystem. For security analysis, the total variation distance, bounded by the relative entropy and the Hellinger distance, is examined as a security measure for the indistinguishability. By developing upper bounds on the distance measures, we show that the CS-based cryptosystem can be computationally secure in terms of the indistinguishability, as long as the keystream length for each encryption is sufficiently large with low compression and sparsity ratios. In addition, we consider a potential chosen plaintext attack (CPA) from an adversary, which attempts to recover the key of the CS-based cryptosystem. Associated with the key recovery attack, we show that the computational security of our CS-based cryptosystem is brought by the mathematical intractability of a constrained integer least-squares (ILS) problem. For a sub-optimal, but feasible key recovery attack, we consider a successive approximate maximum-likelihood detection (SAMD) and investigate the performance by developing an upper bound on the success probability. Through theoretical and numerical analyses, we demonstrate that our CS-based cryptosystem can be secure against the key recovery attack through the SAMD.
Port Security: A National Planning Guide
DOT National Transportation Integrated Search
1997-01-01
Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...
NASA Astrophysics Data System (ADS)
Ritzinger, B. T.; Glen, J. M. G.; Athens, N. D.; Denton, K. M.; Bouligand, C.
2015-12-01
Regionally continuous Cenozoic rocks in the Basin and Range that predate the onset of major mid-Miocene extension provide valuable insight into the sequence of faulting and magnitude of extension. An exceptional example of this is Caetano caldera, located in north-central Nevada, that formed during the eruption of the Caetano Tuff at the Eocene-Oligocene transition. The caldera and associated deposits, as well as conformable caldera-filling sedimentary and volcanic units allow for the reconstruction of post Oligocene extensional faulting. Extensive mapping and geochronologic, geochemical and paleomagnetic analyses have been conducted over the last decade to help further constrain the eruptive and extensional history of the Caetano caldera and associated deposits. Gravity and magnetic data, that highlight contrasts in density and magnetic properties (susceptibility and remanence), respectively, are useful for mapping and modeling structural and lithic discontinuities. By combining existing gravity and aeromagnetic data with newly collected high-resolution gravity data, we are performing detailed potential field modeling to better characterize the subsurface within and surrounding the caldera. Modeling is constrained by published geologic map and cross sections and by new rock properties for these units determined from oriented drill core and hand samples collected from outcrops that span all of the major rock units in the study area. These models will enable us to better map the margins of the caldera and more accurately determine subsurface lithic boundaries and complex fault geometries, as well as aid in refining estimates of the magnitude of extension across the caldera. This work highlights the value in combining geologic and geophysical data to build an integrated structural model to help characterize the subsurface and better constrain the extensional tectonic history if this part of the Great Basin.
Pakistan: Can the United States Secure an Insecure State?
2010-01-01
do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-21
...: Effective Date: May 21, 2010. FOR FURTHER INFORMATION CONTACT: Pamela K. Durham, Office of Missile Threat... in the foreign policy or national security interests of the United States to remove the restrictions..., their sub-units and successors: 1. D. Mendeleyev University of Chemical Technology of Russia 2. Moscow...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950... was exempt from Social Security tax was also excluded. Certain other work for the United States or an... the Agriculture Marketing Service and the Commodity Stabilization Service, formerly the Production and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... Power Station, Unit 1; Exemption From Certain Security Requirements 1.0 Background Exelon Nuclear is the licensee and holder of Facility Operating License No. DPR-2 issued for Dresden Nuclear Power Station (DNPS... protection of licensed activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1...
77 FR 51981 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-28
... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2012-0016] Proposed Collection; Comment Request AGENCY: United States Security Forces Center, Headquarters, DoD. ACTION: Notice. In compliance with Section 3506(c)(2)(A) of the Paperwork Reduction Act of 1995, the Office of the United States Security Forces Center, Headquarters...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
..., DHS. ACTION: Notice. SUMMARY: The United States and Canada are staunch allies, vital economic partners... in which the United States and Canada share responsibility for the security and resilience of our..., while working together to facilitate the flows of legitimate travel and trade. Beyond the Border...
Protein-mediated loops in supercoiled DNA create large topological domains
Yan, Yan; Ding, Yue; Leng, Fenfei; Dunlap, David; Finzi, Laura
2018-01-01
Abstract Supercoiling can alter the form and base pairing of the double helix and directly impact protein binding. More indirectly, changes in protein binding and the stress of supercoiling also influence the thermodynamic stability of regulatory, protein-mediated loops and shift the equilibria of fundamental DNA/chromatin transactions. For example, supercoiling affects the hierarchical organization and function of chromatin in topologically associating domains (TADs) in both eukaryotes and bacteria. On the other hand, a protein-mediated loop in DNA can constrain supercoiling within a plectonemic structure. To characterize the extent of constrained supercoiling, 400 bp, lac repressor-secured loops were formed in extensively over- or under-wound DNA under gentle tension in a magnetic tweezer. The protein-mediated loops constrained variable amounts of supercoiling that often exceeded the maximum writhe expected for a 400 bp plectoneme. Loops with such high levels of supercoiling appear to be entangled with flanking domains. Thus, loop-mediating proteins operating on supercoiled substrates can establish topological domains that may coordinate gene regulation and other DNA transactions across spans in the genome that are larger than the separation between the binding sites. PMID:29538766
Light-weight cyptography for resource constrained environments
NASA Astrophysics Data System (ADS)
Baier, Patrick; Szu, Harold
2006-04-01
We give a survey of "light-weight" encryption algorithms designed to maximise security within tight resource constraints (limited memory, power consumption, processor speed, chip area, etc.) The target applications of such algorithms are RFIDs, smart cards, mobile phones, etc., which may store, process and transmit sensitive data, but at the same time do not always support conventional strong algorithms. A survey of existing algorithms is given and new proposal is introduced.
2013-05-01
partnership between U.S. and Colombian forces. This approach requires introspection, understanding, and adaptation across the U.S. national security...status. Not all national militaries focus on external threats. Some environmental or national capacity circumstances require military professionals...desired impact, outcomes, and outputs through a strategic planning process providing direction, consultation with stakeholders, and environmentally driven
Overview of AMS (CCSDS Asynchronous Message Service)
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2006-01-01
This viewgraph presentation gives an overview of the Consultative Committee for Space Data Systems (CCSDS) Asynchronous Message Service (AMS). The topics include: 1) Key Features; 2) A single AMS continuum; 3) The AMS Protocol Suite; 4) A multi-continuum venture; 5) Constraining transmissions; 6) Security; 7) Fault Tolerance; 8) Performance of Reference Implementation; 9) AMS vs Multicast (1); 10) AMS vs Multicast (2); 11) RAMS testing exercise; and 12) Results.
Understanding International Environmental Security: A Strategic Military Perspective
2000-11-01
remain one of the more fragile organisms on the planet, bound to a relatively constrained set of environmental conditions of landscape, temperature...series of interwoven phenomena including, but not limited to, deforestation, 30 burning of fossil fuels, and industrial pollution. Assessing each of...burning of fossil fuels is the cause. Figure 3-7 shows the trend in carbon dioxide con- centration over the past 300 years with an expanded view since
Analysis and Simulation of Far-Field Seismic Data from the Source Physics Experiment
2012-09-01
ANALYSIS AND SIMULATION OF FAR-FIELD SEISMIC DATA FROM THE SOURCE PHYSICS EXPERIMENT Arben Pitarka, Robert J. Mellors, Arthur J. Rodgers, Sean...Security Site (NNSS) provides new data for investigating the excitation and propagation of seismic waves generated by buried explosions. A particular... seismic model. The 3D seismic model includes surface topography. It is based on regional geological data, with material properties constrained by shallow
Arno, Peter S.; House, James S.; Viola, Deborah; Schechter, Clyde
2011-01-01
Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health. PMID:21326333
Mezey, Gillian; Durkin, Catherine; Dodge, Liam; White, Sarah
2015-12-01
Absconds and escapes by psychiatric patients from secure forensic psychiatric settings create public anxiety and are poorly understood. To describe secure hospital patients who escape from within the secure perimeter or abscond, and test for differences between these groups. Escapes and absconds between 2008 and 2012 from the medium and low secure forensic psychiatric inpatient units of two London National Health Service Trusts were identified through the Trusts' databases. Demographic, offending, mental health and incident data were extracted from records for each. Seventy-seven incidents, involving 54 patients, were identified over the five years. These were 13 escapes involving 12 patients, representing a rate of 0.04 per 1000 bed days, and 64 absconds involving 42 patients, a rate of 0.26 per 1000 bed days; 15 (28%) patients were absent without leave more than once. Over half of the patients came back voluntarily within 24 hours of leaving. Over 50% of them had drunk alcohol or taken drugs while away from the unit. Escapees were more likely to be transferred prisoners and to have planned their escape, less likely to return to the unit voluntarily and away longer than patients who absconded. Offending was rare during unauthorised leave--just three offences among the 77 incidents; self-harm was more likely. Motives for absconding included: wanting freedom or drink or drugs, family worries and/or dissatisfaction with aspects of treatment. Escapes or absconding from secure healthcare units have different characteristics, but may best be prevented by convergent strategies. Relational security is likely to be as important for foiling plans for the former as it is for reducing boredom, building strong family support and managing substance misuse in the latter. Copyright © 2015 John Wiley & Sons, Ltd.
Distributional impacts of water markets on small farmers: Is there a safety net?
NASA Astrophysics Data System (ADS)
Hadjigeorgalis, Ereney
2008-10-01
The United Nations 2006 human development report states that water markets have not been shown to protect the interests of the poor, while other research has found that water markets have benefited smaller, resource-constrained farmers. This article provides insight into this international development debate by analyzing the impact of water markets on small farmers in the Limarí River Basin of Chile. The analysis is based on data collected from an extensive in-person survey of 316 farmers in the basin. Results show that water markets in the basin have been successful in moving water and water rights from low- to high-valued uses and that resource-constrained farmers use temporary water sales as a safety net. The long-term beneficial effects of water market trades for the most resource-constrained farmers, however, remain unclear. These results are relevant to both Chile and a host of developing countries where agriculture is a predominant activity and water resources are scarce. They are also applicable to the western United States, where water market trades often originate in the agricultural sector.
Social Security Contributions and Return Migration Among Older Male Mexican Immigrants.
Aguila, Emma; Vega, Alma
2017-06-01
For decades, scholars have studied the effects of immigration on the U.S. social security system. To date, this research has been primarily limited to migrants within the United States and does not consider those who return to their countries of origin. We estimate the proportion of male Mexican return migrants who contributed to the U.S. social security system and analyze their socioeconomic characteristics and migration histories. We also estimate the proportion that receive or expect to receive U.S. social security benefits. Using probit regression on the 2012 Mexican Health and Aging Study (MHAS), we describe the predictors of having contributed to the U.S. social security system among Mexican males in Mexico aged 50 years and older who at some point lived in the United States. We find that 32% of male return migrants reported having contributed to the U.S. social security system, but only 5% of those who contributed, received or expected to receive benefits. Those who reported having contributed spent more years in the United States and were more likely to be U.S. citizens or legal permanent residents than those who did not contribute. Immigrants often pay Old-Age, Survivors, and Disability Insurance taxes using legitimate or illegitimate social security numbers and return to their home countries without collecting U.S. social security benefits. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Code of Federal Regulations, 2011 CFR
2011-04-01
... who is responsible for implementation and oversight of information security programs and procedures... complaints regarding all elements of the information security program shall be directed to the Director of... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States. [79 FR 35472, June 20, 2014] ...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
49 CFR 1510.1 - Applicability and purpose.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...
31 CFR 306.113 - Cases not requiring bonds of indemnity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the security was in the custody or control of the United States, or a duly authorized agent thereof... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306... relief for the loss, theft, destruction, mutilation, or defacement of registered securities in any of the...
76 FR 63668 - Omaha Public Power District; Fort Calhoun Station, Unit 1; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... health and safety, and are consistent with the common defense and security; and (2) special circumstances.... Consistent With Common Defense and Security The proposed exemption would allow FCS to reschedule its biennial... schedule has no relation to security issues. Therefore, the common defense and security is not impacted by...
2016-05-01
militarily. Even Taiwan’s attempts to adopt asymmetric and innovative defense capabilities, paired with the advantages of island defense and foreign ...States foreign policy. According to the Defense Security Cooperation Agency, the United States transfers “defense articles and services in furtherance...of national security and foreign policy objectives.” By increasing the military capabilities of foreign allies and partners, the United States
Shah, Ajit
2006-04-01
The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.
Occupational Channels for Mexican Migration: New Destination Formation in a Binational Context
ERIC Educational Resources Information Center
Sanderson, Matthew; Painter, Matthew, II
2011-01-01
In the 1990s, Mexican immigration dispersed spatially, leading to the emergence of many "new destinations," in nonmetropolitan areas of the United States. Previous studies constrain the scope of the analysis to the United States, limiting our understanding of how new destinations are formed. We place new destination formation into a…
Correct county areas with sidebars for Virginia
Joseph M. McCollum; Dale Gormanson; John Coulston
2009-01-01
Historically, Forest Inventory and Analysis (FIA) has processed field inventory data at the county level and county estimates of land area were constrained to equal those reported by the Census Bureau. Currently, the Southern Research Station FIA unit processes field inventory data at the survey unit level (groups of counties with similar ecological characteristics)....
USDA-ARS?s Scientific Manuscript database
Information systems supporting the delivery of conservation technical assistance by the United States Department of Agriculture (USDA) to agricultural producers on working lands have become increasingly complex over the past 25 years. They are constrained by inconsistent coordination of domain knowl...
77 FR 213 - United States Savings Bonds, Series EE and I
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-04
... (APA). Because this rule relates to United States securities, which are contracts between Treasury and the owner of the security, this rule falls within the contract exception to the APA, 5 U.S.C. 553(a)(2). As a result, the notice, public comment, and delayed effective date provisions of the APA are...
Code of Federal Regulations, 2013 CFR
2013-04-01
... OF LABOR FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, AS AMENDED BLACK LUNG BENEFITS; REQUIREMENTS FOR COAL MINE OPERATOR'S INSURANCE Authorization of Self-Insurers § 726.107 Deposits of negotiable... Federal Reserve banks or the Treasurer of the United States; authority to sell such securities; interest...
ERIC Educational Resources Information Center
McLean, Scott; Gasperini, Lavinia; Rudgard, Stephen
2002-01-01
The distance learning experiences of the United Nations Food and Agriculture Organization led to the following suggestions for applying distance learning strategies to the challenges of food security and rural development: use distance learning for the right reasons, be sensitive to context, use existing infrastructure, engage stakeholders, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
...- Institutional Broker units should not use trading or order management systems which permit them to share... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65035; File No. SR-CHX-2011-20] Self-Regulatory... Unit Within the Firm August 4, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... new information collection requirement concerning Contractors Performing Private Security Functions... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions Outside...
NASA Astrophysics Data System (ADS)
Martinez, Guillermo F.; Gupta, Hoshin V.
2011-12-01
Methods to select parsimonious and hydrologically consistent model structures are useful for evaluating dominance of hydrologic processes and representativeness of data. While information criteria (appropriately constrained to obey underlying statistical assumptions) can provide a basis for evaluating appropriate model complexity, it is not sufficient to rely upon the principle of maximum likelihood (ML) alone. We suggest that one must also call upon a "principle of hydrologic consistency," meaning that selected ML structures and parameter estimates must be constrained (as well as possible) to reproduce desired hydrological characteristics of the processes under investigation. This argument is demonstrated in the context of evaluating the suitability of candidate model structures for lumped water balance modeling across the continental United States, using data from 307 snow-free catchments. The models are constrained to satisfy several tests of hydrologic consistency, a flow space transformation is used to ensure better consistency with underlying statistical assumptions, and information criteria are used to evaluate model complexity relative to the data. The results clearly demonstrate that the principle of consistency provides a sensible basis for guiding selection of model structures and indicate strong spatial persistence of certain model structures across the continental United States. Further work to untangle reasons for model structure predominance can help to relate conceptual model structures to physical characteristics of the catchments, facilitating the task of prediction in ungaged basins.
2016-04-24
the Cybersecurity in the United States – Brief Overview 13 2.1. Data Breaches in the United States 14 2.2. Security and...Capacity to Defend 15 2.2.1. Cybersecurity Capabilities in the United States 18 2.3. Internationalization of Cybersecurity ...The Department of Homeland Security (DHS) Org Chart 43 2.2.1.2 National Cybersecurity and Communications Integration Center (NCCIC) Org
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 1 2011-07-01 2011-07-01 false Use and collection of social security numbers. 71.12... RECORDS UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall...
Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model
ERIC Educational Resources Information Center
Kassa, Woldeloul
2016-01-01
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
20 CFR 725.606 - Security for the payment of benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... operator or other employer fails to provide proof of such security to the Director within 30 days of its...-compliance to the appropriate United States district court in accordance with § 725.351(c). (f) Security... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security for the payment of benefits. 725.606...
Code of Federal Regulations, 2012 CFR
2012-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
Code of Federal Regulations, 2013 CFR
2013-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
Code of Federal Regulations, 2014 CFR
2014-01-01
... securities and non-corporate interests from third parties. 801.30 Section 801.30 Commercial Practices FEDERAL... securities and non-corporate interests from third parties. (a) This section applies to: (1) Acquisitions on a national securities exchange or through an interdealer quotation system registered with the United States...
77 FR 10960 - Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-24
...-AA87 Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the... security zone is necessary to ensure the safety of the President of the United States, members of his...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 1 2014-07-01 2013-07-01 true Use and collection of social security numbers. 71.12 Section... UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall provide the...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 1 2012-07-01 2012-07-01 false Use and collection of social security numbers. 71.12... RECORDS UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 1 2013-07-01 2013-07-01 false Use and collection of social security numbers. 71.12... RECORDS UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall...
29 CFR 71.12 - Use and collection of social security numbers.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 1 2010-07-01 2010-07-01 true Use and collection of social security numbers. 71.12 Section... UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall provide the...
Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)
2012-03-01
SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY
SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards
2002-05-01
Report to Congressional Requesters United States General Accounting Office GAO May 2002 SOCIAL SECURITY NUMBERS Government Benefits from SSN Use...and Subtitle SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards Contract Number Grant Number Program...Social Security benefits . Since that time, the number has been used for myriad non-Social Security purposes. Private sector use of the SSN has grown
12 CFR 403.1 - General policies and definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information requires, in the interest of national security, protection against unauthorized disclosure... SAFEGUARDING OF NATIONAL SECURITY INFORMATION § 403.1 General policies and definitions. (a) This regulation of..., declassification, and safeguarding of national security information and material of the United States. This...
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems
2002-04-01
Based Approach to Intrusion Detection System Evaluation for Distributed Real - Time Systems Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and...Distributed, Security. 1 Introduction Processing and cost requirements are driving future naval combat platforms to use distributed, real - time systems of...distributed, real - time systems . As these systems grow more complex, the timing requirements do not diminish; indeed, they may become more constrained
1998-06-01
Public Policy Analysis and Management Vol. 5 (Connecticut: JAI Press Inc ., 1992) 20. 38 Thomas A Simcik, Reengineering the Navy Program Objective...Winston Inc .,1969. Olvey, Lee D. The Economics of National Security, Avery Publishing Group : 1984. Premchand, A., Government Budgeting And Expenditure... the current process is presented and analyzed against relevant theory on policy analysis , reengineering, and contemporary budgeting systems, in
2014-06-16
SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their
The Past as Prologue: Realist Thought and the Future of American Security Policy
2011-01-01
Recently, and in large part due to a reaction to cultural relativism , some realists have sided with those who support universal human rights. They do...for ethics, justice, or morality .7 Similarly, John Herz is emphatic about how his realism is different from that of Morgenthau who, like Thucydides...Prologue survival pressures tightly constrain state behaviors, we should not expect internal characteristics or moral considerations to seriously
2013-08-14
Connectivity Graph; Graph Search; Bounded Disturbances; Linear Time-Varying (LTV); Clohessy - Wiltshire -Hill (CWH) 16. SECURITY CLASSIFICATION OF: 17...the linearization of the relative motion model given by the Hill- Clohessy - Wiltshire (CWH) equations is used [14]. A. Nonlinear equations of motion...equations can be used to describe the motion of the debris. B. Linearized HCW equations in discrete-time For δr << R, the linearized Hill- Clohessy
On the Water-Food Nexus: an Optimization Approach for Water and Food Security
NASA Astrophysics Data System (ADS)
Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem
2016-04-01
Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.
A TV-constrained decomposition method for spectral CT
NASA Astrophysics Data System (ADS)
Guo, Xiaoyue; Zhang, Li; Xing, Yuxiang
2017-03-01
Spectral CT is attracting more and more attention in medicine, industrial nondestructive testing and security inspection field. Material decomposition is an important issue to a spectral CT to discriminate materials. Because of the spectrum overlap of energy channels, as well as the correlation of basis functions, it is well acknowledged that decomposition step in spectral CT imaging causes noise amplification and artifacts in component coefficient images. In this work, we propose materials decomposition via an optimization method to improve the quality of decomposed coefficient images. On the basis of general optimization problem, total variance minimization is constrained on coefficient images in our overall objective function with adjustable weights. We solve this constrained optimization problem under the framework of ADMM. Validation on both a numerical dental phantom in simulation and a real phantom of pig leg on a practical CT system using dual-energy imaging is executed. Both numerical and physical experiments give visually obvious better reconstructions than a general direct inverse method. SNR and SSIM are adopted to quantitatively evaluate the image quality of decomposed component coefficients. All results demonstrate that the TV-constrained decomposition method performs well in reducing noise without losing spatial resolution so that improving the image quality. The method can be easily incorporated into different types of spectral imaging modalities, as well as for cases with energy channels more than two.
Food Insecurity and Food Resource Utilization in an Urban Immigrant Community.
Greenwald, Howard P; Zajfen, Vanessa
2017-02-01
Risk and prevalence of food insecurity and use of food security resources are important but incompletely understood factors in immigrant health. Key informant interviews and a survey (N = 809) of housing units were conducted in a San Diego, California neighborhood with a high proportion of immigrant and low income families. The difference in food insecurity between immigrant and non-immigrant households was non-significant (20.1 vs. 15.7 %, p = n.s.), though immigrant families were more likely to use food security resources such as SNAP (32.7 vs. 22.9 %, p < .01) and food pantries (28.2 vs. 19.7 %, p < .001). Among immigrants, neither national origin nor years in the United States predicted food insecurity or use of most food security resources. In immigrant families, food insecurity often remains a challenge long after immigration, suggesting a potentially increasing need for food security resources as immigration into the United States continues.
Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.
Keys, Yolanda; Stichler, Jaynelle F
Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.
Nuclear Security in the 21^st Century
NASA Astrophysics Data System (ADS)
Archer, Daniel E.
2006-10-01
Nuclear security has been a priority for the United States, starting in the 1940s with the secret cities of the Manhattan Project. In the 1970s, the United States placed radiation monitoring equipment at nuclear facilities to detect nuclear material diversion. Following the breakup of the Soviet Union, cooperative Russian/U.S. programs were launched in Russia to secure the estimated 600+ metric tons of fissionable materials against diversion (Materials Protection, Control, and Accountability -- MPC&A). Furthermore, separate programs were initiated to detect nuclear materials at the country's borders in the event that these materials had been stolen (Second Line of Defense - SLD). In the 2000s, new programs have been put in place in the United States for radiation detection, and research is being funded for more advanced systems. This talk will briefly touch on the history of nuclear security and then focus on some recent research efforts in radiation detection. Specifically, a new breed of radiation monitors will be examined along with the concept of sensor networks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the Federal Reserve Banks with respect to Book-entry Securities and security interests. 357.13 Section... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY TREASURY... (TRADES) § 357.13 Obligations of the United States and the Federal Reserve Banks with respect to Book...
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…
ERIC Educational Resources Information Center
O'Rand, Angela M.
2011-01-01
Recent patterns of labor exit in late life in the United States are increasingly heterogeneous. This heterogeneity stems from diverse employment careers that are emerging in the workplace where job security is declining. Individuals' structural locations in the labor market expose them to diverse risks for employment and income security at older…
Code of Federal Regulations, 2013 CFR
2013-01-01
... extraordinary threat to the national security, foreign policy, and economy of the United States. As a result... of May 1, 2012. The President took these actions to deal with the unusual and extraordinary threat to the national security, foreign policy, and economy of the United States constituted by the actions of...
Integrating Partner Nations into Coalition Operations
2006-01-01
of United Nations (UN) Security Council Resolu- tion 1529, Chile , Canada, France, and the United States established a multinational force...of restabi- lization. Chile continues to deploy forces as a member of the UN Stabilization Force Haiti (MINUSTAH), led by Brazil and comprised...supporting a tailored exercise and theater security cooperation program that has encouraged partners such as Chile , Brazil, and El Salvador to develop
Code of Federal Regulations, 2014 CFR
2014-07-01
... regulated navigation areas (RNA) or security zones: (1) Wall Street Heliport RNA. All waters of the East... northwest corner of Pier 2 North, Brooklyn (NAD 1983). (2) Randalls and Wards Islands RNA: All waters of the..., and all waters south of the Queensboro Bridge (NAD 1983). (6) United Nations Full River Closure RNA...
Governing the captives: forensic psychiatric nursing in corrections.
Holmes, Dave
2005-01-01
TOPIC/PROBLEM: Since 1978, the federal inmates of Canada serving time have had access to a full range of psychiatric care within the carceral system. Five psychiatric units are part of the Federal Correctional Services. Nursing practice in forensic psychiatry opens up new horizons in nursing. This complex professional nursing practice involves the coupling of two contradictory socio-professional mandates: to punish and to provide care. The purpose of this article is to present the results of a grounded theory doctoral study realized in a multi-level security psychiatric ward of the Canadian Federal Penitentiary System. The theoretical work of the late French philosopher, Michel Foucault, and those of sociologist, Erving Goffman, are used to illuminate the qualitative data that emerged from the author's fieldwork. A Foucauldian perspective allows us to understand the way forensic psychiatric nursing is involved in the governance of mentally ill criminals through a vast array of power techniques (sovereign, disciplinary, and pastoral) which posited nurses as "subjects of power". These nurses are also "objects of power" in that nursing practice is constrained by formal and informal regulations of the penitentiary context. As an object of "governmental technologies", the nursing staff becomes the body onto which a process of conforming to the customs of the correctional milieu is dictated and inscribed. The results of this qualitative research, from a nursing perspective, are the first of their kind to be reported in Canada since the creation of the Regional Psychiatric Correctional Units in 1978.
Social versus biophysical availability of wood in the northern United States
Brett J. Butler; Ma Zhao; David B. Kittredge; Paul Catanzaro
2010-01-01
The availability of wood, be it harvested for sawlogs, pulpwood, biomass, or other products, is constrained by social and biophysical factors. Knowing the difference between social and biophysical availability is important for understanding what can realistically be extracted. This study focuses on the wood located in family forests across the northern United States....
Power laws in cone production of longleaf pine across its native range in the United States
Xiongwen Chen; Qinfeng Guo; Dale G. Brockway
2017-01-01
Longleaf pine (Pinus palustris Mill.) forests in the southeastern United States are considered endangered ecosystems, because of their dramatic decrease in area since European colonization and poor rates of recovery related to episodic natural regeneration. Sporadic seed production constrains restoration efforts and complicates sustainable management of this species....
Conservation priorities for tree crop wild relatives in the United States
Colin K. Khoury; Stephanie L. Greene; Karen A. Williams; Chrystian C. Sosa; Chris Richards
2017-01-01
Crop wild relatives native to the United States have proved useful as genetic resources in breeding more productive, nutritious, and resilient crops. Their utilization is expected to increase with better information about the species and improving breeding tools. But this utilization may be constrained by their limited representation in genebanks and the ongoing loss...
Image-Aided Navigation Using Cooperative Binocular Stereopsis
2014-03-27
Global Postioning System . . . . . . . . . . . . . . . . . . . . . . . . . 1 IMU Inertial Measurement Unit...an intertial measurement unit ( IMU ). This technique capitalizes on an IMU’s ability to capture quick motion and the ability of GPS to constrain long...the sensor-aided IMU framework. Visual sensors provide a number of benefits, such as low cost and weight. These sensors are also able to measure
1996-11-01
As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.
Sandia National Laboratories: National Security Programs
policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We
10 CFR 1015.210 - Liquidation of collateral.
Code of Federal Regulations, 2010 CFR
2010-01-01
... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
... DEPARTMENT OF HOMELAND SECURITY United States Immigration and Customs Enforcement Agency... Department of Homeland Security, U.S. Immigration and Customs Enforcement (USICE), will submit the following... Homeland Security (DHS), Scott Elmore, Forms Manager, U.S. Immigration and Customs Enforcement, 801 I...
Increasing the resilience and security of the United States' power infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
2015-08-01
The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less
A demonstration of a low cost approach to security at shipping facilities and ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.
2010-04-01
Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."
Code of Federal Regulations, 2012 CFR
2012-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2014 CFR
2014-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2013 CFR
2013-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for...
Code of Federal Regulations, 2011 CFR
2011-10-01
... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo: Security threat assessments for...
Glossary: Defense Acquisition Acronyms and Terms. Revision 2
1987-07-01
Approved REPORT DOCUMENTATION PAGE OMBNo. 070-O 18 la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS % unclassified 2a. SECURITY CLASSIFICATION ...WORK UNIT Fort Belvoir, VA 22060-5426 ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification ) Glossary Defense Acquisition...DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION [RUNCLASSIFIED/UNLIMITED 0 SAME AS RPT 0 DTIC USERS unclassified 22a. NAME OF
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
EMP Threats to US National Security: Congressional Responses
NASA Astrophysics Data System (ADS)
Huessy, Peter
2011-04-01
The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.
Secure detection in quantum key distribution by real-time calibration of receiver
NASA Astrophysics Data System (ADS)
Marøy, Øystein; Makarov, Vadim; Skaar, Johannes
2017-12-01
The single-photon detectionefficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits the photon receiver’s imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key generation rate. The estimation is done by testing gated detectors using a randomly activated photon source inside the receiver unit. This estimate gives a secure rate for any detector with non-unity single-photon detection efficiency, both inherit or due to blinding. By adding extra optical components to the receiver, we make sure that the key is extracted from photon states for which our estimate is valid. The result is a quantum key distribution scheme that is secure against any attack that exploits detector imperfections.
2002-03-01
sections consists of four units, the Domestic Terrorism Operations Unit, the WMD Operations Unit, the WMD Countermeasures Unit, and Special Events Management Unit...Countermeasures Unit Chief Special Events Management Unit Chief Domestic Terrorism/ Counterterrorism Section Chief International Terrorism Section Asstistant
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 39 Postal Service 1 2013-07-01 2013-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 39 Postal Service 1 2012-07-01 2012-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 39 Postal Service 1 2014-07-01 2014-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 39 Postal Service 1 2011-07-01 2011-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
Fact Sheet: National Space Policy. Appendix F-2
NASA Technical Reports Server (NTRS)
1996-01-01
For over three decades, the United States has led the world in the exploration and use of outer space. Our achievements in space have inspired a generation of Americans and people throughout the world. We will maintain this leadership role by supporting a strong, stable, and balanced national space program that serves our goals in national security, foreign policy, economic growth, environmental stewardship, and scientific and technical excellence. Access to and use of space are central for preserving peace and protecting US national security as well as civil and commercial interests. The United States will pursue greater levels of partnership and cooperation in national and international space activities and work with other nations to ensure the continued exploration and use of outer space for peaceful purposes. The goals of the US space program are to: (a) Enhance knowledge of the Earth, the solar system, and the universe through human and robotic exploration; (b) Strengthen and maintain the national security of the United States; (c) Enhance the economic competitiveness and scientific and technical capabilities of the United States; (d) Encourage State, local, and private sector investment in, and use of, space technologies; (e) Promote international cooperation to further US domestic, national security, and foreign policies. The United States is committed to the exploration and use of outer space by all nations for peaceful purposes and for the benefit of all humanity. "Peaceful purposes" allow defense and intelligence-related activities in pursuit of national security and other goals. The United States rejects any claims to sovereignty by any nation over outer space or celestial bodies, or any portion thereof, and rejects any limitations on the fundamental right of sovereign nations to acquire data from space. The United States considers the space systems of any nation to be national property with the right of passage through and operations in space without interference. Purposeful interference with space systems shall be viewed as an infringement on sovereign rights. The US Government will maintain and coordinate separate national security and civil space systems where differing needs dictate. All actions undertaken by agencies and departments in implementing the national space policy shall be consistent with US law, regulations, national security requirements, foreign policy, international obligations, and nonproliferation policy. The National Science and Technology Council (NSTC) is the principal forum for resolving issues related to national space policy. As appropriate, the NSTC and NSC will co-chair policy process. This policy will be implemented within the overall resource and policy guidance provided by the President.
United Nations Charter, Chapter VII, Article 43: Now or Never.
Burkle, Frederick M
2018-04-25
For more than 75 years, the United Nations Charter has functioned without the benefit of Chapter VII, Article 43, which commits all United Nations member states "to make available to the Security Council, on its call, armed forces, assistance, facilities, including rights of passage necessary for the purpose of maintaining international peace and security." The consequences imposed by this 1945 decision have had a dramatic negative impact on the United Nation's functional capacity as a global body for peace and security. This article summarizes the struggle to implement Article 43 over the decades from the onset of the Cold War, through diplomatic attempts during the post-Cold War era, to current and often controversial attempts to provide some semblance of conflict containment through peace enforcement missions. The rapid growth of globalization and the capability of many nations to provide democratic protections to their populations are again threatened by superpower hegemony and the development of novel unconventional global threats. The survival of the United Nations requires many long overdue organizational structure and governance power reforms, including implementation of a robust United Nations Standing Task Force under Article 43. (Disaster Med Public Health Preparedness. 2018;page 1 of 8).
New 40Ar/39Ar eruption ages for the western Aeolian Arc, Southern Italy
NASA Astrophysics Data System (ADS)
Creamer, J. B.; Calvert, A. T.; Spera, F. J.
2011-12-01
New 40Ar/39Ar ages are presented for the western Aeolian Arc, southern Italy which help constrain eruption frequency and revise the local uplift history through bracketing the timing of marine terrace formation. The islands of Alicudi, Filicudi, and Salina are late-Quaternary composite stratovolcanoes which feature basaltic to dacitic calc-alkaline and high-K series lavas and pyroclastics. These islands have been the focus of several geochronologic studies in the past but many open questions remain due to recently revised mapping, conflicting ages, and incomplete coverage of eruptive sequences. On Salina, a single new age constrains the previously undated Corvo volcano to 128.8 +/- 5.3 ka. On Filicudi, three new dates constrain the oldest exposed episodes of volcanism to ~200-205 ka, in good agreement with previous K/Ar ages. The age of an intervening marine terrace is constrained by these oldest units to c. 200 ka. Additionally there is one new date of 80.4 ± 9.4 ka on the youngest effusive eruption on Filicudi, a dacite dome that overlies the youngest marine terrace on the island. On Alicudi, five new dates constrain the oldest exposed units (Paleo Alicudi Synthem) to 167.4 ± 26.1 ka, the Scoglio Galera to Spano synthems between 64.1 ± 4.1 ka and 59.3 ± 1.3 ka, and confirm the youngest eruptions (Fillo dell'Arpa Fm) at 30.0 ± 0.7 ka. Importantly, an undated formation that overlies the 59.3 ka unit is cut by a marine terrace that was previously interpreted to be ~80 ka (MIS 5a highstand). This result calls into question the archipelago-wide age correlation of marine terraces attempted by Lucchi et al. 2008 since the youngest terrace on Alicudi is younger than eruptive units that overly all terraces on Filicudi. Previous work suggesting that marine terraces on Filicudi were formed during Marine Isotope Stages (MIS) 5a,c, and e is permitted by our new ages, but the oldest terrace ('Paleoshoreline B') on Filicudi was possibly formed during MIS 7 rather than MIS 9, and terraces on Alicudi were likely formed during MIS 3 rather than MIS 5. This would require that the volcanoes have uplift histories that are much more independent of each other than previously thought, suggesting in turn that uplift may be controlled by individual magmatic systems rather than a regional phenomenon.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-15
... Exchange proposes to trade Nasdaq Securities within the existing DMM and SLP framework used to trade its... member organization will not be permitted to be registered as both the DMM Unit and an SLP for the same... Nasdaq Securities to a different DMM Unit or to a different SLP or SLPs. \\5\\ A representative of NYSE...
Rep. Issa, Darrell E. [R-CA-49
2009-07-09
Senate - 10/19/2009 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Authority for one-step turn-key design-build contracting for the United States Coast Guard (USCG). 3036.104-90 Section 3036.104-90 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SPECIAL CATEGORIES OF...
Geospatial Informational Security Risks and Concerns of the U.S. Air Force GeoBase Program
2007-03-01
multiple governmental directives such as the Government Performance and Results Act (GPRA), Paperwork Reduction Act (PRA), and Office of Management and... governments , non- governmental organizations (NGOs), universities, and commercial sector contractors (Lachman, 2006). One command noted that over...Defense, or the United States Government . AFIT/GEM/ENV/07-M1 GEOSPATIAL INFORMATIONAL SECURITY RISKS AND CONCERNS OF THE UNITED STATES
From Alliance to Acquaintance: The Australian-American Security Relationship
1991-12-01
THE DROVER’S DOG: HAWKE, 1983-1991 ................ 266 "Concerned to do Nothing" ...................... 269 "Brave Little New Zealand ...1951, Australia and New Zealand concluded a tripartite security pact with the United States. ANZUS did not commit the United States to help defend...discussions highlighted their extensive mutual interests and shared strategic perceptions as allies under the ANZUS (Australia, New Zealand and the
Holben, David H; Taylor, Christopher A
2015-09-01
Food insecurity is a preventable health threat and may precipitate central obesity and metabolic syndrome in children and adolescents in the United States. To examine (1) health by household food security status; and (2) differences and prevalence of central obesity among persons aged 12 to 18 years in the United States. The National Health and Nutrition Examination Survey was administered to a cross-sectional sample of persons aged 12 to 18 years in 1999 to 2006. Controlling for age, race/ethnicity, and sex differences in mean obesity and chronic disease factors across levels of food insecurity (analysis of covariance [Bonferroni post hoc] and ORs [logistic regression analyses]) were examined, as were differences in the rates of risk factors (χ(2) statistics). A total of 7435 participants were analyzed. Those from marginally food secure (n=751) and low-food secure (n=1206) (population size estimate, 26,714,182) households were significantly more likely than their high-food secure counterparts (n=4831) to be overweight (P=.036) (OR, 1.44), and those from marginally food secure households were 1.3-times more likely to be obese (P=.036). Nearly 25% of respondents from marginally food secure, low-food secure, and very low-food secure (n=647) households reported central obesity (P=.002), which was 1.4 to 1.5 times more likely than those from high-food secure households. Participants from high-food secure households had significantly higher mean high-density lipoprotein values (P=.019). Risk factors indicative of metabolic syndrome were present in 3.1%. Household food insecurity was associated with an increased likelihood of being overweight and having central obesity. Limitations included the use of cross-sectional data and some self-reported data and the inability to control for all moderating variables in obesity and overall health status.
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 39 Postal Service 1 2012-07-01 2012-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 39 Postal Service 1 2014-07-01 2014-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 39 Postal Service 1 2013-07-01 2013-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
39 CFR 267.5 - National Security Information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 39 Postal Service 1 2011-07-01 2011-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...
Russia’s Security Relations with Finland, Norway, and Sweden
2017-09-01
and the United States as threats to its national security. The thesis encompasses economic and political consideration; the historical context...threats to its national security. The thesis encompasses economic and political consideration; the historical context between Russia and Finland...15 A. ECONOMIC RELATIONS ....................................................................15 B. POLITICAL
75 FR 27602 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-17
... rules governing offers and sales of securities made outside the United States without registration under... clarification of the extent to which Section 5 of the Securities Act applies to offers and sales of securities... collection techniques or other forms of information technology. Consideration will be given to comments and...
6 CFR 13.42 - Judicial review.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Judicial review. 13.42 Section 13.42 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.42 Judicial review. Section 3805 of title 31, United States Code, authorizes judicial review by an appropriate...
DOT National Transportation Integrated Search
2003-04-01
This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...
45 CFR 30.16 - Liquidation of collateral.
Code of Federal Regulations, 2010 CFR
2010-10-01
... fails to pay the debt(s) within a reasonable time after demand and if such action is in the best interests of the United States. (2) Collection from other sources, including liquidation of security or... will liquidate security or collateral through the exercise of a power of sale in the security...
24 CFR 891.635 - Security deposits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Assistance § 891.635 Security deposits. The general requirements for security deposits on assisted units are... for disbursement under § 891.435(b)(3), the Borrower shall allocate to the family's balance the interest accrued on the balance during the year. Unless prohibited by State or local law, the Borrower may...
17 CFR 230.501 - Definitions and terms used in Regulation D.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Definitions and terms used in Regulation D. 230.501 Section 230.501 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... price attributable to cash received in a foreign currency shall be translated into United States...
17 CFR 230.251 - Scope of exemption.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Scope of exemption. 230.251 Section 230.251 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND... received in a foreign currency shall be translated into United States currency at a currency exchange rate...
14 CFR 1203.400 - Specific classifying guidance.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Information or material which is important to the national security of the United States in relation to other... Section 1203.400 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY... reasonably be expected to cause damage to the national security. In cases where it is believed that a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... Arms Control and International Security determined and certified to Congress that lifting sanctions on the following Chinese entities, their sub-units and successors is important to the national security... Security and Nonproliferation, Department of State, Telephone (202) 647-4930. SUPPLEMENTARY INFORMATION...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2010 CFR
2010-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2012 CFR
2012-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2013 CFR
2013-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2014 CFR
2014-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2011 CFR
2011-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
The Superpowers: Nuclear Weapons and National Security. National Issues Forums.
ERIC Educational Resources Information Center
Mitchell, Greg; Melville, Keith
Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…
Maternal Caregiving and Infant Security in Two Cultures.
ERIC Educational Resources Information Center
Posada, German; Jacobs, Amanda; Richmond, Melissa Y.; Carbonell, Olga A.; Alzate, Gloria; Bhstamante, Maria R.; Quiceno, Julio
2002-01-01
Examined maternal care and infant attachment security in a sample from the United States (Colorado) and one from Colombia. Found that maternal sensitivity and infant security were significantly associated in both samples. Identified six common and two noncommon domains (one per sample) of caregiving; associations between domains of maternal…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...
Secure electronic commerce communication system based on CA
NASA Astrophysics Data System (ADS)
Chen, Deyun; Zhang, Junfeng; Pei, Shujun
2001-07-01
In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.
Gamma-Ray imaging for nuclear security and safety: Towards 3-D gamma-ray vision
NASA Astrophysics Data System (ADS)
Vetter, Kai; Barnowksi, Ross; Haefner, Andrew; Joshi, Tenzing H. Y.; Pavlovsky, Ryan; Quiter, Brian J.
2018-01-01
The development of portable gamma-ray imaging instruments in combination with the recent advances in sensor and related computer vision technologies enable unprecedented capabilities in the detection, localization, and mapping of radiological and nuclear materials in complex environments relevant for nuclear security and safety. Though multi-modal imaging has been established in medicine and biomedical imaging for some time, the potential of multi-modal data fusion for radiological localization and mapping problems in complex indoor and outdoor environments remains to be explored in detail. In contrast to the well-defined settings in medical or biological imaging associated with small field-of-view and well-constrained extension of the radiation field, in many radiological search and mapping scenarios, the radiation fields are not constrained and objects and sources are not necessarily known prior to the measurement. The ability to fuse radiological with contextual or scene data in three dimensions, in analog to radiological and functional imaging with anatomical fusion in medicine, provides new capabilities enhancing image clarity, context, quantitative estimates, and visualization of the data products. We have developed new means to register and fuse gamma-ray imaging with contextual data from portable or moving platforms. These developments enhance detection and mapping capabilities as well as provide unprecedented visualization of complex radiation fields, moving us one step closer to the realization of gamma-ray vision in three dimensions.
Food Security in India, China, and the World
2016-06-01
undernourishment and projections of food security are made by the United Nations Food and Agricultural Organization (FAO). The FAO has been collecting... agricultural data from individual nations for decades and makes yearly assessments of the current state of food insecurity and periodic projections of...future global food security. The FAO assessment of food security in 2050 presents a likely future based on projections of current agricultural
Effectiveness of the Civil Aviation Security Program.
1981-04-15
on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil
Code of Federal Regulations, 2010 CFR
2010-01-01
... under Public Law 103-354 securities-issuance and redemption of certificate by Reserve bank. 1901.506... applied to such FmHA or its successor agency under Public Law 103-354 securities, the Reserve bank is... successor agency under Public Law 103-354 securities. (3) A Reserve bank as fiscal agent of the United...
Hydropower versus irrigation—an analysis of global patterns
NASA Astrophysics Data System (ADS)
Zeng, Ruijie; Cai, Ximing; Ringler, Claudia; Zhu, Tingju
2017-03-01
Numerous reservoirs around the world provide multiple flow regulation functions; key among these are hydroelectricity production and water releases for irrigation. These functions contribute to energy and food security at national, regional and global levels. While reservoir operations for hydroelectricity production might support irrigation, there are also well-known cases where hydroelectricity production reduces water availability for irrigated food production. This study assesses these relationships at the global level using machine-learning techniques and multi-source datasets. We find that 54% of global installed hydropower capacity (around 507 thousand Megawatt) competes with irrigation. Regions where such competition exists include the Central United States, northern Europe, India, Central Asia and Oceania. On the other hand, 8% of global installed hydropower capacity (around 79 thousand Megawatt) complements irrigation, particularly in the Yellow and Yangtze River Basins of China, the East and West Coasts of the United States and most river basins of Southeast Asia, Canada and Russia. No significant relationship is found for the rest of the world. We further analyze the impact of climate variables on the relationships between hydropower and irrigation. Reservoir flood control functions that operate under increased precipitation levels appear to constrain hydroelectricity production in various river basins of the United States, South China and most basins in Europe and Oceania. On the other hand, increased reservoir evaporative losses and higher irrigation requirements due to higher potential evaporation levels may lead to increased tradeoffs between irrigation and hydropower due to reduced water availability in regions with warmer climates, such as India, South China, and the Southern United States. With most reservoirs today being built for multiple purposes, it is important for policymakers to understand and plan for growing tradeoffs between key functions. This will be particularly important as climate mitigation calls for an increase in renewable energy while agro-hydrological impacts of climate change, population and economic growth and associated dietary change increase the need for irrigated food production in many regions round the world.
Reinforcement Learning for Constrained Energy Trading Games With Incomplete Information.
Wang, Huiwei; Huang, Tingwen; Liao, Xiaofeng; Abu-Rub, Haitham; Chen, Guo
2017-10-01
This paper considers the problem of designing adaptive learning algorithms to seek the Nash equilibrium (NE) of the constrained energy trading game among individually strategic players with incomplete information. In this game, each player uses the learning automaton scheme to generate the action probability distribution based on his/her private information for maximizing his own averaged utility. It is shown that if one of admissible mixed-strategies converges to the NE with probability one, then the averaged utility and trading quantity almost surely converge to their expected ones, respectively. For the given discontinuous pricing function, the utility function has already been proved to be upper semicontinuous and payoff secure which guarantee the existence of the mixed-strategy NE. By the strict diagonal concavity of the regularized Lagrange function, the uniqueness of NE is also guaranteed. Finally, an adaptive learning algorithm is provided to generate the strategy probability distribution for seeking the mixed-strategy NE.
Armed and Dangerous? UAVs and U.S. Security
2014-01-01
MEMS] as inertial navigation units [INUs]. This technology is widely used in commercial products, such as toy helicopters and Wii controllers. The...aircraft? In conclusion, both the MTCR and Wassenaar Arrange- ment provide the United States with the flexibility and controls to be able to balance its...security and nonproliferation goals with respect to armed UAVs. Perhaps more problematic is whether the government interagency can strike a balance
Code of Federal Regulations, 2010 CFR
2010-04-01
... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...
Code of Federal Regulations, 2012 CFR
2012-04-01
... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...
Code of Federal Regulations, 2014 CFR
2014-04-01
... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...
Code of Federal Regulations, 2013 CFR
2013-04-01
... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...
Code of Federal Regulations, 2011 CFR
2011-04-01
... held by the Trust for purchase of the securities); (2) If, within ninety days from the time that the... by a corporation and which have their interest or dividend rate fixed at the time they are issued; (2... subdivision thereof; (3) Government securities; and (4) Units of a previously issued series of the Trust...
Alternative Futures: United States Air Force Security Police in the Twenty-First Century
1988-04-01
34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police
2009 Homeland Security Symposium and Exhibition
2009-09-10
electronified check, ACH or Draft • Opportunity for Merchant and Merchant employee collusion • Remote Deposit Collection (RDC) • eCommerce – a world of new...police _$; _ Units US Coast Guard _$; _ Units Urban Search & Rescue _$; _ Units Rural Search & Rescue _$; _ Units Public/ University hospitals
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-08-09
security and control over nuclear weapons and fissile materials. These projects provided Russia with bullet-proof Kevlar blankets, secure canisters ...U.S. security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early...U.S.-Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
Tolma, Eleni; John, Robert; Garner, Jane
2007-01-01
Food insecurity in the United States is a major public health issue. The main objective of this study was to evaluate the availability and quality of printed materials addressing food security targeted to special populations by the United States Department of Agriculture (USDA). Nutrition education resources addressing food security available from USDA websites were selected for analysis. Not applicable. The review team consisted of project staff (n = 6), two of who were fluent in Spanish. Selection criteria were established to identify the food-security materials, and a group of reviewers assessed the quality of each publication both quantitatively and qualitatively. A consensus meeting among the reviewers was held to make final determinations of the quality of the materials. The quantitative data analysis consisted of basic descriptive statistics. Among the 27 materials initially identified, 20 were either irrelevant or of low relevance to food security. Moreover, very few of them were intended for minority populations. The quality of most of the materials ranged from "average" to "good." Some of the major weaknesses include readability level, lack of cultural relevance, and inadequate coverage of food insecurity. Very few materials on food insecurity are of high quality. In the development of such materials, emphasis should be given to the readability level, content, and cultural relevance.
20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...) granting its application to self-insure and fixing the required security deposit amount (see § 703.303... laws of the United States and the rules and regulations governing bonding companies may act as sureties...
Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.
ERIC Educational Resources Information Center
Telecommunications Policy Research Conference, Inc., Washington, DC.
In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…
ERIC Educational Resources Information Center
Wynn, Cynthia L.
2017-01-01
An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…
6 CFR 13.32 - Location of hearing.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Location of hearing. 13.32 Section 13.32 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.32 Location of hearing. (a) The hearing may be held: (1) In any judicial district of the United...
Jimmy Carter's National Security Policy: A World Order Critique.
ERIC Educational Resources Information Center
Johansen, Robert C.
This essay evaluates the Carter administration's behavior on national security questions and appraises the extent to which it meets Carter's initial professed national security goals. These goals include the intention to reduce military expenditures, to halt the nuclear arms buildup of the United States and U.S.S.R., to prevent the spread of…
Code of Federal Regulations, 2010 CFR
2010-10-01
... threat assessments for cargo personnel in the United States. 1544.228 Section 1544.228 Transportation... COMMERCIAL OPERATORS Operations § 1544.228 Access to cargo and cargo screening: Security threat assessments... paragraph (b) of this section— (1) Each individual must successfully complete a security threat assessment...
30 CFR 250.1615 - Securing of wells.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Securing of wells. 250.1615 Section 250.1615... § 250.1615 Securing of wells. A downhole-safety device such as a cement plug, bridge plug, or packer... evacuation of the drilling crew, prevent station keeping, or require repairs to major drilling units or well...
Private Security Training. Phase 1: Basic. Instructor Edition.
ERIC Educational Resources Information Center
Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.
This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…
Code of Federal Regulations, 2013 CFR
2013-04-01
... to secure a loan made to finance the unpaid purchase price of a Corporate Certificate together with... to a security instrument creating a lien, whether called a mortgage, deed of trust, security deed or...) Corporate Certificate shall mean such stock certificates, membership certificates, or other instruments...
Code of Federal Regulations, 2014 CFR
2014-04-01
... to secure a loan made to finance the unpaid purchase price of a Corporate Certificate together with... to a security instrument creating a lien, whether called a mortgage, deed of trust, security deed or...) Corporate Certificate shall mean such stock certificates, membership certificates, or other instruments...
Code of Federal Regulations, 2011 CFR
2011-04-01
... to secure a loan made to finance the unpaid purchase price of a Corporate Certificate together with... to a security instrument creating a lien, whether called a mortgage, deed of trust, security deed or...) Corporate Certificate shall mean such stock certificates, membership certificates, or other instruments...
Code of Federal Regulations, 2012 CFR
2012-04-01
... to secure a loan made to finance the unpaid purchase price of a Corporate Certificate together with... to a security instrument creating a lien, whether called a mortgage, deed of trust, security deed or...) Corporate Certificate shall mean such stock certificates, membership certificates, or other instruments...
20 CFR 404.1911 - Effects of a totalization agreement on entitlement to hospital insurance benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Act by combining the person's periods of coverage under the social security system of the United States with the person's periods of coverage under the social security system of the foreign country... entitlement to hospital insurance benefits. 404.1911 Section 404.1911 Employees' Benefits SOCIAL SECURITY...
Parental Involvement in School and the Role of School Security Measures
ERIC Educational Resources Information Center
Mowen, Thomas J.
2015-01-01
Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…
2002-04-01
Training environments; Distance learning; Information sharing; System architecture; 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public... security , and the team members generally originate from different geographical locations and different units with varied operational mission and...Use of a server provides security and flexibility in the development and updating of training material. The lessons are created in HTML, a widely
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-31
... DEPARTMENT OF HOMELAND SECURITY United States Immigration and Customs Enforcement Agency... and Local Agency Assessment; OMB Control No. 1653-0040. The Department of Homeland Security, U.S... Security sponsoring the collection: Form 70-003, Form 70-004, Form 75-001 and Form 75-002; U.S. Immigration...
Household Food Security Study Summaries. 2001 Edition.
ERIC Educational Resources Information Center
Seavey, Dorie; Sullivan, Ashley F.
This report provides the most recent data on the food security of United States households. Based on studies using the Food Security Core Module (FSCM), a tool facilitating direct documentation of the extent of food insecurity and hunger caused by income limitations, this report summarizes 35 studies representing 20 states and Canada. The report…
Required Security Screenings for Researchers: A Policy Analysis and Commentary
ERIC Educational Resources Information Center
Zucker, Andrew A.
2011-01-01
After the attacks of 9/11/2001 the federal government implemented new policies intended to protect people and institutions in the United States. A surprising policy requires education researchers conducting research under contract to the U.S. Department of Education (ED) to obtain security clearances, sometimes known as security screenings.…
Code of Federal Regulations, 2014 CFR
2014-10-01
... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii...
75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... recommended laboratory critical infrastructure security standards in these areas; and 5. other emerging policy... legitimate activities. (c) Understanding that research and laboratory work on BSAT is essential to both... of the SAR that would establish security standards specific to Tier 1 agents and toxins. (b) The...
The Elements of a Network to Educate for World Security.
ERIC Educational Resources Information Center
Network to Educate for World Security, New York, NY.
This publication examines efforts to educate for peace and disarmament. A proposal by the Network to Educate for World Security for the establishment of a United Nations sponsored disarmament fund devoted to worldwide peace and security education is presented in Section One. Section Two contains papers that suggest how the traditional way to…
Deep Resistivity Structure of Mid Valley, Nevada Test Site, Nevada
Wallin, Erin L.; Rodriguez, Brian D.; Williams, Jackie M.
2009-01-01
The U.S. Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) at their Nevada Site Office (NSO) are addressing ground-water contamination resulting from historical underground nuclear testing through the Environmental Management (EM) program and, in particular, the Underground Test Area (UGTA) project. From 1951 to 1992, 828 underground nuclear tests were conducted at the Nevada Test Site northwest of Las Vegas (DOE UGTA, 2003). Most of these tests were conducted hundreds of feet above the ground-water table; however, more than 200 of the tests were near, or within, the water table. This underground testing was limited to specific areas of the Nevada Test Site including Pahute Mesa, Rainier Mesa/Shoshone Mountain (RM-SM), Frenchman Flat, and Yucca Flat. One issue of concern is the nature of the somewhat poorly constrained pre-Tertiary geology and its effects on ground-water flow in the area subsequent to a nuclear test. Ground-water modelers would like to know more about the hydrostratigraphy and geologic structure to support a hydrostratigraphic framework model that is under development for the Rainier Mesa/Shoshone Mountain (RM-SM) Corrective Action Unit (CAU) (National Security Technologies, 2007). During 2003, the U.S. Geological Survey (USGS), in cooperation with the DOE and NNSA-NSO collected and processed data at the Nevada Test Site in and near Yucca Flat (YF) to help define the character, thickness, and lateral extent of the pre-Tertiary confining units. We collected 51 magnetotelluric (MT) and audio-magnetotelluric (AMT) stations for that research (Williams and others, 2005a, 2005b, 2005c, 2005d, 2005e, and 2005f). In early 2005 we extended that research with 26 additional MT data stations (Williams and others, 2006) located on and near Rainier Mesa and Shoshone Mountain (RM-SM). The new stations extended the area of the hydrogeologic study previously conducted in Yucca Flat, further refining what is known about the pre-Tertiary confining units. In particular, a major goal was to define the extent of the upper clastic confining unit (UCCU). The UCCU is composed of late Devonian to Mississippian siliciclastic rocks assigned to the Eleana Formation and Chainman Shale (National Security Technologies, 2007). The UCCU underlies the Yucca Flat area and extends southwestward toward Shoshone Mountain, westward toward Buckboard Mesa, and northwestward toward Rainier Mesa. Late in 2005 we collected data at an additional 14 MT stations in Mid Valley, CP Hills, and northern Yucca Flat. That work was done to better determine the extent and thickness of the UCCU near the boundary between the southeastern RM-SM CAU and the southwestern YF CAU, and also in the northern YF CAU. The MT data have been released in a separate U.S. Geological Survey report (Williams and others, 2007). The Nevada Test Site magnetotelluric data interpretation presented in this report includes the results of detailed two-dimensional (2-D) resistivity modeling for each profile and inferences on the three-dimensional (3-D) character of the geology within the region.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
An improved anonymous authentication scheme for roaming in ubiquitous networks.
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
An improved anonymous authentication scheme for roaming in ubiquitous networks
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575
75 FR 75708 - American United Life Insurance Company, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29521; File No. 812-13780] American United Life...: American United Life Insurance Company (``AUL''), AUL American Unit Trust (``AUL Account''). AUL and the...., American United Life Insurance Company, One American Square, Indianapolis, Indiana 46282. Copies to...
United Nations Day, 24 October.
ERIC Educational Resources Information Center
Osborne, Ken, Ed.
1993-01-01
Serving as the journal of the Manitoba Social Science Teachers' Association, this issue commemorates United Nations Day with the editorial, "Teaching about the United Nations" (Ken Osborne). Another article devoted to the international organization is "The United Nations and International Peace and Security" (Ken Osborne). The…
Chance Constrained Programming and Other Approaches to Risk in Strategic Management. Revision
1989-02-01
reflected in ,0 ( Aaker and Jacobson, 1987). In the context of strategic management planning, however, there is another point to consider in that risk...least squares in the same spirit as Aaker and Jacobson (1987), and total risk was measured by the total variability of a security’s return. Lubatkin and...theory, Amihud and Lev (1981), and Eger (1983) in the finance literature, as well as the studies by Aaker and Jacobson (1987), and Lubatkin and O’Neill
ERIC Educational Resources Information Center
Kingsbury, Nancy
2011-01-01
Amid efforts to improve performance and constrain spending, federal agencies are being asked to expand the use of rigorous program evaluation in decision-making. In addition to performance data, indepth program evaluation studies are often needed for assessing program impact or designing improvements. Agencies can also use their evaluation…
Rethinking Merida’s Priorities: The Time is Now to Invest in Homeland Security
2011-10-28
other provision of law , no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a...would constrain DTO operations by fortifying law enforcement institutions on both sides of the U.S.-Mexico border while applying a progressive approach...the Bush-Calderón approach, termed the Mérida Initiative, in Public Law 110-252. This three-year economic assistance package appropriated $1.6
2009-10-29
Presidential Initiative to End Hunger in Africa ( IEHA )—which represented the U.S. strategy to help fulfill the MDG goal of halving hunger by 2015...was constrained in funding and limited in scope. In 2005, USAID, the primary agency that implemented IEHA , committed to providing an estimated $200...Development Assistance (DA) and other accounts. IEHA was intended to build an African-led partnership to cut hunger and poverty by investing in efforts
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
.... Standard of Judicial Review The Clayton Act, as amended by the APPA, requires that proposed consent...-interest standard under the Tunney Act); United States v. InBev N.V./S.A., 2009-2 Trade Cas. (CCH) ] 76,736.... Mass. 1975) (noting that, in this way, the court is constrained to ``look at the overall picture not...
United States Agency for International Development
... We Do Areas of Focus What We Do Agriculture and Food Security Democracy, Human Rights and Governance ... Resource Portal What We Do What We Do Agriculture and Food Security Democracy, Human Rights and Governance ...
Review of Paleomagnetic Age Constraints of Mid-Continent Rift Strata, Upper Midwestern United States
NASA Astrophysics Data System (ADS)
Houlihan, E.; Runkel, A.; Feinberg, J. M.; Cowan, C. A.; Titus, S.
2016-12-01
The Keweenawan Supergroup consists of 1.1 Ga volcanic units and overlying km-thick sedimentary succession that are associated with the Midcontinent Rift (MR), one of the most prominent geologic features in the Precambrian basement rocks of the North American craton (Morey and Green, 1982; Ojakangas et al., 2001; Ojakangas and Dickas, 2002). Recent studies targeting the sedimentary sequences of the rift highlight a longstanding problem that limits the impact of their results. The studies are based on data collected from a sedimentary package of the Keweenawan Supergroup that is very poorly constrained in age. Sedimentary strata low in the succession are constrained by dated intercalated volcanics, or mineralization ages, that indicate syn-rift filling commenced at about 1087 Ma as volcanism was waning (Davis and Paces, 1990). However, km-thick younger strata within the rift are constrained in maximum age only by virtue of overlying Cambrian fossil-bearing units (Morey and Ojakangas, 1982). Thus, the bulk of the MR sedimentary succession has a range in possible age of about 500 Ma, and potentially is in places as young as Middle Cambrian. Paleomagnetic methods may hold the most promise to date the MR sedimentary succession. Widespread paleomagnetic studies have been conducted on the igneous rocks of the rift, and several previous studies have used paleomagnetic techniques to date the sedimentary units as well (Dubois, 1962; Henry et al., 1976; Elmore and Van der Voo, 1978; Roy and Robertson, 1978; Halls and Palmer, 1981; Palmer et al., 1981; Watts, 1981; McCabe and Van der Voo, 1982; Diehl and Haig, 1994; Kulakov et al., 2013 and others). These authors generally considered the paleomagnetic signatures to be consistent with a Mesoproterozoic age for both the igneous and sedimentary rocks of the rift. Recently, however, authors have suggested that the uppermost sedimentary units are much younger in age, based on a combination of zircon and paleomagnetic analysis (Malone et al., 2016). Here, we present new paleomagnetic data collected in 2015, and combine it with previous paleomagnetic studies to synthesize all paleomagnetic data on the Mid-Continent Rift strata and provide suggestions for future studies to determine the age and correlation of the units.
The marginal cost of public funds with an aging population.
Wildasin, D E
1991-05-01
"As populations in the United States and other advanced economies grow older, the burden of social security and health care financing is expected to rise markedly. Payroll, income, and other taxes on working populations are projected to rise accordingly. The marginal welfare cost to workers of social security and other public expenditures is analyzed within the context of a two-period life cycle model. By relaxing separability assumptions that have become common in the literature, the theoretical structure properly incorporates the effect of these public expenditures on labor supply. Comparative statics results indicate that changing age structure is likely to raise the marginal welfare to workers of social security, education, and other public expenditures. Illustrative calculations for the United States confirm this result, suggesting that the cost to workers of incremental social security benefits may easily double by 2025-2050." excerpt
NASA Technical Reports Server (NTRS)
Gunawan, Ryan A.
2016-01-01
With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.
HIV/AIDS Securitization: Outcomes and Current Challenges.
Shadyab, Aladdin H; Hale, Braden R; Shaffer, Richard A
2017-01-01
The securitization (i.e., framing of a health issue as a security threat) of HIV/AIDS by the United Nations Security Council in 2000 changed the belief that HIV/AIDS is only a health issue. Although now accepted that HIV/AIDS represents a security threat, the consequences of securitization are still not widely established. The purpose of this paper was to present an evidence-based review of the outcomes and current challenges associated with HIV/AIDS securitization in the context of national security. We provided an overview of HIV/AIDS securitization, followed by a discussion of the impact of securitization on peacekeeping personnel and uniformed services. We also reviewed the United States Government's response to securitization and potential risks and benefits of securitization. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
Alternative Fuels Data Center: Biodiesel Benefits
provides safety benefits. Energy Security and Balance The United States imported 19% of its petroleum in energy balance meaning that biodiesel yields 4.56 units of energy for every unit of fossil energy
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-01-29
U.S. security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early...Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and...the former Soviet Union. The United States is also a leader of an international regime that attempts to limit the spread of nuclear weapons. This
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-06-01
security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early 1970s...Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and biological...former Soviet Union. The United States is also a leader of an international regime that attempts to limit the spread of nuclear weapons. This regime
ERIC Educational Resources Information Center
Madhavan, Sangeetha; Roy, Kevin
2012-01-01
In this article, the authors examine how low-income Black men in South Africa and the United States work with their kin to secure fathering and ensure the well-being of children. They use ethnographic and life history data on men who fathered children from 1992 to 2005 to demonstrate how fathers' roles as kin workers enable them to meet culturally…
Zero Nuclear Weapons and Nuclear Security Enterprise Modernization
2011-01-01
national security strategy. For the first time since the Manhattan Project , the United States was no longer building nuclear weapons and was in fact...50 to 60 years to the Manhattan Project and are on the verge of catastrophic failure. Caustic chemicals and processes have sped up the corrosion and...day, the United States must fund the long-term modernization effort of the entire enter prise. Notes 1. Nuclear Weapon Archive, “The Manhattan
Kirkpatrick, Sharon I; Dodd, Kevin W; Parsons, Ruth; Ng, Carmina; Garriguet, Didier; Tarasuk, Valerie
2015-07-01
The most recent statistics indicate that the prevalence of food insecurity in the United States is double that in Canada, but the extent to which the nutrition implications of this problem differ between the countries is not known. This study was undertaken to compare adequacy of nutrient intakes in relation to household food insecurity among youth and adults in Canada and the United States. Data from comparable nationally representative surveys, the 2004 Canadian Community Health Survey and the 2003-2006 NHANES, were used to estimate prevalences of inadequate intakes of vitamins A and C, folate, calcium, magnesium, and zinc among youth and adults in food-secure and food-insecure households. Potential differences in the composition of the populations between the 2 countries were addressed by using standardization, and analyses also accounted for participation in food and nutrition assistance programs in the United States. Larger gaps in the prevalences of inadequate intakes between those in food-secure and food-insecure households were observed in Canada than in the United States for calcium and magnesium. For calcium, the prevalences of inadequate intakes among those in food-secure and food-insecure households in Canada were 50% and 66%, respectively, compared with 50% and 51%, respectively, in the United States. For magnesium, the prevalences of inadequate intakes in Canada were 39% and 60% among those in food-secure and food-insecure households, respectively, compared with 60% and 61%, respectively, in the United States. These findings were largely unchanged after we accounted for participation in food and nutrition assistance programs in the United States. This study suggests that household food insecurity is a stronger marker of nutritional vulnerability in Canada than in the United States. The results highlight the need for research to elucidate the effects of domestic policies affecting factors such as food prices and fortification on the nutritional manifestations of food insecurity. © 2015 American Society for Nutrition.
2010-06-01
CLOTHES: THE CASE FOR BROADER APPLICATION OF RED TEAMING WITHIN HOMELAND SECURITY by A. Bentley Nettles June 2010 Thesis Advisor...Red Teaming Within Homeland Security 6. AUTHOR(S) A. Bentley Nettles 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...APPLICATION OF RED TEAMING WITHIN HOMELAND SECURITY A. Bentley Nettles Colonel, United States Army B.A., Texas A&M University, 1985 J.D. South
Toumi, A; Leteneur, S; Gillet, C; Debril, J-F; Decoufour, N; Barbier, F; Jakobi, J M; Simoneau-Buessinger, Emilie
2015-11-01
Many studies have focused on maximum torque exerted by ankle joint muscles during plantar flexion. While strength parameters are typically measured with isokinetic or isolated ankle dynamometers, these devices often present substantial limitations for the measurement of torque because they account for force in only 1 dimension (1D), and the device often constrains the body in a position that augments torque through counter movements. The purposes of this study were to determine the contribution of body position to ankle plantar-flexion torque and to assess the use of 1D and 3D torque sensors. A custom designed 'Booted, Open-Unit, Three dimension, Transportable, Ergometer' (B.O.T.T.E.) was used to quantify plantar flexion in two conditions: (1) when the participant was restrained within the unit (locked-unit) and (2) when the participant's position was independent of the ankle dynamometer (open-unit). Ten young males performed maximal voluntary isometric plantar-flexion contractions using the B.O.T.T.E. in open and locked-unit mechanical configurations. The B.O.T.T.E. was reliable with ICC higher than 0.90, and CV lower than 7 %. The plantar-flexion maximal resultant torque was significantly higher in the locked-unit compared with open-unit configuration (P < 0.001; +61 to +157 %) due to the addition of forces from the body being constrained within the testing device. A 1D compared with 3D torque sensor significantly underestimated the proper capacity of plantar-flexion torque production (P < 0.001; -37 to -60 %). Assessment of plantar-flexion torque should be performed with an open-unit dynamometer mounted with a 3D sensor that is exclusive of accessory muscles but inclusive of all ankle joint movements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... WORKERS' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Authorization of Self-Insurers § 703...; interest thereon. Deposits of negotiable securities provided for by the regulations in this part shall be... will authorize the self-insurer to collect interest on the securities deposited by it unless any of the...
Rep. Oberstar, James L. [D-MN-8
2009-05-07
House - 05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-29
... Underlying Index measures the performance of investment-grade taxable debt securities of the U.S. municipal... of ICUs based on certain fixed income indexes. See, e.g., Securities Exchange Act Release No. 48662... Investment Company Units based on a fixed income index in Securities Exchange Act Release No. 55783 (May 17...
Nonimmigrant Overstays: Brief Synthesis of the Issue
2010-01-15
finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States
75 FR 76263 - Inmate Discipline Program/Special Housing Units: Subpart Revision and Clarification
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
... security or orderly running of the institution or the Bureau of Prisons most like another prohibited act in... harm to others; or those hazardous to institutional security or personal safety; e.g., hack-saw blade... Conduct which disrupts or interferes with the security or orderly running of the institution or the Bureau...
Rep. Wolf, Frank R. [R-VA-10
2010-01-13
House - 01/28/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Code of Federal Regulations, 2011 CFR
2011-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
National Security and U.S.-Soviet Relations. Occasional Paper 26.
ERIC Educational Resources Information Center
Clemens, Walter C., Jr.
This paper provides an analytical look at the evolving relationship between the United States and the Soviet Union. The author explores the prospects for international security and advocates a number of policies which would benefit both societies. The first section in the booklet discusses how U.S. security cannot be assured even if the Congress…
Code of Federal Regulations, 2014 CFR
2014-10-01
..., corporate bonds, or other corporate securities in any single railroad, or a company engaged in the... bonds or other corporate securities, if the current aggregate market value of the stocks and other... a current aggregate market value of $10,000 or more, or an option to purchase such securities, shall...
Management of Security Services in Higher Education. National Report.
ERIC Educational Resources Information Center
Higher Education Funding Council for Wales, Cardiff.
This report, the seventh in a series from the Value for Money Steering Group, identifies the key management issues for governors, senior managers, and heads of security services at institutions of higher education in the United Kingdom in developing and reviewing security services to ensure that they are effective and provide value for money.…
Code of Federal Regulations, 2012 CFR
2012-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Improvement of One Quantum Encryption Scheme
NASA Astrophysics Data System (ADS)
Cao, Zhengjun; Liu, Lihua
2012-01-01
Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.
19 CFR 12.104j - Emergency protection for Iraqi cultural antiquities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Cultural Property § 12.104j Emergency... National Library of Iraq, and other locations in Iraq, since the adoption of United Nations Security...
Surface transportation vulnerability assessment : general distribution version
DOT National Transportation Integrated Search
2001-10-25
The United States possesses an effective and efficient surface transportation infrastructure that : promotes both the well-being of its citizens as well as important economic and national security : goals. The level of security afforded this infrastr...
Magnetotelluric Data, Mid Valley, Nevada Test Site, Nevada
Williams, Jackie M.; Wallin, Erin L.; Rodriguez, Brian D.; Lindsey, Charles R.; Sampson, Jay A.
2007-01-01
Introduction The United States Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) at their Nevada Site Office (NSO) are addressing ground-water contamination resulting from historical underground nuclear testing through the Environmental Management (EM) program and, in particular, the Underground Test Area (UGTA) project. One issue of concern is the nature of the somewhat poorly constrained pre-Tertiary geology and its effects on ground-water flow. Ground-water modelers would like to know more about the hydrostratigraphy and geologic structure to support a hydrostratigraphic framework model that is under development for the Rainier Mesa/Shoshone Mountain Corrective Action Unit (CAU). During 2003, the U.S. Geological Survey (USGS), in cooperation with the DOE and NNSA-NSO, collected and processed data at the Nevada Test Site in and near Yucca Flat (YF) to help define the character, thickness, and lateral extent of the pre-Tertiary confining units. We collected 51 magnetotelluric (MT) and audio-magnetotelluric (AMT), stations for that research. In early 2005 we extended that research with 26 additional MT data stations, located on and near Rainier Mesa and Shoshone Mountain (RM-SM). The new stations extended the area of the hydrogeologic study previously conducted in Yucca Flat. This work was done to help refine what is known about the character, thickness, and lateral extent of pre-Tertiary confining units. In particular, a major goal was to define the upper clastic confining unit (UCCU). The UCCU is comprised of late Devonian to Mississippian siliciclastic rocks assigned to the Eleana Formation and Chainman Shale. The UCCU underlies the Yucca Flat area and extends westward towards Shoshone Mountain, southward to Buckboard Mesa, and northward to Rainier Mesa. Late in 2005 we collected another 14 MT stations in Mid Valley and in northern Yucca Flat basin. That work was done to better determine the extent and thickness of the UCCU near the southeastern RM-SM CAU boundary with the southwestern YF CAU, and also in the northern YF CAU. The purpose of this report is to release the MT data at those 14 stations. No interpretation of the data is included here.
Neuroscience, ethics, and national security: the state of the art.
Tennison, Michael N; Moreno, Jonathan D
2012-01-01
National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.
2009-01-01
The United States needs a new model of “globalized” national security for this changing world: we must realign longstanding policies away from go...at the center of our approach to ensuring our future security. … Now, when we most need to re-examine our Transatlantic security model, this new two...address the globalized threats we face, our gov- ernment is already reorienting the capabilities of our national security forces to a new bal- ance
7 CFR 1212.32 - United States Customs Service.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 10 2013-01-01 2013-01-01 false United States Customs Service. 1212.32 Section 1212... § 1212.32 United States Customs Service. “United States Customs Service” or “Customs” means the United States Customs and Border Protection, an agency of the Department of Homeland Security. Honey Packers and...
7 CFR 1212.32 - United States Customs Service.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 10 2014-01-01 2014-01-01 false United States Customs Service. 1212.32 Section 1212... § 1212.32 United States Customs Service. “United States Customs Service” or “Customs” means the United States Customs and Border Protection, an agency of the Department of Homeland Security. Honey Packers and...
7 CFR 1212.32 - United States Customs Service.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 10 2012-01-01 2012-01-01 false United States Customs Service. 1212.32 Section 1212... § 1212.32 United States Customs Service. “United States Customs Service” or “Customs” means the United States Customs and Border Protection, an agency of the Department of Homeland Security. Honey Packers and...
2015-06-01
are amplified by shifting demographics. Youth populations are rapidly growing in Africa and the Middle East, regions that face resource shortages...fear in opponents and generate support for their causes. They use improvised explosive devices (IED), suicide vests, and tailored cyber tools to...our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such
2010-09-01
of Defense DTSA Defense Technology Security Administration FMS Foreign Military Sales GSD Gulf Security Dialogue LOA Letter of Offer and...may refer license applications to the Defense Technology Security Administration ( DTSA ) to determine if the United States should release the...requested technology to the requesting foreign government. Specifically, DTSA assesses the sale’s impact on preserving critical U.S. military technological
1989-06-01
Science Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASS’r!CATION )b RESTRICTIVE MARKINGS UNCLASSIFIED...2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; Zb. DECLASSIFICATION I DOWNGRADING SCHEDULE...ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT Monterey, CA. 93943 FLEMENT NO. NO. NO ACCESSION NO. 11. TITLE (Include Security